Skip to content

Commit 801b125

Browse files
Merge pull request #228060 from OWinfreyATL/owinfreyATL-January2023-SovereignClouds
January 2023 sovereign clouds update
2 parents 4310192 + 0abd432 commit 801b125

File tree

1 file changed

+55
-3
lines changed

1 file changed

+55
-3
lines changed

articles/active-directory/fundamentals/whats-new-sovereign-clouds.md

Lines changed: 55 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,58 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
2222
This page is updated monthly, so revisit it regularly.
2323

2424

25+
## January 2023
26+
27+
### General Availability - Azure AD Domain Services: Deeper Insights
28+
29+
**Type:** New feature
30+
**Service category:** Azure AD Domain Services
31+
**Product capability:** Azure AD Domain Services
32+
33+
Now within the Azure portal you have access to view key data for your Azure AD-DS Domain Controllers such as: LDAP Searches/sec, Total Query Received/sec, DNS Total Response Sent/sec, LDAP Successful Binds/sec, memory usage, processor time, Kerberos Authentications, and NTLM Authentications. For more information, see: [Check fleet metrics of Azure Active Directory Domain Services](/azure/active-directory-domain-services/fleet-metrics).
34+
35+
---
36+
37+
### General Availability - Add multiple domains to the same SAML/Ws-Fed based identity provider configuration for your external users
38+
39+
**Type:** New feature
40+
**Service category:** B2B
41+
**Product capability:** B2B/B2C
42+
43+
An IT admin can now add multiple domains to a single SAML/WS-Fed identity provider configuration to invite users from multiple domains to authenticate from the same identity provider endpoint. For more information, see: [Federation with SAML/WS-Fed identity providers for guest users](../external-identities/direct-federation.md).
44+
45+
---
46+
47+
### General Availability - New risk in Identity Protection: Anomalous user activity
48+
49+
**Type:** New feature
50+
**Service category:** Conditional Access
51+
**Product capability:** Identity Security & Protection
52+
53+
This risk detection baselines normal administrative user behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrator making the change or the object that was changed. For more information, see: [User-linked detections](../identity-protection/concept-identity-protection-risks.md#user-linked-detections).
54+
55+
---
56+
57+
### General Availability - Administrative unit support for devices
58+
59+
**Type:** New feature
60+
**Service category:** Directory Management
61+
**Product capability:** AuthZ/Access Delegation
62+
63+
You can now use administrative units to delegate management of specified devices in your tenant by adding devices to an administrative unit, and assigning built-in and custom device management roles scoped to that administrative unit. For more information, see: [Device management](../roles/administrative-units.md#device-management).
64+
65+
---
66+
67+
### General Availability - Azure AD Terms of Use (ToU) API
68+
69+
**Type:** New feature
70+
**Service category:** Conditional Access
71+
**Product capability:** Identity Security & Protection
72+
73+
Represents a tenant's customizable terms of use agreement that is created, and managed, with Azure Active Directory (Azure AD). You can use the following methods to create and manage the [Azure Active Directory Terms of Use feature](/graph/api/resources/agreement?#json-representation) according to your scenario. For more information, see: [agreement resource type](/graph/api/resources/agreement).
74+
75+
---
76+
2577
## December 2022
2678

2779
### General Availability - Risk-based Conditional Access for workload identities
@@ -40,7 +92,7 @@ Customers can now bring one of the most powerful forms of access control in the
4092
**Service category:** Enterprise Apps
4193
**Product capability:** Identity Lifecycle Management
4294

43-
Restore a recently deleted application, group, servicePrincipal, administrative unit, or user object from deleted items. If an item was accidentally deleted, you can fully restore the item. This isn't applicable to security groups, which are deleted permanently. A recently deleted item will remain available for up to 30 days. After 30 days, the item is permanently deleted. For more information, see: [servicePrincipal resource type](/graph/api/resources/serviceprincipal).
95+
Restore a recently deleted application, group, servicePrincipal, administrative unit, or user object from deleted items. If an item was accidentally deleted, you can fully restore the item. This isn't applicable to security groups, which are deleted permanently. A recently deleted item remains available for up to 30 days. After 30 days, the item is permanently deleted. For more information, see: [servicePrincipal resource type](/graph/api/resources/serviceprincipal).
4496

4597
---
4698

@@ -50,7 +102,7 @@ Restore a recently deleted application, group, servicePrincipal, administrative
50102
**Service category:** Authentications (Logins)
51103
**Product capability:** Identity Security & Protection
52104

53-
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business much easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Migrate to cloud authentication using Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
105+
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Migrate to cloud authentication using Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
54106

55107
---
56108

@@ -64,7 +116,7 @@ We're excited to announce the general availability of hybrid cloud Kerberos trus
64116
**Service category:** Authentications (Logins)
65117
**Product capability:** User Authentication
66118

67-
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business much easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Hybrid Cloud Kerberos Trust Deployment](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust).
119+
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Hybrid Cloud Kerberos Trust Deployment](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust).
68120

69121
---
70122

0 commit comments

Comments
 (0)