Skip to content

Commit 60eae58

Browse files
Merge pull request #234507 from OWinfreyATL/owinfreyATL-ArchiveCheckerRemoval
June 2018 removed from archive
2 parents 9214d0c + e5f9459 commit 60eae58

File tree

1 file changed

+0
-160
lines changed

1 file changed

+0
-160
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 0 additions & 160 deletions
Original file line numberDiff line numberDiff line change
@@ -8537,163 +8537,3 @@ This feature lets non-admins verify their identity while resetting a password us
85378537
Mobile app notification can only be turned on as part of a policy that requires two methods to reset your password.
85388538

85398539
---
8540-
8541-
## June 2018
8542-
8543-
### Change notice: Security fix to the delegated authorization flow for apps using Azure AD Activity Logs API
8544-
8545-
**Type:** Plan for change
8546-
**Service category:** Reporting
8547-
**Product capability:** Monitoring & Reporting
8548-
8549-
Due to our stronger security enforcement, we've had to make a change to the permissions for apps that use a delegated authorization flow to access [Azure AD Activity Logs APIs](../reports-monitoring/concept-reporting-api.md). This change will occur by **June 26, 2018**.
8550-
8551-
If any of your apps use Azure AD Activity Log APIs, follow these steps to ensure the app doesn't break after the change happens.
8552-
8553-
**To update your app permissions**
8554-
8555-
1. Sign in to the Azure portal, select **Azure Active Directory**, and then select **App Registrations**.
8556-
2. Select your app that uses the Azure AD Activity Logs API, select **Settings**, select **Required permissions**, and then select the **Windows Azure Active Directory** API.
8557-
3. In the **Delegated permissions** area of the **Enable access** blade, select the box next to **Read directory** data, and then select **Save**.
8558-
4. Select **Grant permissions**, and then select **Yes**.
8559-
8560-
>[!Note]
8561-
>You must be a Global administrator to grant permissions to the app.
8562-
8563-
For more information, see the [Grant permissions](../reports-monitoring/howto-configure-prerequisites-for-reporting-api.md#grant-permissions) area of the Prerequisites to access the Azure AD reporting API article.
8564-
8565-
---
8566-
8567-
### Configure TLS settings to connect to Azure AD services for PCI DSS compliance
8568-
8569-
**Type:** New feature
8570-
**Service category:** N/A
8571-
**Product capability:** Platform
8572-
8573-
Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications and is the most widely deployed security protocol used today.
8574-
8575-
The [PCI Security Standards Council](https://www.pcisecuritystandards.org/) has determined that early versions of TLS and Secure Sockets Layer (SSL) must be disabled in favor of enabling new and more secure app protocols, with compliance starting on **June 30, 2018**. This change means that if you connect to Azure AD services and require PCI DSS-compliance, you must disable TLS 1.0. Multiple versions of TLS are available, but TLS 1.2 is the latest version available for Azure Active Directory Services. We highly recommend moving directly to TLS 1.2 for both client/server and browser/server combinations.
8576-
8577-
Out-of-date browsers might not support newer TLS versions, such as TLS 1.2. To see which versions of TLS are supported by your browser, go to the [Qualys SSL Labs](https://www.ssllabs.com/) site and select **Test your browser**. We recommend you upgrade to the latest version of your web browser and preferably enable only TLS 1.2.
8578-
8579-
**To enable TLS 1.2, by browser**
8580-
8581-
- **Microsoft Edge and Internet Explorer (both are set using Internet Explorer)**
8582-
8583-
1. Open Internet Explorer, select **Tools** > **Internet Options** > **Advanced**.
8584-
2. In the **Security** area, select **use TLS 1.2**, and then select **OK**.
8585-
3. Close all browser windows and restart Internet Explorer.
8586-
8587-
- **Google Chrome**
8588-
8589-
1. Open Google Chrome, type *chrome://settings/* into the address bar, and press **Enter**.
8590-
2. Expand the **Advanced** options, go to the **System** area, and select **Open proxy settings**.
8591-
3. In the **Internet Properties** box, select the **Advanced** tab, go to the **Security** area, select **use TLS 1.2**, and then select **OK**.
8592-
4. Close all browser windows and restart Google Chrome.
8593-
8594-
- **Mozilla Firefox**
8595-
8596-
1. Open Firefox, type *about:config* into the address bar, and then press **Enter**.
8597-
2. Search for the term, *TLS*, and then select the **security.tls.version.max** entry.
8598-
3. Set the value to **3** to force the browser to use up to version TLS 1.2, and then select **OK**.
8599-
8600-
>[!NOTE]
8601-
>Firefox version 60.0 supports TLS 1.3, so you can also set the security.tls.version.max value to **4**.
8602-
8603-
4. Close all browser windows and restart Mozilla Firefox.
8604-
8605-
---
8606-
8607-
### New Federated Apps available in Azure AD app gallery - June 2018
8608-
8609-
**Type:** New feature
8610-
**Service category:** Enterprise Apps
8611-
**Product capability:** 3rd Party Integration
8612-
8613-
In June 2018, we've added these 15 new apps with Federation support to the app gallery:
8614-
8615-
[Skytap](../saas-apps/skytap-tutorial.md), [Settling music](../saas-apps/settlingmusic-tutorial.md), [SAML 1.1 Token enabled LOB App](../saas-apps/saml-tutorial.md), [Supermood](../saas-apps/supermood-tutorial.md), [Autotask](../saas-apps/autotaskendpointbackup-tutorial.md), [Endpoint Backup](../saas-apps/autotaskendpointbackup-tutorial.md), [Skyhigh Networks](../saas-apps/skyhighnetworks-tutorial.md), Smartway2, [TonicDM](../saas-apps/tonicdm-tutorial.md), [Moconavi](../saas-apps/moconavi-tutorial.md), [Zoho One](../saas-apps/zohoone-tutorial.md), [SharePoint on-premises](../saas-apps/sharepoint-on-premises-tutorial.md), [ForeSee CX Suite](../saas-apps/foreseecxsuite-tutorial.md), [Vidyard](../saas-apps/vidyard-tutorial.md), [ChronicX](../saas-apps/chronicx-tutorial.md)
8616-
8617-
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
8618-
8619-
---
8620-
8621-
### Azure AD Password Protection is available in public preview
8622-
8623-
**Type:** New feature
8624-
**Service category:** Identity Protection
8625-
**Product capability:** User Authentication
8626-
8627-
Use Azure AD Password Protection to help eliminate easily guessed passwords from your environment. Eliminating these passwords helps to lower the risk of compromise from a password spray type of attack.
8628-
8629-
Specifically, Azure AD Password Protection helps you:
8630-
8631-
- Protect your organization's accounts in both Azure AD and Windows Server Active Directory (AD).
8632-
- Stops your users from using passwords on a list of more than 500 of the most commonly used passwords, and over 1 million character substitution variations of those passwords.
8633-
- Administer Azure AD Password Protection from a single location in the Azure portal, for both Azure AD and on-premises Windows Server AD.
8634-
8635-
For more information about Azure AD Password Protection, see [Eliminate bad passwords in your organization](../authentication/concept-password-ban-bad.md).
8636-
8637-
---
8638-
8639-
### New "all guests" Conditional Access policy template created during terms of use creation
8640-
8641-
**Type:** New feature
8642-
**Service category:** Terms of use
8643-
**Product capability:** Governance
8644-
8645-
During the creation of your terms of use, a new Conditional Access policy template is also created for "all guests" and "all apps". This new policy template applies the newly created ToU, streamlining the creation and enforcement process for guests.
8646-
8647-
For more information, see [Azure Active Directory Terms of use feature](../conditional-access/terms-of-use.md).
8648-
8649-
---
8650-
8651-
### New "custom" Conditional Access policy template created during terms of use creation
8652-
8653-
**Type:** New feature
8654-
**Service category:** Terms of use
8655-
**Product capability:** Governance
8656-
8657-
During the creation of your terms of use, a new "custom" Conditional Access policy template is also created. This new policy template lets you create the ToU and then immediately go to the Conditional Access policy creation blade, without needing to manually navigate through the portal.
8658-
8659-
For more information, see [Azure Active Directory Terms of use feature](../conditional-access/terms-of-use.md).
8660-
8661-
---
8662-
8663-
### New and comprehensive guidance about deploying Azure AD Multi-Factor Authentication
8664-
8665-
**Type:** New feature
8666-
**Service category:** Other
8667-
**Product capability:** Identity Security & Protection
8668-
8669-
We've released new step-by-step guidance about how to deploy Azure AD Multi-Factor Authentication (MFA) in your organization.
8670-
8671-
To view the Azure AD Multi-Factor Authentication (MFA) deployment guide, go to the [Identity Deployment Guides](./active-directory-deployment-plans.md) repo on GitHub. To provide feedback about the deployment guides, use the [Deployment Plan Feedback form](https://aka.ms/deploymentplanfeedback). If you have any questions about the deployment guides, contact us at [IDGitDeploy](mailto:[email protected]).
8672-
8673-
---
8674-
8675-
### Azure AD delegated app management roles are in public preview
8676-
8677-
**Type:** New feature
8678-
**Service category:** Enterprise Apps
8679-
**Product capability:** Access Control
8680-
8681-
Admins can now delegate app management tasks without assigning the Global Administrator role. The new roles and capabilities are:
8682-
8683-
- **New standard Azure AD admin roles:**
8684-
8685-
- **Application Administrator.** Grants the ability to manage all aspects of all apps, including registration, SSO settings, app assignments and licensing, App proxy settings, and consent (except to Azure AD resources).
8686-
8687-
- **Cloud Application Administrator.** Grants all of the Application Administrator abilities, except for App proxy because it doesn't provide on-premises access.
8688-
8689-
- **Application Developer.** Grants the ability to create app registrations, even if the **allow users to register apps** option is turned off.
8690-
8691-
- **Ownership (set up per-app registration and per-enterprise app, similar to the group ownership process:**
8692-
8693-
- **App Registration Owner.** Grants the ability to manage all aspects of owned app registration, including the app manifest and adding additional owners.
8694-
8695-
- **Enterprise App Owner.** Grants the ability to manage many aspects of owned enterprise apps, including SSO settings, app assignments, and consent (except to Azure AD resources).
8696-
8697-
For more information about public preview, see the [Azure AD delegated application management roles are in public preview!](https://cloudblogs.microsoft.com/enterprisemobility/2018/06/13/hallelujah-azure-ad-delegated-application-management-roles-are-in-public-preview/) blog. For more information about roles and permissions, see [Assigning administrator roles in Azure Active Directory](../roles/permissions-reference.md).
8698-
8699-
---

0 commit comments

Comments
 (0)