Skip to content

Commit 3d3d705

Browse files
Merge pull request #243465 from OWinfreyATL/owinfreyATL-September2019-Removed
September 2019 removed from archive
2 parents 15dec7e + 76df366 commit 3d3d705

File tree

1 file changed

+0
-152
lines changed

1 file changed

+0
-152
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 0 additions & 152 deletions
Original file line numberDiff line numberDiff line change
@@ -6779,155 +6779,3 @@ For more information, see [Tutorial: Create and configure an Azure Active Direct
67796779

67806780
---
67816781

6782-
## September 2019
6783-
6784-
### Plan for change: Deprecation of the Power BI content packs
6785-
6786-
**Type:** Plan for change
6787-
**Service category:** Reporting
6788-
**Product capability:** Monitoring & Reporting
6789-
6790-
Starting on October 1, 2019, Power BI will begin to deprecate all content packs, including the Azure AD Power BI content pack. As an alternative to this content pack, you can use Azure AD Workbooks to gain insights into your Azure AD-related services. Additional workbooks are coming, including workbooks about Conditional Access policies in report-only mode, app consent-based insights, and more.
6791-
6792-
For more information about the workbooks, see [How to use Azure Monitor workbooks for Azure Active Directory reports](../reports-monitoring/howto-use-azure-monitor-workbooks.md). For more information about the deprecation of the content packs, see the [Announcing Power BI template apps general availability](https://powerbi.microsoft.com/blog/announcing-power-bi-template-apps-general-availability/) blog post.
6793-
6794-
---
6795-
6796-
### My Profile is renaming and integrating with the Microsoft Office account page
6797-
6798-
**Type:** Plan for change
6799-
**Service category:** My Profile/Account
6800-
**Product capability:** Collaboration
6801-
6802-
Starting in October, the My Profile experience will become My Account. As part of that change, everywhere that currently says, **My Profile** will change to **My Account**. On top of the naming change and some design improvements, the updated experience will offer additional integration with the Microsoft Office account page. Specifically, you'll be able to access Office installations and subscriptions from the **Overview Account** page, along with Office-related contact preferences from the **Privacy** page.
6803-
6804-
For more information about the My Profile (preview) experience, see [My Profile (preview) portal overview](https://support.microsoft.com/account-billing/my-account-portal-for-work-or-school-accounts-eab41bfe-3b9e-441e-82be-1f6e568d65fd).
6805-
6806-
---
6807-
6808-
### Bulk manage groups and members using CSV files in the Azure portal (Public Preview)
6809-
6810-
**Type:** New feature
6811-
**Service category:** Group Management
6812-
**Product capability:** Collaboration
6813-
6814-
We're pleased to announce public preview availability of the bulk group management experiences in the Azure portal. You can now use a CSV file and the Azure portal to manage groups and member lists, including:
6815-
6816-
- Adding or removing members from a group.
6817-
6818-
- Downloading the list of groups from the directory.
6819-
6820-
- Downloading the list of group members for a specific group.
6821-
6822-
For more information, see [Bulk add members](../enterprise-users/groups-bulk-import-members.md), [Bulk remove members](../enterprise-users/groups-bulk-remove-members.md), [Bulk download members list](../enterprise-users/groups-bulk-download-members.md), and [Bulk download groups list](../enterprise-users/groups-bulk-download.md).
6823-
6824-
---
6825-
6826-
### Dynamic consent is now supported through a new admin consent endpoint
6827-
6828-
**Type:** New feature
6829-
**Service category:** Authentications (Logins)
6830-
**Product capability:** User Authentication
6831-
6832-
We've created a new admin consent endpoint to support dynamic consent, which is helpful for apps that want to use the dynamic consent model on the Microsoft Identity platform.
6833-
6834-
For more information about how to use this new endpoint, see [Using the admin consent endpoint](../develop/v2-admin-consent.md).
6835-
6836-
---
6837-
6838-
### New Federated Apps available in Azure AD App gallery - September 2019
6839-
6840-
**Type:** New feature
6841-
**Service category:** Enterprise Apps
6842-
**Product capability:** 3rd Party Integration
6843-
6844-
In September 2019, we've added these 29 new apps with Federation support to the app gallery:
6845-
6846-
[ScheduleLook](https://schedulelook.bbsonlineservices.net/), [MS Azure SSO Access for Ethidex Compliance Office™ - Single sign-on](../saas-apps/ms-azure-sso-access-for-ethidex-compliance-office-tutorial.md), [iServer Portal](../saas-apps/iserver-portal-tutorial.md), [SKYSITE](../saas-apps/skysite-tutorial.md), [Concur Travel and Expense](../saas-apps/concur-travel-and-expense-tutorial.md), [WorkBoard](../saas-apps/workboard-tutorial.md), `https://apps.yeeflow.com/`, [ARC Facilities](../saas-apps/arc-facilities-tutorial.md), [Luware Stratus Team](https://stratus.emea.luware.cloud/login), [Wide Ideas](https://wideideas.online/wideideas/), [Prisma Cloud](../saas-apps/prisma-cloud-tutorial.md), [RENRAKU](../saas-apps/renraku-tutorial.md), [SealPath Secure Browser](https://protection.sealpath.com/SealPathInterceptorWopiSaas/Open/InstallSealPathEditorOneDrive), [Prisma Cloud](../saas-apps/prisma-cloud-tutorial.md), `https://app.penneo.com/`, `https://app.testhtm.com/settings/email-integration`, [Cintoo Cloud](https://aec.cintoo.com/login), [Whitesource](../saas-apps/whitesource-tutorial.md), [Hosted Heritage Online SSO](../saas-apps/hosted-heritage-online-sso-tutorial.md), [IDC](../saas-apps/idc-tutorial.md), [CakeHR](../saas-apps/cakehr-tutorial.md), [BIS](../saas-apps/bis-tutorial.md), [Coo Kai Team Build](https://ms-contacts.coo-kai.jp/), [Sonarqube](../saas-apps/sonarqube-tutorial.md), [Adobe Identity Management](../saas-apps/tutorial-list.md), [Discovery Benefits SSO](../saas-apps/discovery-benefits-sso-tutorial.md), [Amelio](https://app.amelio.co/), `https://itask.yipinapp.com/`
6847-
6848-
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
6849-
6850-
---
6851-
6852-
### New Azure AD Global Reader role
6853-
6854-
**Type:** New feature
6855-
**Service category:** Azure AD roles
6856-
**Product capability:** Access Control
6857-
6858-
Starting on September 24, 2019, we're going to start rolling out a new Azure Active Directory (AD) role called Global Reader. This rollout will start with production and Global cloud customers (GCC), finishing up worldwide in October.
6859-
6860-
The Global Reader role is the read-only counterpart to Global Administrator. Users in this role can read settings and administrative information across Microsoft 365 services, but can't take management actions. We've created the Global Reader role to help reduce the number of Global Administrators in your organization. Because Global Administrator accounts are powerful and vulnerable to attack, we recommend that you have fewer than five Global Administrators. We recommend using the Global Reader role for planning, audits, or investigations. We also recommend using the Global Reader role in combination with other limited administrator roles, like Exchange Administrator, to help get work done without requiring the Global Administrator role.
6861-
6862-
The Global Reader role works with the new Microsoft 365 Admin Center, Exchange Admin Center, Teams Admin Center, Security Center, Microsoft Purview compliance portal, Azure portal, and the Device Management Admin Center.
6863-
6864-
>[!NOTE]
6865-
> At the start of public preview, the Global Reader role won't work with: SharePoint, Privileged Access Management, Customer Lockbox, sensitivity labels, Teams Lifecycle, Teams Reporting & Call Analytics, Teams IP Phone Device Management, and Teams App Catalog.
6866-
6867-
For more information, see [Administrator role permissions in Azure Active Directory](../roles/permissions-reference.md).
6868-
6869-
---
6870-
6871-
### Access an on-premises Report Server from your Power BI Mobile app using Azure Active Directory Application Proxy
6872-
6873-
**Type:** New feature
6874-
**Service category:** App Proxy
6875-
**Product capability:** Access Control
6876-
6877-
New integration between the Power BI mobile app and Azure AD Application Proxy allows you to securely sign in to the Power BI mobile app and view any of your organization's reports hosted on the on-premises Power BI Report Server.
6878-
6879-
For information about the Power BI Mobile app, including where to download the app, see the [Power BI site](https://powerbi.microsoft.com/mobile/). For more information about how to set up the Power BI mobile app with Azure AD Application Proxy, see [Enable remote access to Power BI Mobile with Azure AD Application Proxy](../app-proxy/application-proxy-integrate-with-power-bi.md).
6880-
6881-
---
6882-
6883-
### New version of the AzureADPreview PowerShell module is available
6884-
6885-
**Type:** Changed feature
6886-
**Service category:** Other
6887-
**Product capability:** Directory
6888-
6889-
New cmdlets were added to the AzureADPreview module, to help define and assign custom roles in Azure AD, including:
6890-
6891-
- `Add-AzureADMSFeatureRolloutPolicyDirectoryObject`
6892-
- `Get-AzureADMSFeatureRolloutPolicy`
6893-
- `New-AzureADMSFeatureRolloutPolicy`
6894-
- `Remove-AzureADMSFeatureRolloutPolicy`
6895-
- `Remove-AzureADMSFeatureRolloutPolicyDirectoryObject`
6896-
- `Set-AzureADMSFeatureRolloutPolicy`
6897-
6898-
---
6899-
6900-
### New version of Azure AD Connect
6901-
6902-
**Type:** Changed feature
6903-
**Service category:** Other
6904-
**Product capability:** Directory
6905-
6906-
We've released an updated version of Azure AD Connect for auto-upgrade customers. This new version includes several new features, improvements, and bug fixes.
6907-
6908-
---
6909-
6910-
### Azure Active Directory Multi-Factor Authentication (MFA) Server, version 8.0.2 is now available
6911-
6912-
**Type:** Fixed
6913-
**Service category:** MFA
6914-
**Product capability:** Identity Security & Protection
6915-
6916-
If you're an existing customer, who activated Azure AD Multi-Factor Authentication (MFA) Server prior to July 1, 2019, you can now download the latest version of Azure AD Multi-Factor Authentication (MFA) Server (version 8.0.2). In this new version, we:
6917-
6918-
- Fixed an issue so when Azure AD sync changes a user from Disabled to Enabled, an email is sent to the user.
6919-
6920-
- Fixed an issue so customers can successfully upgrade, while continuing to use the Tags functionality.
6921-
6922-
- Added the Kosovo (+383) country code.
6923-
6924-
- Added one-time bypass audit logging to the MultiFactorAuthSvc.log.
6925-
6926-
- Improved performance for the Web Service SDK.
6927-
6928-
- Fixed other minor bugs.
6929-
6930-
Starting July 1, 2019, Microsoft stopped offering multifactor authentication (MFA) Server for new deployments. New customers who require multifactor authentication should use cloud-based Azure AD Multi-Factor Authentication. For more information, see [Planning a cloud-based Azure AD Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
6931-
6932-
---
6933-

0 commit comments

Comments
 (0)