Skip to content

Commit 888823e

Browse files
committed
adding info
1 parent 5ac79a3 commit 888823e

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

articles/active-directory/fundamentals/whats-new.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Network traffic is moving to these new ranges over the next two months. To conti
4848

4949
- 40.126.0.0/18
5050

51-
We strongly recommend not removing the old IP Address ranges until all of your network traffic has moved to the new ranges. For updates about the move and to learn when you can remove the old ranges, see [Office 365 URLs and IP address ranges](https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2).
51+
We strongly recommend not removing the old IP Address ranges until all of your network traffic has moved to the new ranges. For updates about the move and to learn when you can remove the old ranges, see [Office 365 URLs and IP address ranges](https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2).
5252

5353
---
5454

@@ -62,7 +62,7 @@ Starting on October 10, 2018, Azure AD will stop accepting previously-used authe
6262

6363
If your app reuses authorization codes to get tokens for multiple resources, we recommend that you use the code to get a refresh token, and then use that refresh token to acquire additional tokens for other resources. Authorization codes can only be used once, but refresh tokens can be used multiple times across multiple resources. Any new app that attempts to reuse an authentication code during the OAuth code flow will get an invalid_grant error, revoking the previous refresh token that was acquired using that duplicate code.
6464

65-
For more information about refresh tokens, see [Refreshing the access tokens](https://docs.microsoft.com/en-us/azure/active-directory/develop/v1-protocols-oauth-code#refreshing-the-access-tokens).
65+
For more information about refresh tokens, see [Refreshing the access tokens](https://docs.microsoft.com/azure/active-directory/develop/v1-protocols-oauth-code#refreshing-the-access-tokens).
6666

6767
---
6868

@@ -90,7 +90,7 @@ There's a new setting called, **HTTP-Only Cookies** in your Application Proxy ap
9090

9191
This setting isn't compatible with apps using ActiveX controls, such as Remote Desktop. If you're in this situation, we recommend that you turn this setting off.
9292

93-
For more information about the HTTP-Only Cookies setting, see [Publish applications using Azure AD Application Proxy](https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy-publish-azure-portal).
93+
For more information about the HTTP-Only Cookies setting, see [Publish applications using Azure AD Application Proxy](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-publish-azure-portal).
9494

9595
---
9696

@@ -102,20 +102,19 @@ For more information about the HTTP-Only Cookies setting, see [Publish applicati
102102

103103
Just-In-Time activation and assignment settings can now be applied to Management Group resource types, just like you already do for Subscriptions, Resource Groups, and Resources (such as VMs, App Services, and more). In addition, anyone with a role that provides administrator access for a Management Group can discover and manage that resource in PIM.
104104

105-
For more information about PIM and Azure resources, see [Discover and manage Azure resources by using Privileged Identity Management](https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-resource-roles-discover-resources)
105+
For more information about PIM and Azure resources, see [Discover and manage Azure resources by using Privileged Identity Management](https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-resource-roles-discover-resources)
106106

107107
---
108-
109-
[486829](https://identitydivision.visualstudio.com/IAM/IXR/_queries?id=486829&triage=true&fullScreen=false&_a=edit)
110108

111-
### Faster access to Azure AD after activating
109+
### Application access (preview) provides faster access the Azure AD portal
112110

113111
**Type:** New feature
114112
**Service category:** Privileged Identity Management
115113
**Product capability:** Privileged Identity Management
116114

115+
Today, when activating a role using PIM, it can take over 10 minutes for the permissions to take effect. If you choose to use Application access, which is currently in public preview, administrators can access the Azure AD portal as soon as the activation request completes.
117116

118-
Today, when customers activate a role in PIM, it can take ten or more minutes for the role permissions to take effect. With application access (preview), customers can access the Azure AD administration portal as soon as their activation request is complete. At the current moment, Application access (preview) only supports the Azure AD administration experience and Azure resources. Check back for additional partners soon!
117+
Currently, Application access only supports the Azure AD portal experience and Azure resources. For more information about PIM and Application access, see [What is Azure AD Privileged Identity Management?](https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure)
119118

120119
---
121120

@@ -147,7 +146,7 @@ Network traffic is moving to these new ranges over the next two months. To conti
147146

148147
- 40.126.0.0/18
149148

150-
We strongly recommend not removing the old IP Address ranges until all of your network traffic has moved to the new ranges. For updates about the move and to learn when you can remove the old ranges, see [Office 365 URLs and IP address ranges](https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2).
149+
We strongly recommend not removing the old IP Address ranges until all of your network traffic has moved to the new ranges. For updates about the move and to learn when you can remove the old ranges, see [Office 365 URLs and IP address ranges](https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2).
151150

152151
---
153152

0 commit comments

Comments
 (0)