You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-sovereign-clouds.md
+85Lines changed: 85 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,91 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
21
21
22
22
This page is updated monthly, so revisit it regularly.
23
23
24
+
## February 2023
25
+
26
+
### General Availability - Filter and transform group names in token claims configuration using regular expression
27
+
28
+
**Type:** New feature
29
+
**Service category:** Enterprise Apps
30
+
**Product capability:** SSO
31
+
32
+
Filter and transform group names in token claims configuration using regular expression. Many application configurations on ADFS and other IdPs rely on the ability to create authorization claims based on the content of Group Names using regular expression functions in the claim rules. Azure AD now has the capability to use a regular expression match and replace function to create claim content based on Group **onpremisesSAMAccount** names. This functionality will allow those applications to be moved to Azure AD for authentication using the same group management patterns. For more information, see: [Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
33
+
34
+
---
35
+
36
+
### General Availability - Filter groups in tokens using a substring match
37
+
38
+
**Type:** New feature
39
+
**Service category:** Enterprise Apps
40
+
**Product capability:** SSO
41
+
42
+
Azure AD now has the capability to filter the groups included in the token using substring match on the display name or **onPremisesSAMAccountName** attributes of the group object. Only Groups the user is a member of will be included in the token.This was a blocker for some of our customers to migrate their apps from ADFS to Azure AD. This feature will unblock those challenges.
-[Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
47
+
48
+
49
+
50
+
---
51
+
52
+
### General Availability - New SSO claims transformation features
53
+
54
+
**Type:** New feature
55
+
**Service category:** Enterprise Apps
56
+
**Product capability:** SSO
57
+
58
+
Azure AD now supports claims transformations on multi-valued attributes and can emit multi-valued claims. More functions to allow match and string operations on claims processing to enable apps to be migrated from other IdPs to Azure AD. This includes: Match on Empty(), NotEmpty(), Prefix(), Suffix(), and extract substring operators. For more information, see: [Claims mapping policy type](../develop/reference-claims-mapping-policy-type.md).
59
+
60
+
---
61
+
62
+
### General Availability - New Detection for Service Principal Behavior Anomalies
Post-authentication anomalous activity detection for workload identities. This detection focuses specifically on detection of post authenticated anomalous behavior performed by a workload identity (service principal). Post-authentication behavior will be assessed for anomalies based on an action and/or sequence of actions occurring for the account. Based on the scoring of anomalies identified, the offline detection may score the account as low, medium, or high risk. The risk allocation from the offline detection will be available within the Risky workload identities reporting blade. A new detection type identified as Anomalous service principal activity will appear in filter options. For more information, see: [Securing workload identities](../identity-protection/concept-workload-identity-risk.md).
69
+
70
+
---
71
+
72
+
### General Availability - Microsoft cloud settings for Azure AD B2B
73
+
74
+
**Type:** New feature
75
+
**Service category:** B2B
76
+
**Product capability:** B2B/B2C
77
+
78
+
Microsoft cloud settings let you collaborate with organizations from different Microsoft Azure clouds. With Microsoft cloud settings, you can establish mutual B2B collaboration between the following clouds:
79
+
80
+
- Microsoft Azure commercial and Microsoft Azure Government
81
+
- Microsoft Azure commercial and Microsoft Azure China 21Vianet
82
+
83
+
For more information about Microsoft cloud settings for B2B collaboration., see: [Microsoft cloud settings](../external-identities/cross-tenant-access-overview.md#microsoft-cloud-settings).
84
+
85
+
---
86
+
87
+
### Public Preview - Support for Directory Extensions using Azure AD cloud sync
88
+
89
+
**Type:** New feature
90
+
**Service category:** Provisioning
91
+
**Product capability:** Azure AD Connect Cloud Sync
92
+
93
+
Hybrid IT Admins now can sync both Active Directory and Azure AD Directory Extensions using Azure AD Cloud Sync. This new capability adds the ability to dynamically discover the schema for both Active Directory and Azure AD, allowing customers to map the needed attributes using Cloud Sync's attribute mapping experience.
94
+
95
+
For more information on how to enable this feature, see: [Cloud Sync directory extensions and custom attribute mapping](../cloud-sync/custom-attribute-mapping.md)
96
+
97
+
98
+
---
99
+
100
+
### General Availability - On-premises application provisioning
101
+
102
+
**Type:** Changed feature
103
+
**Service category:** Provisioning
104
+
**Product capability:** Outbound to On-premises Applications
105
+
106
+
Azure AD supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. If your application supports [SCIM](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010), or you've built a SCIM gateway to connect to your legacy application, you can use the Azure AD Provisioning agent to [directly connect](../app-provisioning/on-premises-scim-provisioning.md) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](../app-provisioning/on-premises-ldap-connector-configure.md) user store, or a [SQL](../app-provisioning/tutorial-ecma-sql-connector.md) database, Azure AD can support those as well.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/plan-sso-deployment.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 12/07/2022
11
+
ms.date: 03/20/2023
12
12
ms.author: jomondi
13
13
ms.reviewer: alamaral
14
14
ms.collection: M365-identity-device-management
@@ -21,10 +21,10 @@ ms.custom: has-adal-ref
21
21
This article provides information that you can use to plan your [single sign-on (SSO)](what-is-single-sign-on.md) deployment in Azure Active Directory (Azure AD). When you plan your SSO deployment with your applications in Azure AD, you need to consider the following questions:
22
22
23
23
- What are the administrative roles required for managing the application?
24
-
- Does the certificate need to be renewed?
24
+
- Does the Security Assertion Markup Language (SAML) application certificate need to be renewed?
25
25
- Who needs to be notified of changes related to the implementation of SSO?
26
26
- What licenses are needed to ensure effective management of the application?
27
-
- Are shared user accounts used to access the application?
27
+
- Are shared and guest user accounts used to access the application?
28
28
- Do I understand the options for SSO deployment?
29
29
30
30
## Administrative Roles
@@ -33,17 +33,17 @@ Always use the role with the fewest permissions available to accomplish the requ
33
33
34
34
| Persona | Roles | Azure AD role (if necessary) |
35
35
| ------- | ----- | --------------------------- |
36
-
| Help desk admin | Tier 1 support | None |
37
-
| Identity admin | Configure and debug when issues involve Azure AD |Global Administrator |
36
+
| Help desk admin | Tier 1 support view the sign-in logs to resolve issues. | None |
37
+
| Identity admin | Configure and debug when issues involve Azure AD |Cloud Application Administrator |
38
38
| Application admin | User attestation in application, configuration on users with permissions | None |
| Business owner/stakeholder | User attestation in application, configuration on users with permissions | None |
41
41
42
42
To learn more about Azure AD administrative roles, see [Azure AD built-in roles](../users-groups-roles/directory-assign-admin-roles.md).
43
43
44
44
## Certificates
45
45
46
-
When you enable federated SSO for your application, Azure AD creates a certificate that is by default valid for three years. You can customize the expiration date for that certificate if needed. Ensure that you have processes in place to renew certificates prior to their expiration.
46
+
When you enable federation on SAML application, Azure AD creates a certificate that is by default valid for three years. You can customize the expiration date for that certificate if needed. Ensure that you have processes in place to renew certificates prior to their expiration.
47
47
48
48
You change that certificate duration in the Azure portal. Make sure to document the expiration and know how you'll manage your certificate renewal. It’s important to identify the right roles and email distribution lists involved with managing the lifecycle of the signing certificate. The following roles are recommended:
Copy file name to clipboardExpand all lines: articles/aks/nat-gateway.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
-
title: Managed NAT Gateway
2
+
title: Create a managed or user-assigned NAT gateway
3
3
titleSuffix: Azure Kubernetes Service
4
-
description: Learn how to create an AKS cluster with managed NAT integration
4
+
description: Learn how to create an AKS cluster with managed NAT integration and user-assigned NAT gateway.
5
5
author: asudbring
6
6
ms.subservice: aks-networking
7
7
ms.custom: devx-track-azurecli
@@ -10,21 +10,21 @@ ms.date: 10/26/2021
10
10
ms.author: allensu
11
11
---
12
12
13
-
# Managed NAT Gateway
13
+
# Create a managed or user-assigned NAT gateway
14
14
15
15
While you can route egress traffic through an Azure Load Balancer, there are limitations on the amount of outbound flows of traffic you can have. Azure NAT Gateway allows up to 64,512 outbound UDP and TCP traffic flows per IP address with a maximum of 16 IP addresses.
16
16
17
-
This article shows you how to create an AKS cluster with a Managed NAT Gateway for egress traffic and how to disable OutboundNAT on Windows.
17
+
This article shows you how to create an AKS cluster with a managed NAT gateway and a user-assigned NAT gateway for egress traffic and how to disable OutboundNAT on Windows.
18
18
19
19
## Before you begin
20
20
21
21
* Make sure you're using the latest version of [Azure CLI][az-cli].
22
22
* Make sure you're using Kubernetes version 1.20.x or above.
23
23
* Managed NAT Gateway is incompatible with custom virtual networks.
24
24
25
-
## Create an AKS cluster with a Managed NAT Gateway
25
+
## Create an AKS cluster with a managed NAT gateway
26
26
27
-
To create an AKS cluster with a new Managed NAT Gateway, use `--outbound-type managedNATGateway`, `--nat-gateway-managed-outbound-ip-count`, and `--nat-gateway-idle-timeout` when running `az aks create`. If you want the NAT gateway to be able to operate out of availability zones, specify the zones using `--zones`.
27
+
To create an AKS cluster with a new managed NAT Gateway, use `--outbound-type managedNATGateway`, `--nat-gateway-managed-outbound-ip-count`, and `--nat-gateway-idle-timeout` when running `az aks create`. If you want the NAT gateway to be able to operate out of availability zones, specify the zones using `--zones`.
28
28
29
29
The following example creates a *myResourceGroup* resource group, then creates a *natCluster* AKS cluster in *myResourceGroup* with a Managed NAT Gateway, two outbound IPs, and an idle timeout of 30 seconds.
30
30
@@ -56,9 +56,9 @@ az aks update \
56
56
--nat-gateway-managed-outbound-ip-count 5
57
57
```
58
58
59
-
## Create an AKS cluster with a user-assigned NAT Gateway
59
+
## Create an AKS cluster with a user-assigned NAT gateway
60
60
61
-
To create an AKS cluster with a user-assigned NAT Gateway, use `--outbound-type userAssignedNATGateway` when running `az aks create`. This configuration requires bring-your-own networking (via [Kubenet][byo-vnet-kubenet] or [Azure CNI][byo-vnet-azure-cni]) and that the NAT Gateway is preconfigured on the subnet. The following commands create the required resources for this scenario. Make sure to run them all in the same session so that the values stored to variables are still available for the `az aks create` command.
61
+
To create an AKS cluster with a user-assigned NAT gateway, use `--outbound-type userAssignedNATGateway` when running `az aks create`. This configuration requires bring-your-own networking (via [Kubenet][byo-vnet-kubenet] or [Azure CNI][byo-vnet-azure-cni]) and that the NAT Gateway is preconfigured on the subnet. The following commands create the required resources for this scenario. Make sure to run them all in the same session so that the values stored to variables are still available for the `az aks create` command.
Copy file name to clipboardExpand all lines: articles/aks/trusted-access-feature.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Enable Azure resources to access Azure Kubernetes Service (AKS) clusters
3
3
description: Learn how to use the Trusted Access feature to enable Azure resources to access Azure Kubernetes Service (AKS) clusters.
4
4
author: schaffererin
5
5
ms.topic: article
6
-
ms.date: 03/03/2023
6
+
ms.date: 03/20/2023
7
7
ms.author: schaffererin
8
8
---
9
9
@@ -33,9 +33,11 @@ Trusted Access enables you to give explicit consent to your system-assigned MSI
33
33
34
34
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35
35
* Resource types that support [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md).
36
-
* Pre-defined Roles with appropriate [AKS permissions](concepts-identity.md).
37
-
* To learn about what Roles to use in various scenarios, see [AzureML access to AKS clusters with special configurations](https://github.com/Azure/AML-Kubernetes/blob/master/docs/azureml-aks-ta-support.md).
38
-
* If you're using Azure CLI, the **aks-preview** extension version **0.5.74 or later** is required.
36
+
** If you're using Azure CLI, the **aks-preview** extension version **0.5.74 or later** is required.
37
+
* To learn about what Roles to use in various scenarios, see:
38
+
*[AzureML access to AKS clusters with special configurations](https://github.com/Azure/AML-Kubernetes/blob/master/docs/azureml-aks-ta-support.md).
39
+
*[AKS backup using Azure Backup][aks-azure-backup]
40
+
39
41
40
42
First, install the aks-preview extension by running the following command:
41
43
@@ -160,3 +162,4 @@ For more information on AKS, see:
0 commit comments