You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-archive.md
+1-136Lines changed: 1 addition & 136 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9462,139 +9462,4 @@ For more information, see:
9462
9462
9463
9463
- [Get started with Azure Active Directory Identity Protection and Microsoft Graph](../identity-protection/howto-identity-protection-graph-api.md)
9464
9464
9465
-
---
9466
-
9467
-
## December 2017
9468
-
9469
-
### Terms of use in the Access Panel
9470
-
9471
-
**Type:** New feature
9472
-
**Service category:** Terms of use
9473
-
**Product capability:** Compliance
9474
-
9475
-
You now can go to the Access Panel and view the terms of use that you previously accepted.
9476
-
9477
-
Follow these steps:
9478
-
9479
-
1. Go to the [MyApps portal](https://myapps.microsoft.com), and sign in.
9480
-
9481
-
2. In the upper-right corner, select your name, and then select **Profile** from the list.
9482
-
9483
-
3. On your **Profile**, select **Review terms of use**.
9484
-
9485
-
4. Now you can review the terms of use you accepted.
9486
-
9487
-
For more information, see the [Azure AD terms of use feature (preview)](../conditional-access/terms-of-use.md).
9488
-
9489
-
---
9490
-
9491
-
### New Azure AD sign-in experience
9492
-
9493
-
**Type:** New feature
9494
-
**Service category:** Azure AD
9495
-
**Product capability:** User authentication
9496
-
9497
-
The Azure AD and Microsoft account identity system UIs were redesigned so that they have a consistent look and feel. In addition, the Azure AD sign-in page collects the user name first, followed by the credential on a second screen.
9498
-
9499
-
For more information, see [The new Azure AD sign-in experience is now in public preview](https://cloudblogs.microsoft.com/enterprisemobility/2017/08/02/the-new-azure-ad-signin-experience-is-now-in-public-preview/).
9500
-
9501
-
---
9502
-
9503
-
### Fewer sign-in prompts: A new "keep me signed in" experience for Azure AD sign-in
9504
-
9505
-
**Type:** New feature
9506
-
**Service category:** Azure AD
9507
-
**Product capability:** User authentication
9508
-
9509
-
The **Keep me signed in** check box on the Azure AD sign-in page was replaced with a new prompt that shows up after you successfully authenticate.
9510
-
9511
-
If you respond **Yes** to this prompt, the service gives you a persistent refresh token. This behavior is the same as when you selected the **Keep me signed in** check box in the old experience. For federated tenants, this prompt shows after you successfully authenticate with the federated service.
9512
-
9513
-
For more information, see [Fewer sign-in prompts: The new "keep me signed in" experience for Azure AD is in preview](https://cloudblogs.microsoft.com/enterprisemobility/2017/09/19/fewer-login-prompts-the-new-keep-me-signed-in-experience-for-azure-ad-is-in-preview/).
9514
-
9515
-
---
9516
-
9517
-
### Add configuration to require the terms of use to be expanded prior to accepting
9518
-
9519
-
**Type:** New feature
9520
-
**Service category:** Terms of use
9521
-
**Product capability:** Compliance
9522
-
9523
-
An option for administrators requires their users to expand the terms of use prior to accepting the terms.
9524
-
9525
-
Select either **On** or **Off** to require users to expand the terms of use. The **On** setting requires users to view the terms of use prior to accepting them.
9526
-
9527
-
For more information, see the [Azure AD terms of use feature (preview)](../conditional-access/terms-of-use.md).
9528
-
9529
-
---
9530
-
9531
-
### Scoped activation for eligible role assignments
You can use scoped activation to activate eligible Azure resource role assignments with less autonomy than the original assignment defaults. An example is if you're assigned as the owner of a subscription in your tenant. With scoped activation, you can activate the owner role for up to five resources contained within the subscription (such as resource groups and virtual machines). Scoping your activation might reduce the possibility of executing unwanted changes to critical Azure resources.
9538
-
9539
-
For more information, see [What is Azure AD Privileged Identity Management?](../privileged-identity-management/pim-configure.md).
9540
-
9541
-
---
9542
-
9543
-
### New federated apps in the Azure AD app gallery
9544
-
9545
-
**Type:** New feature
9546
-
**Service category:** Enterprise apps
9547
-
**Product capability:** 3rd Party Integration
9548
-
9549
-
In December 2017, we've added these new apps with Federation support to our app gallery:
9550
-
9551
-
[Accredible](../saas-apps/accredible-tutorial.md), Adobe Experience Manager, [EFI Digital StoreFront](../saas-apps/efidigitalstorefront-tutorial.md), [Communifire](../saas-apps/communifire-tutorial.md)
9552
-
CybSafe, [FactSet](../saas-apps/factset-tutorial.md), [IMAGE WORKS](../saas-apps/imageworks-tutorial.md), [MOBI](../saas-apps/mobi-tutorial.md), [MobileIron Azure AD integration](../saas-apps/mobileiron-tutorial.md), [Reflektive](../saas-apps/reflektive-tutorial.md), [SAML SSO for Bamboo by resolution GmbH](../saas-apps/bamboo-tutorial.md), [SAML SSO for Bitbucket by resolution GmbH](../saas-apps/bitbucket-tutorial.md), [Vodeclic](../saas-apps/vodeclic-tutorial.md), WebHR, Zenegy Azure AD Integration.
9553
-
9554
-
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md).
9555
-
9556
-
For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
9557
-
9558
-
---
9559
-
9560
-
### Approval workflows for Azure AD directory roles
Approval workflow for Azure AD directory roles is generally available.
9567
-
9568
-
With approval workflow, privileged-role administrators can require eligible-role members to request role activation before they can use the privileged role. Multiple users and groups can be delegated approval responsibilities. Eligible role members receive notifications when approval is finished and their role is active.
9569
-
9570
-
---
9571
-
9572
-
### Pass-through authentication: Skype for Business support
9573
-
9574
-
**Type:** Changed feature
9575
-
**Service category:** Authentications (Logins)
9576
-
**Product capability:** User authentication
9577
-
9578
-
Pass-through authentication now supports user sign-ins to Skype for Business client applications that support modern authentication, which includes online and hybrid topologies.
9579
-
9580
-
For more information, see [Skype for Business topologies supported with modern authentication](/skypeforbusiness/plan-your-deployment/modern-authentication/topologies-supported).
9581
-
9582
-
---
9583
-
9584
-
### Updates to Azure AD Privileged Identity Management for Azure RBAC (preview)
With the public preview refresh of Azure AD Privileged Identity Management (PIM) for Azure role-based access control (Azure RBAC), you can now:
9591
-
9592
-
* Use Just Enough Administration.
9593
-
* Require approval to activate resource roles.
9594
-
* Schedule a future activation of a role that requires approval for both Azure AD and Azure roles.
9595
-
9596
-
For more information, see [Privileged Identity Management for Azure resources (preview)](../privileged-identity-management/azure-pim-resource-rbac.md).
0 commit comments