Skip to content

Commit 6ef6109

Browse files
Merge pull request #216542 from OWinfreyATL/owinfreyATL-October-Archive
April 2022 removed
2 parents f34893c + efa8c3c commit 6ef6109

File tree

1 file changed

+0
-167
lines changed

1 file changed

+0
-167
lines changed

articles/active-directory/fundamentals/whats-new.md

Lines changed: 0 additions & 167 deletions
Original file line numberDiff line numberDiff line change
@@ -1137,171 +1137,4 @@ Smart Lockout now synchronizes the lockout state across Azure AD data centers, s
11371137
---
11381138

11391139

1140-
1141-
## April 2022
1142-
1143-
1144-
### General Availability - Entitlement management separation of duties checks for incompatible access packages
1145-
1146-
**Type:** Changed feature
1147-
**Service category:** Other
1148-
**Product capability:** Identity Governance
1149-
1150-
In Azure AD entitlement management, an administrator can now configure the incompatible access packages and groups of an access package in the Azure portal. This prevents a user who already has one of those incompatible access rights from being able to request further access. For more information, see: [Configure separation of duties checks for an access package in Azure AD entitlement management](../governance/entitlement-management-access-package-incompatible.md).
1151-
1152-
1153-
---
1154-
1155-
### General Availability - Microsoft Defender for Endpoint Signal in Identity Protection
1156-
1157-
**Type:** New feature
1158-
**Service category:** Identity Protection
1159-
**Product capability:** Identity Security & Protection
1160-
1161-
1162-
Identity Protection now integrates a signal from Microsoft Defender for Endpoint (MDE) that will protect against PRT theft detection. To learn more, see: [What is risk? Azure AD Identity Protection | Microsoft Docs](../identity-protection/concept-identity-protection-risks.md).
1163-
1164-
1165-
---
1166-
1167-
### General Availability - Entitlement management 3 stages of approval
1168-
1169-
**Type:** Changed feature
1170-
**Service category:** Other
1171-
**Product capability:** Entitlement Management
1172-
1173-
1174-
1175-
This update extends the Azure AD entitlement management access package policy to allow a third approval stage. This will be able to be configured via the Azure portal or Microsoft Graph. For more information, see: [Change approval and requestor information settings for an access package in Azure AD entitlement management](../governance/entitlement-management-access-package-approval-policy.md).
1176-
1177-
1178-
---
1179-
1180-
### General Availability - Improvements to Azure AD Smart Lockout
1181-
1182-
**Type:** Changed feature
1183-
**Service category:** Identity Protection
1184-
**Product capability:** User Management
1185-
1186-
1187-
1188-
With a recent improvement, Smart Lockout now synchronizes the lockout state across Azure AD data centers, so the total number of failed sign-in attempts allowed before an account is locked out will match the configured lockout threshold. For more information, see: [Protect user accounts from attacks with Azure Active Directory smart lockout](../authentication/howto-password-smart-lockout.md).
1189-
1190-
1191-
---
1192-
1193-
1194-
### Public Preview - Integration of Microsoft 365 App Certification details into Azure Active Directory UX and Consent Experiences
1195-
1196-
**Type:** New feature
1197-
**Service category:** User Access Management
1198-
**Product capability:** AuthZ/Access Delegation
1199-
1200-
1201-
Microsoft 365 Certification status for an app is now available in Azure AD consent UX, and custom app consent policies. The status will later be displayed in several other Identity-owned interfaces such as enterprise apps. For more information, see: [Understanding Azure AD application consent experiences](../develop/application-consent-experience.md).
1202-
1203-
---
1204-
1205-
1206-
### Public preview - Use Azure AD access reviews to review access of B2B direct connect users in Teams shared channels
1207-
1208-
**Type:** New feature
1209-
**Service category:** Access Reviews
1210-
**Product capability:** Identity Governance
1211-
1212-
Use Azure AD access reviews to review access of B2B direct connect users in Teams shared channels. For more information, see: [Include B2B direct connect users and teams accessing Teams Shared Channels in access reviews (preview)](../governance/create-access-review.md#include-b2b-direct-connect-users-and-teams-accessing-teams-shared-channels-in-access-reviews).
1213-
1214-
---
1215-
1216-
### Public Preview - New MS Graph APIs to configure federated settings when federated with Azure AD
1217-
1218-
**Type:** New feature
1219-
**Service category:** MS Graph
1220-
**Product capability:** Identity Security & Protection
1221-
1222-
1223-
We're announcing the public preview of following MS Graph APIs and PowerShell cmdlets for configuring federated settings when federated with Azure AD:
1224-
1225-
|Action |MS Graph API |PowerShell cmdlet |
1226-
|---------|---------|---------|
1227-
|Get federation settings for a federated domain | [Get internalDomainFederation](/graph/api/internaldomainfederation-get?view=graph-rest-beta&preserve-view=true) | [Get-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true) |
1228-
|Create federation settings for a federated domain | [Create internalDomainFederation](/graph/api/domain-post-federationconfiguration?view=graph-rest-beta&preserve-view=true) | [New-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true) |
1229-
|Remove federation settings for a federated domain | [Delete internalDomainFederation](/graph/api/internaldomainfederation-delete?view=graph-rest-beta&preserve-view=true) | [Remove-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/remove-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true) |
1230-
|Update federation settings for a federated domain | [Update internalDomainFederation](/graph/api/internaldomainfederation-update?view=graph-rest-beta&preserve-view=true) | [Update-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/update-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true) |
1231-
1232-
1233-
If using older MSOnline cmdlets ([Get-MsolDomainFederationSettings](/powershell/module/msonline/get-msoldomainfederationsettings?view=azureadps-1.0&preserve-view=true) and [Set-MsolDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0&preserve-view=true)), we highly recommend transitioning to the latest MS Graph APIs and PowerShell cmdlets.
1234-
1235-
For more information, see [internalDomainFederation resource type - Microsoft Graph beta | Microsoft Docs](/graph/api/resources/internaldomainfederation?view=graph-rest-beta&preserve-view=true).
1236-
1237-
---
1238-
1239-
### Public Preview – Ability to force reauthentication on Intune enrollment, risky sign-ins, and risky users
1240-
1241-
**Type:** New feature
1242-
**Service category:** RBAC role
1243-
**Product capability:** AuthZ/Access Delegation
1244-
1245-
1246-
Added functionality to session controls allowing admins to reauthenticate a user on every sign-in if a user or particular sign-in event is deemed risky, or when enrolling a device in Intune. For more information, see [Configure authentication session management with conditional Access](../conditional-access/howto-conditional-access-session-lifetime.md).
1247-
1248-
---
1249-
1250-
### Public Preview – Protect against by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD
1251-
1252-
**Type:** New feature
1253-
**Service category:** MS Graph
1254-
**Product capability:** Identity Security & Protection
1255-
1256-
1257-
We're delighted to announce a new security protection that prevents bypassing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD. When enabled for a federated domain in your Azure AD tenant, it ensures that a compromised federated account can't bypass Azure AD Multi-Factor Authentication by imitating that a multi factor authentication has already been performed by the identity provider. The protection can be enabled via new security setting, [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values&preserve-view=true).
1258-
1259-
We highly recommend enabling this new protection when using Azure AD Multi-Factor Authentication as your multi factor authentication for your federated users. To learn more about the protection and how to enable it, visit [Enable protection to prevent by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD](/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#enable-protection-to-prevent-by-passing-of-cloud-azure-ad-multi-factor-authentication-when-federated-with-azure-ad).
1260-
1261-
---
1262-
1263-
### New Federated Apps available in Azure AD Application gallery - April 2022
1264-
1265-
**Type:** New feature
1266-
**Service category:** Enterprise Apps
1267-
**Product capability:** Third Party Integration
1268-
1269-
In April 2022 we added the following 24 new applications in our App gallery with Federation support:
1270-
[X-1FBO](https://www.x1fbo.com/), [select Armor](https://app.clickarmor.ca/), [Smint.io Portals for SharePoint](https://www.smint.io/portals-for-sharepoint/), [Pluto](../saas-apps/pluto-tutorial.md), [ADEM](../saas-apps/adem-tutorial.md), [Smart360](../saas-apps/smart360-tutorial.md), [MessageWatcher SSO](https://messagewatcher.com/), [Beatrust](../saas-apps/beatrust-tutorial.md), [AeyeScan](https://aeyescan.com/azure_sso), [ABa Customer](https://abacustomer.com/), [Twilio Sendgrid](../saas-apps/twilio-sendgrid-tutorial.md), [Vault Platform](../saas-apps/vault-platform-tutorial.md), [Speexx](../saas-apps/speexx-tutorial.md), [Clicksign](https://app.clicksign.com/signin), [Per Angusta](../saas-apps/per-angusta-tutorial.md), [EruditAI](https://dashboard.erudit.ai/login), [MetaMoJi ClassRoom](https://business.metamoji.com/), [Numici](https://app.numici.com/), [MCB.CLOUD](https://identity.mcb.cloud/Identity/Account/Manage), [DepositLink](https://depositlink.com/external-login), [Last9](https://last9.io/), [ParkHere Corporate](../saas-apps/parkhere-corporate-tutorial.md), [Keepabl](../saas-apps/keepabl-tutorial.md), [Swit](../saas-apps/swit-tutorial.md)
1271-
1272-
You can also find the documentation of all the applications from here https://aka.ms/AppsTutorial.
1273-
1274-
For listing your application in the Azure AD app gallery, please read the details here https://aka.ms/AzureADAppRequest
1275-
1276-
---
1277-
1278-
### General Availability - Customer data storage for Japan customers in Japanese data centers
1279-
1280-
**Type:** New feature
1281-
**Service category:** App Provisioning
1282-
**Product capability:** GoLocal
1283-
1284-
From April 15, 2022, Microsoft began storing Azure AD’s Customer Data for new tenants with a Japan billing address within the Japanese data centers. For more information, see: [Customer data storage for Japan customers in Azure Active Directory](active-directory-data-storage-japan.md).
1285-
1286-
---
1287-
1288-
1289-
### Public Preview - New provisioning connectors in the Azure AD Application Gallery - April 2022
1290-
1291-
**Type:** New feature
1292-
**Service category:** App Provisioning
1293-
**Product capability:** Third Party Integration
1294-
1295-
You can now automate creating, updating, and deleting user accounts for these newly integrated apps:
1296-
- [Adobe Identity Management (OIDC)](../saas-apps/adobe-identity-management-provisioning-oidc-tutorial.md)
1297-
- [embed signage](../saas-apps/embed-signage-provisioning-tutorial.md)
1298-
- [KnowBe4 Security Awareness Training](../saas-apps/knowbe4-security-awareness-training-provisioning-tutorial.md)
1299-
- [NordPass](../saas-apps/nordpass-provisioning-tutorial.md)
1300-
1301-
For more information about how to better secure your organization by using automated user account provisioning, see: [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md)
1302-
1303-
---
1304-
1305-
1306-
13071140

0 commit comments

Comments
 (0)