You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
-167Lines changed: 0 additions & 167 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1137,171 +1137,4 @@ Smart Lockout now synchronizes the lockout state across Azure AD data centers, s
1137
1137
---
1138
1138
1139
1139
1140
-
1141
-
## April 2022
1142
-
1143
-
1144
-
### General Availability - Entitlement management separation of duties checks for incompatible access packages
1145
-
1146
-
**Type:** Changed feature
1147
-
**Service category:** Other
1148
-
**Product capability:** Identity Governance
1149
-
1150
-
In Azure AD entitlement management, an administrator can now configure the incompatible access packages and groups of an access package in the Azure portal. This prevents a user who already has one of those incompatible access rights from being able to request further access. For more information, see: [Configure separation of duties checks for an access package in Azure AD entitlement management](../governance/entitlement-management-access-package-incompatible.md).
1151
-
1152
-
1153
-
---
1154
-
1155
-
### General Availability - Microsoft Defender for Endpoint Signal in Identity Protection
Identity Protection now integrates a signal from Microsoft Defender for Endpoint (MDE) that will protect against PRT theft detection. To learn more, see: [What is risk? Azure AD Identity Protection | Microsoft Docs](../identity-protection/concept-identity-protection-risks.md).
1163
-
1164
-
1165
-
---
1166
-
1167
-
### General Availability - Entitlement management 3 stages of approval
1168
-
1169
-
**Type:** Changed feature
1170
-
**Service category:** Other
1171
-
**Product capability:** Entitlement Management
1172
-
1173
-
1174
-
1175
-
This update extends the Azure AD entitlement management access package policy to allow a third approval stage. This will be able to be configured via the Azure portal or Microsoft Graph. For more information, see: [Change approval and requestor information settings for an access package in Azure AD entitlement management](../governance/entitlement-management-access-package-approval-policy.md).
1176
-
1177
-
1178
-
---
1179
-
1180
-
### General Availability - Improvements to Azure AD Smart Lockout
1181
-
1182
-
**Type:** Changed feature
1183
-
**Service category:** Identity Protection
1184
-
**Product capability:** User Management
1185
-
1186
-
1187
-
1188
-
With a recent improvement, Smart Lockout now synchronizes the lockout state across Azure AD data centers, so the total number of failed sign-in attempts allowed before an account is locked out will match the configured lockout threshold. For more information, see: [Protect user accounts from attacks with Azure Active Directory smart lockout](../authentication/howto-password-smart-lockout.md).
1189
-
1190
-
1191
-
---
1192
-
1193
-
1194
-
### Public Preview - Integration of Microsoft 365 App Certification details into Azure Active Directory UX and Consent Experiences
1195
-
1196
-
**Type:** New feature
1197
-
**Service category:** User Access Management
1198
-
**Product capability:** AuthZ/Access Delegation
1199
-
1200
-
1201
-
Microsoft 365 Certification status for an app is now available in Azure AD consent UX, and custom app consent policies. The status will later be displayed in several other Identity-owned interfaces such as enterprise apps. For more information, see: [Understanding Azure AD application consent experiences](../develop/application-consent-experience.md).
1202
-
1203
-
---
1204
-
1205
-
1206
-
### Public preview - Use Azure AD access reviews to review access of B2B direct connect users in Teams shared channels
1207
-
1208
-
**Type:** New feature
1209
-
**Service category:** Access Reviews
1210
-
**Product capability:** Identity Governance
1211
-
1212
-
Use Azure AD access reviews to review access of B2B direct connect users in Teams shared channels. For more information, see: [Include B2B direct connect users and teams accessing Teams Shared Channels in access reviews (preview)](../governance/create-access-review.md#include-b2b-direct-connect-users-and-teams-accessing-teams-shared-channels-in-access-reviews).
1213
-
1214
-
---
1215
-
1216
-
### Public Preview - New MS Graph APIs to configure federated settings when federated with Azure AD
We're announcing the public preview of following MS Graph APIs and PowerShell cmdlets for configuring federated settings when federated with Azure AD:
1224
-
1225
-
|Action |MS Graph API |PowerShell cmdlet |
1226
-
|---------|---------|---------|
1227
-
|Get federation settings for a federated domain |[Get internalDomainFederation](/graph/api/internaldomainfederation-get?view=graph-rest-beta&preserve-view=true)|[Get-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true)|
1228
-
|Create federation settings for a federated domain |[Create internalDomainFederation](/graph/api/domain-post-federationconfiguration?view=graph-rest-beta&preserve-view=true)|[New-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true)|
1229
-
|Remove federation settings for a federated domain |[Delete internalDomainFederation](/graph/api/internaldomainfederation-delete?view=graph-rest-beta&preserve-view=true)|[Remove-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/remove-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true)|
1230
-
|Update federation settings for a federated domain |[Update internalDomainFederation](/graph/api/internaldomainfederation-update?view=graph-rest-beta&preserve-view=true)|[Update-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/update-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true)|
1231
-
1232
-
1233
-
If using older MSOnline cmdlets ([Get-MsolDomainFederationSettings](/powershell/module/msonline/get-msoldomainfederationsettings?view=azureadps-1.0&preserve-view=true) and [Set-MsolDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0&preserve-view=true)), we highly recommend transitioning to the latest MS Graph APIs and PowerShell cmdlets.
1234
-
1235
-
For more information, see [internalDomainFederation resource type - Microsoft Graph beta | Microsoft Docs](/graph/api/resources/internaldomainfederation?view=graph-rest-beta&preserve-view=true).
1236
-
1237
-
---
1238
-
1239
-
### Public Preview – Ability to force reauthentication on Intune enrollment, risky sign-ins, and risky users
1240
-
1241
-
**Type:** New feature
1242
-
**Service category:** RBAC role
1243
-
**Product capability:** AuthZ/Access Delegation
1244
-
1245
-
1246
-
Added functionality to session controls allowing admins to reauthenticate a user on every sign-in if a user or particular sign-in event is deemed risky, or when enrolling a device in Intune. For more information, see [Configure authentication session management with conditional Access](../conditional-access/howto-conditional-access-session-lifetime.md).
1247
-
1248
-
---
1249
-
1250
-
### Public Preview – Protect against by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD
We're delighted to announce a new security protection that prevents bypassing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD. When enabled for a federated domain in your Azure AD tenant, it ensures that a compromised federated account can't bypass Azure AD Multi-Factor Authentication by imitating that a multi factor authentication has already been performed by the identity provider. The protection can be enabled via new security setting, [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values&preserve-view=true).
1258
-
1259
-
We highly recommend enabling this new protection when using Azure AD Multi-Factor Authentication as your multi factor authentication for your federated users. To learn more about the protection and how to enable it, visit [Enable protection to prevent by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD](/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#enable-protection-to-prevent-by-passing-of-cloud-azure-ad-multi-factor-authentication-when-federated-with-azure-ad).
1260
-
1261
-
---
1262
-
1263
-
### New Federated Apps available in Azure AD Application gallery - April 2022
1264
-
1265
-
**Type:** New feature
1266
-
**Service category:** Enterprise Apps
1267
-
**Product capability:** Third Party Integration
1268
-
1269
-
In April 2022 we added the following 24 new applications in our App gallery with Federation support:
You can also find the documentation of all the applications from here https://aka.ms/AppsTutorial.
1273
-
1274
-
For listing your application in the Azure AD app gallery, please read the details here https://aka.ms/AzureADAppRequest
1275
-
1276
-
---
1277
-
1278
-
### General Availability - Customer data storage for Japan customers in Japanese data centers
1279
-
1280
-
**Type:** New feature
1281
-
**Service category:** App Provisioning
1282
-
**Product capability:** GoLocal
1283
-
1284
-
From April 15, 2022, Microsoft began storing Azure AD’s Customer Data for new tenants with a Japan billing address within the Japanese data centers. For more information, see: [Customer data storage for Japan customers in Azure Active Directory](active-directory-data-storage-japan.md).
1285
-
1286
-
---
1287
-
1288
-
1289
-
### Public Preview - New provisioning connectors in the Azure AD Application Gallery - April 2022
1290
-
1291
-
**Type:** New feature
1292
-
**Service category:** App Provisioning
1293
-
**Product capability:** Third Party Integration
1294
-
1295
-
You can now automate creating, updating, and deleting user accounts for these newly integrated apps:
For more information about how to better secure your organization by using automated user account provisioning, see: [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md)
0 commit comments