Skip to content

Commit 9850a85

Browse files
committed
August 2023 added to whats new
1 parent f9a0956 commit 9850a85

File tree

1 file changed

+86
-0
lines changed

1 file changed

+86
-0
lines changed

articles/active-directory/fundamentals/whats-new.md

Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,92 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
3232
This page updates monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Azure Active Directory](whats-new-archive.md).
3333

3434

35+
## August 2023
36+
37+
### General Availability - Tenant Restrictions V2
38+
39+
**Type:** New feature
40+
**Service category:** Authentications (Logins)
41+
**Product capability:** Identity Security & Protection
42+
43+
**Tenant Restrictions V2 (TRv2)** is now generally available for authentication plane via proxy.
44+
45+
TRv2 allows organizations to enable safe and productive cross-company collaboration while containing data exfiltration risk. With TRv2, you can control what external tenants your users can access from your devices or network using externally issued identities and provide granular access control on a per org, user, group, and application basis.  
46+
47+
TRv2 uses the cross-tenant access policy and offers both authentication and data plane protection. It enforces policies during user authentication, and on data plane access with Exchange Online, SharePoint Online, Teams, and MSGraph.  While the data plane support with Windows GPO and Global Secure Access is still in public preview, authentication plane support with proxy is now generally available.
48+
49+
Visit https://aka.ms/tenant-restrictions-enforcement for more information on tenant restriction V2 and Global Secure Access client-side tagging for TRv2 at [Universal tenant restrictions](/azure/global-secure-access/how-to-universal-tenant-restrictions).
50+
51+
---
52+
53+
### Public Preview - Cross-tenant access settings supports custom RBAC roles
54+
55+
**Type:** New feature
56+
**Service category:** B2B
57+
**Product capability:** B2B/B2C
58+
59+
Cross-tenant access settings can be managed with custom roles defined by your organization. This enables you to define your own finely-scoped roles to manage cross-tenant access settings instead of using one of the built-in roles for management. Your organization can define custom roles to manage cross-tenant access settings. This allows you to create your own finely-scoped roles to manage cross-tenant access settings instead of using built-in roles for management. [Learn more about creating your own custom roles](../external-identities/cross-tenant-access-overview.md#custom-roles-for-managing-cross-tenant-access-settings).
60+
61+
---
62+
63+
### Public Preview - Setting for guest losing access
64+
65+
**Type:** Changed feature
66+
**Service category:** Entitlement Management
67+
**Product capability:** Entitlement Management
68+
69+
An administrator can configure that when a guest brought in through entitlement management has lost their last access package assignment, they're deleted after a specified number of days. For more information, see: [Govern access for external users in entitlement management](../governance/entitlement-management-external-users.md).
70+
71+
---
72+
73+
### Public Preview - Real-Time Strict Location Enforcement
74+
75+
**Type:** New feature
76+
**Service category:** Continuous Access Evaluation
77+
**Product capability:** Access Control
78+
79+
Strictly enforce Conditional Access policies in real-time using Continuous Access Evaluation. Enable services like Microsoft Graph, Exchange Online, and SharePoint Online to block access requests from disallowed locations as part of a layered defense against token replay and other unauthorized access. For more information, see blog: [Public Preview: Strictly Enforce Location Policies with Continuous Access Evaluation](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/public-preview-strictly-enforce-location-policies-with/ba-p/3773133) and documentation:
80+
[Strictly enforce location policies using continuous access evaluation (preview)](../conditional-access/concept-continuous-access-evaluation-strict-enforcement.md).
81+
82+
---
83+
84+
### Public Preview - New provisioning connectors in the Azure AD Application Gallery - August 2023
85+
86+
**Type:** New feature
87+
**Service category:** App Provisioning
88+
**Product capability:** 3rd Party Integration
89+
90+
91+
We've added the following new applications in our App gallery with Provisioning support. You can now automate creating, updating, and deleting of user accounts for these newly integrated apps:
92+
93+
- [Airbase](../saas-apps/airbase-provisioning-tutorial.md)
94+
- [Airtable](../saas-apps/airtable-provisioning-tutorial.md)
95+
- [Cleanmail Swiss](../saas-apps/cleanmail-swiss-provisioning-tutorial.md)
96+
- [Informacast](../saas-apps/informacast-provisioning-tutorial.md)
97+
- [Kintone](../saas-apps/kintone-provisioning-tutorial.md)
98+
- [O'reilly learning platform](../saas-apps/oreilly-learning-platform-provisioning-tutorial.md)
99+
- [Tailscale](../saas-apps/tailscale-provisioning-tutorial.md)
100+
- [Tanium SSO](../saas-apps/tanium-sso-provisioning-tutorial.md)
101+
- [Vbrick Rev Cloud](../saas-apps/vbrick-rev-cloud-provisioning-tutorial.md)
102+
- [Xledger](../saas-apps/xledger-provisioning-tutorial.md)
103+
104+
105+
For more information about how to better secure your organization by using automated user account provisioning, see: [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
106+
107+
108+
---
109+
110+
### General Availability - Continuous Access Evaluation for Workload Identities available in Public and Gov clouds
111+
112+
**Type:** New feature
113+
**Service category:** Continuous Access Evaluation
114+
**Product capability:** Identity Security & Protection
115+
116+
Real-time enforcement of risk events, revocation events, and Conditional Access location policies is now generally available for workload identities.
117+
Service principals on line of business (LOB) applications are now protected on access requests to Microsoft Graph. For more information, see: [Continuous access evaluation for workload identities (preview)](../conditional-access/concept-continuous-access-evaluation-workload.md).
118+
119+
---
120+
35121
## July 2023
36122

37123
### General Availability: Azure Active Directory (Azure AD) is being renamed.

0 commit comments

Comments
 (0)