You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-archive.md
-183Lines changed: 0 additions & 183 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8032,186 +8032,3 @@ This change helps you to more quickly delete your custom domain names if your or
8032
8032
For more information, see [Delete a custom domain name](../enterprise-users/domains-manage.md#delete-a-custom-domain-name).
8033
8033
8034
8034
---
8035
-
8036
-
## September 2018
8037
-
8038
-
### Updated administrator role permissions for dynamic groups
8039
-
8040
-
**Type:** Fixed
8041
-
**Service category:** Group Management
8042
-
**Product capability:** Collaboration
8043
-
8044
-
We've fixed an issue so specific administrator roles can now create and update dynamic membership rules, without needing to be the owner of the group.
8045
-
8046
-
The roles are:
8047
-
8048
-
- Global administrator
8049
-
8050
-
- Intune administrator
8051
-
8052
-
- User administrator
8053
-
8054
-
For more information, see [Create a dynamic group and check status](../enterprise-users/groups-create-rule.md)
8055
-
8056
-
---
8057
-
8058
-
### Simplified Single Sign-On (SSO) configuration settings for some third-party apps
8059
-
8060
-
**Type:** New feature
8061
-
**Service category:** Enterprise Apps
8062
-
**Product capability:** SSO
8063
-
8064
-
We realize that setting up Single Sign-On (SSO) for Software as a Service (SaaS) apps can be challenging due to the unique nature of each apps configuration. We've built a simplified configuration experience to auto-populate the SSO configuration settings for the following third-party SaaS apps:
8065
-
8066
-
- Zendesk
8067
-
8068
-
- ArcGis Online
8069
-
8070
-
- Jamf Pro
8071
-
8072
-
To start using this one-click experience, go to the **Azure portal** > **SSO configuration** page for the app. For more information, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md)
8073
-
8074
-
---
8075
-
8076
-
### Azure Active Directory - Where is your data located? page
8077
-
8078
-
**Type:** New feature
8079
-
**Service category:** Other
8080
-
**Product capability:** GoLocal
8081
-
8082
-
Select your company's region from the **Azure Active Directory - Where is your data located** page to view which Azure datacenter houses your Azure AD data at rest for all Azure AD services. You can filter the information by specific Azure AD services for your company's region.
8083
-
8084
-
To access this feature and for more information, see [Azure Active Directory - Where is your data located](https://aka.ms/AADDataMap).
8085
-
8086
-
---
8087
-
8088
-
### New deployment plan available for the My Apps Access panel
8089
-
8090
-
**Type:** New feature
8091
-
**Service category:** My Apps
8092
-
**Product capability:** SSO
8093
-
8094
-
Check out the new deployment plan that's available for the My Apps Access panel (https://aka.ms/deploymentplans).
8095
-
The My Apps Access panel provides users with a single place to find and access their apps. This portal also provides users with self-service opportunities, such as requesting access to apps and groups, or managing access to these resources on behalf of others.
8096
-
8097
-
For more information, see [What is the My Apps portal?](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510)
8098
-
8099
-
---
8100
-
8101
-
### New Troubleshooting and Support tab on the Sign-ins Logs page of the Azure portal
8102
-
8103
-
**Type:** New feature
8104
-
**Service category:** Reporting
8105
-
**Product capability:** Monitoring & Reporting
8106
-
8107
-
The new **Troubleshooting and Support** tab on the **Sign-ins** page of the Azure portal, is intended to help admins and support engineers troubleshoot issues related to Azure AD sign-ins. This new tab provides the error code, error message, and remediation recommendations (if any) to help solve the problem. If you're unable to resolve the problem, we also give you a new way to create a support ticket using the **Copy to clipboard** experience, which populates the **Request ID** and **Date (UTC)** fields for the log file in your support ticket.
8108
-
8109
-

8110
-
8111
-
---
8112
-
8113
-
### Enhanced support for custom extension properties used to create dynamic membership rules
8114
-
8115
-
**Type:** Changed feature
8116
-
**Service category:** Group Management
8117
-
**Product capability:** Collaboration
8118
-
8119
-
With this update, you can now select the **Get custom extension properties** link from the dynamic user group rule builder, enter your unique app ID, and receive the full list of custom extension properties to use when creating a dynamic membership rule for users. This list can also be refreshed to get any new custom extension properties for that app.
8120
-
8121
-
For more information about using custom extension properties for dynamic membership rules, see [Extension properties and custom extension properties](../enterprise-users/groups-dynamic-membership.md#extension-properties-and-custom-extension-properties)
8122
-
8123
-
---
8124
-
8125
-
### New approved client apps for Azure AD app-based Conditional Access
8126
-
8127
-
**Type:** Plan for change
8128
-
**Service category:** Conditional Access
8129
-
**Product capability:** Identity security and protection
8130
-
8131
-
The following apps are on the list of [approved client apps](../conditional-access/concept-conditional-access-conditions.md#client-apps):
8132
-
8133
-
- Microsoft To-Do
8134
-
8135
-
- Microsoft Stream
8136
-
8137
-
For more information, see:
8138
-
8139
-
- [Azure AD app-based Conditional Access](../conditional-access/app-based-conditional-access.md)
8140
-
8141
-
---
8142
-
8143
-
### New support for Self-Service Password Reset from the Windows 7/8/8.1 Lock screen
8144
-
8145
-
**Type:** New feature
8146
-
**Service category:** SSPR
8147
-
**Product capability:** User Authentication
8148
-
8149
-
After you set up this new feature, your users will see a link to reset their password from the **Lock** screen of a device running Windows 7, Windows 8, or Windows 8.1. By clicking that link, the user is guided through the same password reset flow as through the web browser.
8150
-
8151
-
For more information, see [How to enable password reset from Windows 7, 8, and 8.1](../authentication/howto-sspr-windows.md)
8152
-
8153
-
---
8154
-
8155
-
### Change notice: Authorization codes will no longer be available for reuse
8156
-
8157
-
**Type:** Plan for change
8158
-
**Service category:** Authentications (Logins)
8159
-
**Product capability:** User Authentication
8160
-
8161
-
Starting on November 15, 2018, Azure AD will stop accepting previously used authentication codes for apps. This security change helps to bring Azure AD in line with the OAuth specification and will be enforced on both the v1 and v2 endpoints.
8162
-
8163
-
If your app reuses authorization codes to get tokens for multiple resources, we recommend that you use the code to get a refresh token, and then use that refresh token to acquire additional tokens for other resources. Authorization codes can only be used once, but refresh tokens can be used multiple times across multiple resources. An app that attempts to reuse an authentication code during the OAuth code flow will get an invalid_grant error.
8164
-
8165
-
For this and other protocols-related changes, see [the full list of what's new for authentication](../develop/reference-breaking-changes.md).
8166
-
8167
-
---
8168
-
8169
-
### New Federated Apps available in Azure AD app gallery - September 2018
8170
-
8171
-
**Type:** New feature
8172
-
**Service category:** Enterprise Apps
8173
-
**Product capability:** 3rd Party Integration
8174
-
8175
-
In September 2018, we've added these 16 new apps with Federation support to the app gallery:
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
8180
-
8181
-
---
8182
-
8183
-
### Support for additional claims transformations methods
8184
-
8185
-
**Type:** New feature
8186
-
**Service category:** Enterprise Apps
8187
-
**Product capability:** SSO
8188
-
8189
-
We've introduced new claim transformation methods, ToLower() and ToUpper(), which can be applied to SAML tokens from the SAML-based **Single Sign-On Configuration** page.
8190
-
8191
-
For more information, see [How to customize claims issued in the SAML token for enterprise applications in Azure AD](../develop/active-directory-saml-claims-customization.md)
As part of our updated SAML-based app configuration UI, you'll get:
8202
-
8203
-
- An updated walkthrough experience for configuring your SAML-based apps.
8204
-
8205
-
- More visibility about what's missing or incorrect in your configuration.
8206
-
8207
-
- The ability to add multiple email addresses for expiration certificate notification.
8208
-
8209
-
- New claim transformation methods, ToLower() and ToUpper(), and more.
8210
-
8211
-
- A way to upload your own token signing certificate for your enterprise apps.
8212
-
8213
-
- A way to set the NameID Format for SAML apps, and a way to set the NameID value as Directory Extensions.
8214
-
8215
-
To turn on this updated view, click the **Try out our new experience** link from the top of the **Single Sign-On** page. For more information, see [Tutorial: Configure SAML-based single sign-on for an application with Azure Active Directory](../manage-apps/view-applications-portal.md).
0 commit comments