You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
+13-39Lines changed: 13 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,25 +31,22 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
31
31
32
32
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Azure Active Directory](whats-new-archive.md).
33
33
34
-
35
34
## April 2022
36
35
37
-
### General Availability- Microsoft Defender for Cloud for Endpoint Signal in Identity Protection
38
-
36
+
### General Availability - Microsoft Defender for Endpoint Signal in Identity Protection
Identity Protection now integrates a signal from Microsoft Defender for Cloud for Endpoint (MDE) that will protect against PRT theft detection. To learn more, see: [What is risk? Azure AD Identity Protection | Microsoft Docs](../identity-protection/concept-identity-protection-risks.md).
43
+
Identity Protection now integrates a signal from Microsoft Defender for Endpoint (MDE) that will protect against PRT theft detection. To learn more, see: [What is risk? Azure AD Identity Protection | Microsoft Docs](../identity-protection/concept-identity-protection-risks.md).
46
44
47
45
48
46
---
49
47
50
48
### General availability - Entitlement management 3 stages of approval
51
49
52
-
53
50
**Type:** Changed feature
54
51
**Service category:** Other
55
52
**Product capability:** Entitlement Management
@@ -63,7 +60,6 @@ This update extends the Azure AD entitlement management access package policy to
63
60
64
61
### General Availability - Improvements to Azure AD Smart Lockout
65
62
66
-
67
63
**Type:** Changed feature
68
64
**Service category:** Identity Protection
69
65
**Product capability:** User Management
@@ -75,7 +71,6 @@ With a recent improvement, Smart Lockout now synchronizes the lockout state acro
75
71
76
72
---
77
73
78
-
79
74
### Public Preview - Enabling customization capabilities for the Self-Service Password Reset (SSPR) hyperlinks, footer hyperlinks and browser icons in Company Branding.
80
75
81
76
**Type:** New feature
@@ -88,7 +83,6 @@ Updating the Company Branding functionality on the Azure AD/Microsoft 365 sign-i
88
83
89
84
### Public Preview - Integration of Microsoft 365 App Certification details into AAD UX and Consent Experiences
90
85
91
-
92
86
**Type:** New feature
93
87
**Service category:** User Access Management
94
88
**Product capability:** AuthZ/Access Delegation
@@ -110,12 +104,10 @@ Updating the Company Branding functionality on the Azure AD/Microsoft 365 sign-i
110
104
111
105
### Public preview - Use Azure AD access reviews to review access of B2B direct connect users in Teams shared channels
112
106
113
-
114
107
**Type:** New feature
115
108
**Service category:** Access Reviews
116
109
**Product capability:** Identity Governance
117
110
118
-
119
111
Use Azure AD access reviews to review access of B2B direct connect users in Teams shared channels. For more information, see: [Include B2B direct connect users and teams accessing Teams Shared Channels in access reviews (preview)](../governance/create-access-review.md#include-b2b-direct-connect-users-and-teams-accessing-teams-shared-channels-in-access-reviews-preview).
120
112
121
113
---
@@ -127,24 +119,19 @@ Use Azure AD access reviews to review access of B2B direct connect users in Team
We're announcing the public preview of following MS Graph APIs and PowerShell cmdlets for configuring federated settings when federated with Azure AD:
132
123
133
-
134
124
|Action |MS Graph API |PowerShell cmdlet |
135
125
|---------|---------|---------|
136
-
|Get federation settings for a federated domain |[Get internalDomainFederation](https://docs.microsoft.com/graph/api/internaldomainfederation-get?view=graph-rest-beta)|[Get-MgDomainFederationConfiguration](https://docs.microsoft.com/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration?view=graph-powershell-beta)|
137
-
|Create federation settings for a federated domain |[Create internalDomainFederation](https://docs.microsoft.com/graph/api/domain-post-federationconfiguration?view=graph-rest-beta)|[New-MgDomainFederationConfiguration](https://docs.microsoft.com/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration?view=graph-powershell-beta)|
138
-
|Remove federation settings for a federated domain |[Delete internalDomainFederation](https://docs.microsoft.com/graph/api/internaldomainfederation-delete?view=graph-rest-beta)|[Remove-MgDomainFederationConfiguration](https://docs.microsoft.com/powershell/module/microsoft.graph.identity.directorymanagement/remove-mgdomainfederationconfiguration?view=graph-powershell-beta)|
139
-
|Update federation settings for a federated domain |[Update internalDomainFederation](https://docs.microsoft.com/graph/api/internaldomainfederation-update?view=graph-rest-beta)|[Update-MgDomainFederationConfiguration](https://docs.microsoft.com/powershell/module/microsoft.graph.identity.directorymanagement/update-mgdomainfederationconfiguration?view=graph-powershell-beta)|
140
-
141
-
126
+
|Get federation settings for a federated domain |[Get internalDomainFederation](/graph/api/internaldomainfederation-get?view=graph-rest-beta&preserve-view=true)|[Get-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true)|
127
+
|Create federation settings for a federated domain |[Create internalDomainFederation](/graph/api/domain-post-federationconfiguration?view=graph-rest-beta&preserve-view=true)|[New-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true)|
128
+
|Remove federation settings for a federated domain |[Delete internalDomainFederation](/graph/api/internaldomainfederation-delete?view=graph-rest-beta&preserve-view=true)|[Remove-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/remove-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true)|
129
+
|Update federation settings for a federated domain |[Update internalDomainFederation](/graph/api/internaldomainfederation-update?view=graph-rest-beta&preserve-view=true)|[Update-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/update-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true)|
142
130
143
-
If using older MSOnline cmdlets ([Get-MsolDomainFederationSettings](https://docs.microsoft.com/powershell/module/msonline/get-msoldomainfederationsettings?view=azureadps-1.0) and [Set-MsolDomainFederationSettings](https://docs.microsoft.com/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0)), we highly recommend transitioning to the latest MS Graph APIs and PowerShell cmdlets.
144
131
132
+
If using older MSOnline cmdlets ([Get-MsolDomainFederationSettings](/powershell/module/msonline/get-msoldomainfederationsettings?view=azureadps-1.0&preserve-view=true) and [Set-MsolDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0&preserve-view=true)), we highly recommend transitioning to the latest MS Graph APIs and PowerShell cmdlets.
145
133
146
-
For more information, see [internalDomainFederation resource type - Microsoft Graph beta | Microsoft Docs](https://docs.microsoft.com/graph/api/resources/internaldomainfederation?view=graph-rest-beta).
147
-
134
+
For more information, see [internalDomainFederation resource type - Microsoft Graph beta | Microsoft Docs](/graph/api/resources/internaldomainfederation?view=graph-rest-beta&preserve-view=true).
148
135
149
136
---
150
137
@@ -166,9 +153,9 @@ Added functionality to session controls allowing admins to reauthenticate a user
We're delighted to announce a new security protection that prevents bypassing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD. When enabled for a federated domain in your Azure AD tenant, it ensures that a compromised federated account can't bypass Azure AD Multi-Factor Authentication by imitating that a multi factor authentication has already been performed by the identity provider. The protection can be enabled via new security setting, [federatedIdpMfaBehavior](https://docs.microsoft.com/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values).
156
+
We're delighted to announce a new security protection that prevents bypassing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD. When enabled for a federated domain in your Azure AD tenant, it ensures that a compromised federated account can't bypass Azure AD Multi-Factor Authentication by imitating that a multi factor authentication has already been performed by the identity provider. The protection can be enabled via new security setting, [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values&preserve-view=true).
170
157
171
-
We highly recommend enabling this new protection when using Azure AD Multi-Factor Authentication as your multi factor authentication for your federated users. To learn more about the protection and how to enable it, visit [Enable protection to prevent by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#enable-protection-to-prevent-by-passing-of-cloud-azure-ad-multi-factor-authentication-when-federated-with-azure-ad).
158
+
We highly recommend enabling this new protection when using Azure AD Multi-Factor Authentication as your multi factor authentication for your federated users. To learn more about the protection and how to enable it, visit [Enable protection to prevent by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD](/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#enable-protection-to-prevent-by-passing-of-cloud-azure-ad-multi-factor-authentication-when-federated-with-azure-ad).
172
159
173
160
---
174
161
@@ -183,7 +170,6 @@ In April 2022 we added the following 24 new applications in our App gallery with
183
170
184
171
You can also find the documentation of all the applications from here https://aka.ms/AppsTutorial.
185
172
186
-
187
173
For listing your application in the Azure AD app gallery, please read the details here https://aka.ms/AzureADAppRequest
188
174
189
175
---
@@ -197,11 +183,9 @@ For listing your application in the Azure AD app gallery, please read the detail
197
183
198
184
From April 15, 2022, Microsoft began storing Azure AD’s Customer Data for new tenants with a Japan billing address within the Japanese data centers. For more information, see: [Customer data storage for Japan customers in Azure Active Directory](active-directory-data-storage-japan.md).
199
185
200
-
201
186
---
202
187
203
188
204
-
205
189
### Public Preview - New provisioning connectors in the Azure AD Application Gallery - April 2022
206
190
207
191
**Type:** New feature
@@ -217,7 +201,6 @@ You can now automate creating, updating, and deleting user accounts for these ne
217
201
218
202
For more information about how to better secure your organization by using automated user account provisioning, see: [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md)
219
203
220
-
221
204
---
222
205
223
206
## March 2022
@@ -262,7 +245,6 @@ For more information about how to better secure your organization by using autom
262
245
---
263
246
264
247
265
-
266
248
### Public preview - Azure AD Recommendations
267
249
268
250
**Type:** New feature
@@ -320,7 +302,6 @@ You can also find the documentation of all the applications from here https://ak
320
302
321
303
For listing your application in the Azure AD app gallery, please read the details here https://aka.ms/AzureADAppRequest
322
304
323
-
324
305
---
325
306
326
307
@@ -342,14 +323,12 @@ For listing your application in the Azure AD app gallery, please read the detail
342
323
---
343
324
344
325
345
-
346
326
## February 2022
347
327
348
328
349
329
---
350
330
351
331
352
-
353
332
### General Availability - France digital accessibility requirement
354
333
355
334
**Type:** Plan for change
@@ -363,7 +342,6 @@ This change provides users who are signing into Azure Active Directory on iOS, A
363
342
---
364
343
365
344
366
-
367
345
### General Availability - Downloadable access review history report
368
346
369
347
**Type:** New feature
@@ -376,11 +354,9 @@ With Azure Active Directory (Azure AD) Access Reviews, you can create a download
376
354
377
355
---
378
356
379
-
380
357
---
381
358
382
359
383
-
384
360
### Public Preview of Identity Protection for Workload Identities
385
361
386
362
**Type:** New feature
@@ -394,7 +370,6 @@ Azure AD Identity Protection is extending its core capabilities of detecting, in
394
370
---
395
371
396
372
397
-
398
373
### Public Preview - Cross-tenant access settings for B2B collaboration
399
374
400
375
**Type:** New feature
@@ -409,7 +384,6 @@ Cross-tenant access settings enable you to control how users in your organizatio
409
384
---
410
385
411
386
412
-
413
387
### Public preview - Create Azure AD access reviews with multiple stages of reviewers
414
388
415
389
**Type:** New feature
@@ -438,7 +412,6 @@ You can also find the documentation of all the applications from here: [https://
438
412
439
413
For listing your application in the Azure AD app gallery, please read the details here: [https://aka.ms/AzureADAppRequest](../manage-apps/v2-howto-app-gallery-listing.md)
440
414
441
-
442
415
443
416
444
417
---
@@ -493,7 +466,6 @@ We have improved the Privileged Identity management (PIM) time to role activatio
493
466
494
467
495
468
496
-
497
469
## January 2022
498
470
499
471
### Public preview - Custom security attributes
@@ -662,7 +634,7 @@ We’re no longer publishing sign-in logs with the following error codes because
662
634
663
635
|Error code | Failure reason|
664
636
| --- | --- |
665
-
|50058|Session information isn’t sufficient for single-sign-on.|
637
+
|50058|Session information isn’t sufficient for single-sign-on.|
666
638
|16000| Either multiple user identities are available for the current request or selected account isn’t supported for the scenario.|
667
639
|500581| Rendering JavaScript. Fetching sessions for single-sign-on on V2 with prompt=none requires JavaScript to verify if any MSA accounts are signed in.|
668
640
|81012| The user trying to sign in to Azure AD is different from the user signed into the device.|
@@ -865,3 +837,5 @@ Updated "switch organizations" user interface in My Account. This visually impro
0 commit comments