You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
+2-244Lines changed: 2 additions & 244 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -149,7 +149,7 @@ For more information, see: [How to use number matching in multifactor authentica
149
149
150
150
Earlier, we announced our plan to bring IPv6 support to Microsoft Azure Active Directory (Azure AD), enabling our customers to reach the Azure AD services over IPv4, IPv6 or dual stack endpoints. This is just a reminder that we have started introducing IPv6 support into Azure AD services in a phased approach in late March 2023.
151
151
152
-
If you utilize Conditional Access or Identity Protection, and have IPv6 enabled on any of your devices, you likely must take action to avoid impacting your users. For most customers, IPv4 won't completely disappear from their digital landscape, so we aren't planning to require IPv6 or to deprioritize IPv4 in any Azure AD features or services. We'll continue to share additional guidance on IPv6 enablement in Azure AD at this link: [IPv6 support in Azure Active Directory](https://learn.microsoft.com/troubleshoot/azure/active-directory/azure-ad-ipv6-support)
152
+
If you utilize Conditional Access or Identity Protection, and have IPv6 enabled on any of your devices, you likely must take action to avoid impacting your users. For most customers, IPv4 won't completely disappear from their digital landscape, so we aren't planning to require IPv6 or to deprioritize IPv4 in any Azure AD features or services. We'll continue to share additional guidance on IPv6 enablement in Azure AD at this link: [IPv6 support in Azure Active Directory](/troubleshoot/azure/active-directory/azure-ad-ipv6-support).
153
153
154
154
---
155
155
@@ -164,7 +164,7 @@ Microsoft cloud settings let you collaborate with organizations from different M
164
164
- Microsoft Azure commercial and Microsoft Azure Government
165
165
- Microsoft Azure commercial and Microsoft Azure China 21Vianet
166
166
167
-
For more information about Microsoft cloud settings for B2B collaboration., see:[Microsoft cloud settings](../external-identities/cross-tenant-access-overview.md#microsoft-cloud-settings).
167
+
For more information about Microsoft cloud settings for B2B collaboration, see [Microsoft cloud settings](../external-identities/cross-tenant-access-overview.md#microsoft-cloud-settings).
168
168
169
169
---
170
170
@@ -786,245 +786,3 @@ We continue to share additional guidance on IPv6 enablement in Azure AD at this
786
786
787
787
---
788
788
789
-
## October 2022
790
-
791
-
### General Availability - Upgrade Azure AD Provisioning agent to the latest version (version number: 1.1.977.0)
792
-
793
-
794
-
795
-
**Type:** Plan for change
796
-
**Service category:** Provisioning
797
-
**Product capability:** Azure AD Connect Cloud Sync
798
-
799
-
Microsoft stops support for Azure AD provisioning agent with versions 1.1.818.0 and below starting Feb 1,2023. If you're using Azure AD cloud sync, make sure you have the latest version of the agent. You can view info about the agent release history [here](../app-provisioning/provisioning-agent-release-version-history.md). You can download the latest version [here](https://download.msappproxy.net/Subscription/d3c8b69d-6bf7-42be-a529-3fe9c2e70c90/Connector/provisioningAgentInstaller)
800
-
801
-
You can find out which version of the agent you're using as follows:
802
-
803
-
1. Going to the domain server that you have the agent installed
804
-
1. Right-click on the Microsoft Azure AD Connect Provisioning Agent app
805
-
1. Select on “Details” tab and you can find the version number there
806
-
807
-
> [!NOTE]
808
-
> Azure Active Directory (AD) Connect follows the [Modern Lifecycle Policy](/lifecycle/policies/modern). Changes for products and services under the Modern Lifecycle Policy may be more frequent and require customers to be alert for forthcoming modifications to their product or service.
809
-
Product governed by the Modern Policy follow a [continuous support and servicing model](/lifecycle/overview/product-end-of-support-overview). Customers must take the latest update to remain supported. For products and services governed by the Modern Lifecycle Policy, Microsoft's policy is to provide a minimum 30 days' notification when customers are required to take action in order to avoid significant degradation to the normal use of the product or service.
810
-
811
-
---
812
-
813
-
### General Availability - Add multiple domains to the same SAML/Ws-Fed based identity provider configuration for your external users
814
-
815
-
816
-
817
-
**Type:** New feature
818
-
**Service category:** B2B
819
-
**Product capability:** B2B/B2C
820
-
821
-
An IT admin can now add multiple domains to a single SAML/WS-Fed identity provider configuration to invite users from multiple domains to authenticate from the same identity provider endpoint. For more information, see: [Federation with SAML/WS-Fed identity providers for guest users](../external-identities/direct-federation.md).
822
-
823
-
824
-
---
825
-
826
-
### General Availability - Limits on the number of configured API permissions for an application registration enforced starting in October 2022
827
-
828
-
829
-
830
-
**Type:** Plan for change
831
-
**Service category:** Other
832
-
**Product capability:** Developer Experience
833
-
834
-
In the end of October, the total number of required permissions for any single application registration must not exceed 400 permissions across all APIs. Applications exceeding the limit are unable to increase the number of permissions configured for. The existing limit on the number of distinct APIs for permissions required remains unchanged and may not exceed 50 APIs.
835
-
836
-
In the Azure portal, the required permissions list is under API Permissions within specific applications in the application registration menu. When using Microsoft Graph or Microsoft Graph PowerShell, the required permissions list is in the requiredResourceAccess property of an [application](/graph/api/resources/application) entity. For more information, see: [Validation differences by supported account types (signInAudience)](../develop/supported-accounts-validation.md).
837
-
838
-
839
-
---
840
-
841
-
### Public Preview - Conditional access Authentication strengths
842
-
843
-
844
-
845
-
**Type:** New feature
846
-
**Service category:** Conditional Access
847
-
**Product capability:** User Authentication
848
-
849
-
We're announcing Public preview of Authentication strength, a Conditional Access control that allows administrators to specify which authentication methods can be used to access a resource. For more information, see: [Conditional Access authentication strength (preview)](../authentication/concept-authentication-strengths.md). You can use custom authentication strengths to restrict access by requiring specific FIDO2 keys using the Authenticator Attestation GUIDs (AAGUIDs), and apply this through conditional access policies. For more information, see: [FIDO2 security key advanced options](../authentication/concept-authentication-strengths.md#fido2-security-key-advanced-options).
850
-
851
-
---
852
-
853
-
### Public Preview - Conditional access authentication strengths for external identities
854
-
855
-
856
-
**Type:** New feature
857
-
**Service category:** B2B
858
-
**Product capability:** B2B/B2C
859
-
860
-
You can now require your business partner (B2B) guests across all Microsoft clouds to use specific authentication methods to access your resources with **Conditional Access Authentication Strength policies**. For more information, see: [Conditional Access: Require an authentication strength for external users](../conditional-access/howto-conditional-access-policy-authentication-strength-external.md).
861
-
862
-
---
863
-
864
-
865
-
### Generally Availability - Windows Hello for Business, Cloud Kerberos Trust deployment
866
-
867
-
868
-
869
-
**Type:** New feature
870
-
**Service category:** Authentications (Logins)
871
-
**Product capability:** User Authentication
872
-
873
-
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Hybrid Cloud Kerberos Trust Deployment](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust).
874
-
875
-
---
876
-
877
-
### General Availability - Device-based conditional access on Linux Desktops
878
-
879
-
880
-
881
-
**Type:** New feature
882
-
**Service category:** Conditional Access
883
-
**Product capability:** SSO
884
-
885
-
This feature empowers users on Linux clients to register their devices with Azure AD, enroll into Intune management, and satisfy device-based Conditional Access policies when accessing their corporate resources.
886
-
887
-
- Users can register their Linux devices with Azure AD
888
-
- Users can enroll in Mobile Device Management (Intune), which can be used to provide compliance decisions based upon policy definitions to allow device based conditional access on Linux Desktops
889
-
- If compliant, users can use Microsoft Edge Browser to enable Single-Sign on to M365/Azure resources and satisfy device-based Conditional Access policies.
890
-
891
-
892
-
For more information, see:
893
-
[Azure AD registered devices](../devices/concept-azure-ad-register.md).
894
-
[Plan your Azure Active Directory device deployment](../devices/plan-device-deployment.md)
895
-
896
-
---
897
-
898
-
### General Availability - Deprecation of Azure Active Directory Multi-Factor Authentication.
Beginning September 30, 2024, Azure Active Directory Multi-Factor Authentication Server deployments will no longer service multi-factor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services, and to remain in a supported state, organizations should migrate their users’ authentication data to the cloud-based Azure Active Directory Multi-Factor Authentication service using the latest Migration Utility included in the most recent Azure Active Directory Multi-Factor Authentication Server update. For more information, see: [Migrate from MFA Server to Azure AD Multi-Factor Authentication](../authentication/how-to-migrate-mfa-server-to-azure-mfa.md).
907
-
908
-
---
909
-
910
-
### Public Preview - Lifecycle Workflows is now available
911
-
912
-
913
-
914
-
**Type:** New feature
915
-
**Service category:** Lifecycle Workflows
916
-
**Product capability:** Identity Governance
917
-
918
-
919
-
We're excited to announce the public preview of Lifecycle Workflows, a new Identity Governance capability that allows customers to extend the user provisioning process, and adds enterprise grade user lifecycle management capabilities, in Azure AD to modernize your identity lifecycle management process. With Lifecycle Workflows, you can:
920
-
921
-
- Confidently configure and deploy custom workflows to onboard and offboard cloud employees at scale replacing your manual processes.
922
-
- Automate out-of-the-box actions critical to required Joiner and Leaver scenarios and get rich reporting insights.
923
-
- Extend workflows via Logic Apps integrations with custom tasks extensions for more complex scenarios.
924
-
925
-
For more information, see: [What are Lifecycle Workflows? (Public Preview)](../governance/what-are-lifecycle-workflows.md).
926
-
927
-
---
928
-
929
-
### Public Preview - User-to-Group Affiliation recommendation for group Access Reviews
930
-
931
-
932
-
933
-
**Type:** New feature
934
-
**Service category:** Access Reviews
935
-
**Product capability:** Identity Governance
936
-
937
-
This feature provides Machine Learning based recommendations to the reviewers of Azure AD Access Reviews to make the review experience easier and more accurate. The recommendation detects user affiliation with other users within the group, and applies the scoring mechanism we built by computing the user’s average distance with other users in the group. For more information, see: [Review recommendations for Access reviews](../governance/review-recommendations-access-reviews.md).
938
-
939
-
---
940
-
941
-
### General Availability - Group assignment for SuccessFactors Writeback application
942
-
943
-
944
-
945
-
**Type:** New feature
946
-
**Service category:** Provisioning
947
-
**Product capability:** Outbound to SaaS Applications
948
-
949
-
When configuring writeback of attributes from Azure AD to SAP SuccessFactors Employee Central, you can now specify the scope of users using Azure AD group assignment. For more information, see: [Tutorial: Configure attribute write-back from Azure AD to SAP SuccessFactors](../saas-apps/sap-successfactors-writeback-tutorial.md).
950
-
951
-
---
952
-
953
-
### General Availability - Number Matching for Microsoft Authenticator notifications
954
-
955
-
956
-
957
-
**Type:** New feature
958
-
**Service category:** Microsoft Authenticator App
959
-
**Product capability:** User Authentication
960
-
961
-
To prevent accidental notification approvals, admins can now require users to enter the number displayed on the sign-in screen when approving an MFA notification in the Microsoft Authenticator app. We've also refreshed the Azure portal admin UX and Microsoft Graph APIs to make it easier for customers to manage Authenticator app feature roll-outs. As part of this update we have also added the highly requested ability for admins to exclude user groups from each feature.
962
-
963
-
The number matching feature greatly up-levels the security posture of the Microsoft Authenticator app and protects organizations from MFA fatigue attacks. We highly encourage our customers to adopt this feature applying the rollout controls we have built. Number Matching will begin to be enabled for all users of the Microsoft Authenticator app starting February 27 2023.
964
-
965
-
966
-
For more information, see: [How to use number matching in multifactor authentication (MFA) notifications - Authentication methods policy](../authentication/how-to-mfa-number-match.md).
967
-
968
-
---
969
-
970
-
### General Availability - Additional context in Microsoft Authenticator notifications
971
-
972
-
973
-
974
-
**Type:** New feature
975
-
**Service category:** Microsoft Authenticator App
976
-
**Product capability:** User Authentication
977
-
978
-
Reduce accidental approvals by showing users additional context in Microsoft Authenticator app notifications. Customers can enhance notifications with the following steps:
979
-
980
-
- Application Context: This feature shows users which application they're signing into.
981
-
- Geographic Location Context: This feature shows users their sign-in location based on the IP address of the device they're signing into.
982
-
983
-
The feature is available for both MFA and Password-less Phone Sign-in notifications and greatly increases the security posture of the Microsoft Authenticator app. We've also refreshed the Azure portal Admin UX and Microsoft Graph APIs to make it easier for customers to manage Authenticator app feature roll-outs. As part of this update, we've also added the highly requested ability for admins to exclude user groups from certain features.
984
-
985
-
We highly encourage our customers to adopt these critical security features to reduce accidental approvals of Authenticator notifications by end users.
986
-
987
-
988
-
For more information, see: [How to use additional context in Microsoft Authenticator notifications - Authentication methods policy](../authentication/how-to-mfa-additional-context.md).
989
-
990
-
---
991
-
992
-
### New Federated Apps available in Azure AD Application gallery - October 2022
993
-
994
-
995
-
996
-
**Type:** New feature
997
-
**Service category:** Enterprise Apps
998
-
**Product capability:** 3rd Party Integration
999
-
1000
-
1001
-
1002
-
In October 2022 we've added the following 15 new applications in our App gallery with Federation support:
For more information about how to better secure your organization by using automated user account provisioning, see: [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
0 commit comments