Skip to content

Commit 57e1146

Browse files
Merge pull request #234500 from OWinfreyATL/owinfreyATL-ArchiveCheckRemove
April 2018 removed from Archive
2 parents 85ea671 + 784d1d8 commit 57e1146

File tree

1 file changed

+0
-166
lines changed

1 file changed

+0
-166
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 0 additions & 166 deletions
Original file line numberDiff line numberDiff line change
@@ -8880,170 +8880,4 @@ The **fragment** and **form_post** response_modes continue to work - when creati
88808880

88818881
---
88828882

8883-
## April 2018
8884-
8885-
### Azure AD B2C Access Token are GA
8886-
8887-
**Type:** New feature
8888-
**Service category:** B2C - Consumer Identity Management
8889-
**Product capability:** B2B/B2C
8890-
8891-
You can now access Web APIs secured by Azure AD B2C using access tokens. The feature is moving from public preview to GA. The UI experience to configure Azure AD B2C applications and web APIs has been improved, and other minor improvements were made.
8892-
8893-
For more information, see [Azure AD B2C: Requesting access tokens](../../active-directory-b2c/access-tokens.md).
8894-
8895-
---
8896-
8897-
### Test single sign-on configuration for SAML-based applications
8898-
8899-
**Type:** New feature
8900-
**Service category:** Enterprise Apps
8901-
**Product capability:** SSO
8902-
8903-
When configuring SAML-based SSO applications, you're able to test the integration on the configuration page. If you encounter an error during sign in, you can provide the error in the testing experience and Azure AD provides you with resolution steps to solve the specific issue.
8904-
8905-
For more information, see:
8906-
8907-
- [Configuring single sign-on to applications that are not in the Azure Active Directory application gallery](../manage-apps/view-applications-portal.md)
8908-
- [How to debug SAML-based single sign-on to applications in Azure Active Directory](../manage-apps/debug-saml-sso-issues.md)
8909-
8910-
---
8911-
8912-
### Azure AD terms of use now has per user reporting
8913-
8914-
**Type:** New feature
8915-
**Service category:** Terms of use
8916-
**Product capability:** Compliance
8917-
8918-
Administrators can now select a given ToU and see all the users that have consented to that ToU and what date/time it took place.
8919-
8920-
For more information, see the [Azure AD terms of use feature](../conditional-access/terms-of-use.md).
8921-
8922-
---
8923-
8924-
### Azure AD Connect Health: Risky IP for AD FS extranet lockout protection
8925-
8926-
**Type:** New feature
8927-
**Service category:** Other
8928-
**Product capability:** Monitoring & Reporting
8929-
8930-
Connect Health now supports the ability to detect IP addresses that exceed a threshold of failed U/P logins on an hourly or daily basis. The capabilities provided by this feature are:
8931-
8932-
- Comprehensive report showing IP address and the number of failed logins generated on an hourly/daily basis with customizable threshold.
8933-
- Email-based alerts showing when a specific IP address has exceeded the threshold of failed U/P logins on an hourly/daily basis.
8934-
- A download option to do a detailed analysis of the data
8935-
8936-
For more information, see [Risky IP Report](../hybrid/how-to-connect-health-adfs.md).
8937-
8938-
---
8939-
8940-
### Easy app config with metadata file or URL
8941-
8942-
**Type:** New feature
8943-
**Service category:** Enterprise Apps
8944-
**Product capability:** SSO
8945-
8946-
On the Enterprise applications page, administrators can upload a SAML metadata file to configure SAML based sign-on for Azure AD Gallery and Non-Gallery application.
8947-
8948-
Additionally, you can use Azure AD application federation metadata URL to configure SSO with the targeted application.
8949-
8950-
For more information, see [Configuring single sign-on to applications that are not in the Azure Active Directory application gallery](../manage-apps/view-applications-portal.md).
8951-
8952-
---
8953-
8954-
### Azure AD Terms of use now generally available
8955-
8956-
**Type:** New feature
8957-
**Service category:** Terms of use
8958-
**Product capability:** Compliance
8959-
8960-
8961-
Azure AD terms of use have moved from public preview to generally available.
8962-
8963-
For more information, see the [Azure AD terms of use feature](../conditional-access/terms-of-use.md).
8964-
8965-
---
8966-
8967-
### Allow or block invitations to B2B users from specific organizations
8968-
8969-
**Type:** New feature
8970-
**Service category:** B2B
8971-
**Product capability:** B2B/B2C
8972-
8973-
8974-
You can now specify which partner organizations you want to share and collaborate with in Azure AD B2B Collaboration. To do this, you can choose to create list of specific allow or deny domains. When a domain is blocked using these capabilities, employees can no longer send invitations to people in that domain.
8975-
8976-
This helps you to control access to your resources, while enabling a smooth experience for approved users.
8977-
8978-
This B2B Collaboration feature is available for all Azure Active Directory customers and can be used in conjunction with Azure AD Premium features like Conditional Access and identity protection for more granular control of when and how external business users sign in and gain access.
8979-
8980-
For more information, see [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
8981-
8982-
---
8983-
8984-
### New federated apps available in Azure AD app gallery
8985-
8986-
**Type:** New feature
8987-
**Service category:** Enterprise Apps
8988-
**Product capability:** 3rd Party Integration
8989-
8990-
In April 2018, we've added these 13 new apps with Federation support to our app gallery:
8991-
8992-
Criterion HCM, [FiscalNote](../saas-apps/fiscalnote-tutorial.md), [Secret Server (On-Premises)](../saas-apps/secretserver-on-premises-tutorial.md), [Dynamic Signal](../saas-apps/dynamicsignal-tutorial.md), [mindWireless](../saas-apps/mindwireless-tutorial.md), [OrgChart Now](../saas-apps/orgchartnow-tutorial.md), [Ziflow](../saas-apps/ziflow-tutorial.md), [AppNeta Performance Monitor](../saas-apps/appneta-tutorial.md), [Elium](../saas-apps/elium-tutorial.md), [Fluxx Labs](../saas-apps/fluxxlabs-tutorial.md), [Cisco Cloud](../saas-apps/ciscocloud-tutorial.md), Shelf, [SafetyNet](../saas-apps/safetynet-tutorial.md)
8993-
8994-
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md).
8995-
8996-
For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
8997-
8998-
---
8999-
9000-
### Grant B2B users in Azure AD access to your on-premises applications (public preview)
9001-
9002-
**Type:** New feature
9003-
**Service category:** B2B
9004-
**Product capability:** B2B/B2C
9005-
9006-
As an organization that uses Azure Active Directory (Azure AD) B2B collaboration capabilities to invite guest users from partner organizations to your Azure AD, you can now provide these B2B users access to on-premises apps. These on-premises apps can use SAML-based authentication or integrated Windows authentication (IWA) with Kerberos constrained delegation (KCD).
9007-
9008-
For more information, see [Grant B2B users in Azure AD access to your on-premises applications](../external-identities/hybrid-cloud-to-on-premises.md).
9009-
9010-
---
9011-
9012-
### Get SSO integration tutorials from the Azure Marketplace
9013-
9014-
**Type:** Changed feature
9015-
**Service category:** Other
9016-
**Product capability:** 3rd Party Integration
9017-
9018-
If an application that is listed in the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/category/azure-active-directory-apps?page=1) supports SAML based single sign-on, clicking **Get it now** provides you with the integration tutorial associated with that application.
9019-
9020-
---
9021-
9022-
### Faster performance of Azure AD automatic user provisioning to SaaS applications
9023-
9024-
**Type:** Changed feature
9025-
**Service category:** App Provisioning
9026-
**Product capability:** 3rd Party Integration
9027-
9028-
Previously, customers using the Azure Active Directory user provisioning connectors for SaaS applications (for example Salesforce, ServiceNow, and Box) could experience slow performance if their Azure AD tenants contained over 100,000 combined users and groups, and they were using user and group assignments to determine which users should be provisioned.
9029-
9030-
On April 2, 2018, significant performance enhancements were deployed to the Azure AD provisioning service that greatly reduce the amount of time needed to perform initial synchronizations between Azure Active Directory and target SaaS applications.
9031-
9032-
As a result, many customers that had initial synchronizations to apps that took many days or never completed, are now completing within a matter of minutes or hours.
9033-
9034-
For more information, see [What happens during provisioning?](../..//active-directory/app-provisioning/how-provisioning-works.md)
9035-
9036-
---
9037-
9038-
### Self-service password reset from Windows 10 lock screen for hybrid Azure AD joined machines
9039-
9040-
**Type:** Changed feature
9041-
**Service category:** Self Service Password Reset
9042-
**Product capability:** User Authentication
9043-
9044-
We have updated the Windows 10 SSPR feature to include support for machines that are hybrid Azure AD joined. This feature is available in Windows 10 RS4 allows users to reset their password from the lock screen of a Windows 10 machine. Users who are enabled and registered for self-service password reset can utilize this feature.
9045-
9046-
For more information, see [Azure AD password reset from the login screen](../authentication/howto-sspr-windows.md).
9047-
9048-
---
90498883

0 commit comments

Comments
 (0)