Skip to content

Commit 4f57a02

Browse files
Merge pull request #232186 from OWinfreyATL/owinfreyATL-September2018
January 2018 removed from archive
2 parents d9d4a0b + 6cced0f commit 4f57a02

File tree

1 file changed

+0
-104
lines changed

1 file changed

+0
-104
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 0 additions & 104 deletions
Original file line numberDiff line numberDiff line change
@@ -9467,107 +9467,3 @@ For more information, see:
94679467
When the terms of use are displayed, you can now select **Having trouble viewing? Click here**. Clicking this link opens the terms of use natively on your device. Regardless of the font size in the document or the screen size of device, you can zoom and read the document as needed.
94689468

94699469
---
9470-
9471-
## January 2018
9472-
9473-
### New Federated Apps available in Azure AD app gallery
9474-
9475-
**Type:** New feature
9476-
**Service category:** Enterprise Apps
9477-
**Product capability:** 3rd Party Integration
9478-
9479-
In January 2018, the following new apps with federation support were added in the app gallery:
9480-
9481-
[IBM OpenPages](../saas-apps/ibmopenpages-tutorial.md), [OneTrust Privacy Management Software](../saas-apps/onetrust-tutorial.md), [Dealpath](../saas-apps/dealpath-tutorial.md), [IriusRisk Federated Directory, and [Fidelity NetBenefits](../saas-apps/fidelitynetbenefits-tutorial.md).
9482-
9483-
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md).
9484-
9485-
For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
9486-
9487-
---
9488-
9489-
### Sign in with additional risk detected
9490-
9491-
**Type:** New feature
9492-
**Service category:** Identity Protection
9493-
**Product capability:** Identity Security & Protection
9494-
9495-
The insight you get for a detected risk detection is tied to your Azure AD subscription. With the Azure AD Premium P2 edition, you get the most detailed information about all underlying detections.
9496-
9497-
With the Azure AD Premium P1 edition, detections that aren't covered by your license appear as the risk detection Sign-in with additional risk detected.
9498-
9499-
For more information, see [Azure Active Directory risk detections](../identity-protection/overview-identity-protection.md).
9500-
9501-
---
9502-
9503-
### Hide Office 365 applications from end user's access panels
9504-
9505-
**Type:** New feature
9506-
**Service category:** My Apps
9507-
**Product capability:** SSO
9508-
9509-
You can now better manage how Office 365 applications show up on your user's access panels through a new user setting. This option is helpful for reducing the number of apps in a user's access panels if you prefer to only show Office apps in the Office portal. The setting is located in the **User Settings** and is labeled, **Users can only see Office 365 apps in the Office 365 portal**.
9510-
9511-
For more information, see [Hide an application from user's experience in Azure Active Directory](../manage-apps/hide-application-from-user-portal.md).
9512-
9513-
---
9514-
9515-
### Seamless sign into apps enabled for Password SSO directly from app's URL
9516-
9517-
**Type:** New feature
9518-
**Service category:** My Apps
9519-
**Product capability:** SSO
9520-
9521-
The My Apps browser extension is now available via a convenient tool that gives you the My Apps single-sign on capability as a shortcut in your browser. After installing, user's will see a waffle icon in their browser that provides them quick access to apps. Users can now take advantage of:
9522-
9523-
- The ability to directly sign in to password-SSO based apps from the app's sign-in page
9524-
- Launch any app using the quick search feature
9525-
- Shortcuts to recently used apps from the extension
9526-
- The extension is available for Microsoft Edge, Chrome, and Firefox.
9527-
9528-
For more information, see [My Apps Secure Sign-in Extension](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510#download-and-install-the-my-apps-secure-sign-in-extension).
9529-
9530-
---
9531-
9532-
### Azure AD administration experience in Azure Classic Portal has been retired
9533-
9534-
**Type:** Deprecated
9535-
**Service category:** Azure AD
9536-
**Product capability:** Directory
9537-
9538-
As of January 8, 2018, the Azure AD administration experience in the Azure classic portal has been retired. This took place in conjunction with the retirement of the Azure classic portal itself. In the future, you should use the [Azure portal](https://portal.azure.com) for all your portal-based administration of Azure AD.
9539-
9540-
---
9541-
9542-
### The PhoneFactor web portal has been retired
9543-
9544-
**Type:** Deprecated
9545-
**Service category:** Azure AD
9546-
**Product capability:** Directory
9547-
9548-
As of January 8, 2018, the PhoneFactor web portal has been retired. This portal was used for the administration of multi-factor authentication (MFA) server, but those functions have been moved into the Azure portal at portal.azure.com.
9549-
9550-
The multifactor authentication (MFA) configuration is located at: **Azure Active Directory \> multi-factor authentication (MFA) Server**
9551-
9552-
---
9553-
9554-
### Deprecate Azure AD reports
9555-
9556-
**Type:** Deprecated
9557-
**Service category:** Reporting
9558-
**Product capability:** Identity Lifecycle Management
9559-
9560-
9561-
With the general availability of the new Azure Active Directory Administration console and new APIs now available for both activity and security reports, the report APIs under "/reports" endpoint have been retired as of end of December 31, 2017.
9562-
9563-
**What's available?**
9564-
9565-
As part of the transition to the new admin console, we have made 2 new APIs available for retrieving Azure AD Activity Logs. The new set of APIs provides richer filtering and sorting functionality in addition to providing richer audit and sign-in activities. The data previously available through the security reports can now be accessed through the Identity Protection risk detections API in Microsoft Graph.
9566-
9567-
For more information, see:
9568-
9569-
- [Get started with the Azure Active Directory reporting API](../reports-monitoring/concept-reporting-api.md)
9570-
9571-
- [Get started with Azure Active Directory Identity Protection and Microsoft Graph](../identity-protection/howto-identity-protection-graph-api.md)
9572-
9573-
---

0 commit comments

Comments
 (0)