Skip to content

Commit 87f87df

Browse files
Merge pull request #225880 from OWinfreyATL/owinfreyATL-WhatsUpdateNew
July partial move pt 2
2 parents 1774d30 + c171196 commit 87f87df

File tree

1 file changed

+0
-53
lines changed

1 file changed

+0
-53
lines changed

articles/active-directory/fundamentals/whats-new.md

Lines changed: 0 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -1176,57 +1176,4 @@ Note that end users are encouraged to enable the optional telemetry setting in t
11761176

11771177

11781178

1179-
---
1180-
1181-
1182-
1183-
### Public Preview - Azure AD Domain Services - Fine Grain Permissions
1184-
1185-
**Type:** Changed feature
1186-
**Service category:** Azure AD Domain Services
1187-
**Product capability:** Azure AD Domain Services
1188-
1189-
1190-
1191-
Previously to set up and administer your AAD-DS instance you needed top level permissions of Azure Contributor and Azure AD Global Administrator. Now for both initial creation, and ongoing administration, you can utilize more fine grain permissions for enhanced security and control. The prerequisites now minimally require:
1192-
1193-
- You need [Application Administrator](../roles/permissions-reference.md#application-administrator) and [Groups Administrator](../roles/permissions-reference.md#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
1194-
- You need [Domain Services Contributor](../../role-based-access-control/built-in-roles.md#domain-services-contributor) Azure role to create the required Azure AD DS resources.
1195-
1196-
1197-
Check out these resources to learn more:
1198-
1199-
- [Tutorial - Create an Azure Active Directory Domain Services managed domain | Microsoft Docs](../../active-directory-domain-services/tutorial-create-instance.md#prerequisites)
1200-
- [Least privileged roles by task - Azure Active Directory | Microsoft Docs](../roles/delegate-by-task.md#domain-services)
1201-
- [Azure built-in roles - Azure RBAC | Microsoft Docs](../../role-based-access-control/built-in-roles.md#domain-services-contributor)
1202-
1203-
1204-
1205-
---
1206-
1207-
1208-
### General Availability- Azure AD Connect update release with new functionality and bug fixes
1209-
1210-
**Type:** Changed feature
1211-
**Service category:** Provisioning
1212-
**Product capability:** Identity Lifecycle Management
1213-
1214-
1215-
1216-
A new Azure AD Connect release fixes several bugs and includes new functionality. This release is also available for auto upgrade for eligible servers. For more information, see: [Azure AD Connect: Version release history](../hybrid/reference-connect-version-history.md#21150).
1217-
1218-
---
1219-
1220-
1221-
### General Availability - Cross-tenant access settings for B2B collaboration
1222-
1223-
**Type:** Changed feature
1224-
**Service category:** B2B
1225-
**Product capability:** B2B/B2C
1226-
1227-
1228-
1229-
Cross-tenant access settings enable you to control how users in your organization collaborate with members of external Azure AD organizations. Now you’ll have granular inbound and outbound access control settings that work on a per org, user, group, and application basis. These settings also make it possible for you to trust security claims from external Azure AD organizations like multi-factor authentication (MFA), device compliance, and hybrid Azure AD joined devices. For more information, see: [Cross-tenant access with Azure AD External Identities](../external-identities/cross-tenant-access-overview.md).
1230-
1231-
12321179
---

0 commit comments

Comments
 (0)