Skip to content

Commit 9e08d2c

Browse files
authored
Merge pull request #196621 from MicrosoftDocs/main
4/29 AM Publish
2 parents e217791 + 59f6bbe commit 9e08d2c

File tree

344 files changed

+2834
-1911
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

344 files changed

+2834
-1911
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -934,6 +934,7 @@
934934
"articles/mysql/.openpublishing.redirection.mysql.json",
935935
"articles/container-apps/.openpublishing.redirection.container-apps.json",
936936
"articles/spring-cloud/.openpublishing.redirection.spring-cloud.json",
937-
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json"
937+
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json",
938+
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json"
938939
]
939940
}

articles/active-directory/develop/publisher-verification-overview.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,6 @@ A blue "verified" badge appears on the Azure AD consent prompt and other screens
2626

2727
![Consent prompt](./media/publisher-verification-overview/consent-prompt.png)
2828

29-
> [!NOTE]
30-
> We recently changed the color of the "verified" badge from blue to gray. We will revert that change sometime in the last half of February 2022, so the "verified" badge will be blue.
31-
3229
This feature is primarily for developers building multi-tenant apps that leverage [OAuth 2.0 and OpenID Connect](active-directory-v2-protocols.md) with the [Microsoft identity platform](v2-overview.md). These apps can sign users in using OpenID Connect, or they may use OAuth 2.0 to request access to data using APIs like [Microsoft Graph](https://developer.microsoft.com/graph/).
3330

3431
## Benefits

articles/active-directory/develop/workload-identity-federation.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ Typically, a software workload (such as an application, service, script, or cont
2929
You use workload identity federation to configure an Azure AD app registration to trust tokens from an external identity provider (IdP), such as GitHub. Once that trust relationship is created, your software workload can exchange trusted tokens from the external IdP for access tokens from Microsoft identity platform. Your software workload then uses that access token to access the Azure AD protected resources to which the workload has been granted access. This eliminates the maintenance burden of manually managing credentials and eliminates the risk of leaking secrets or having certificates expire.
3030

3131
## Supported scenarios
32+
> [!NOTE]
33+
> Azure AD-issued tokens might not be used for federated identity flows.
3234
3335
The following scenarios are supported for accessing Azure AD protected resources using workload identity federation:
3436

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 241 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,247 @@ The What's new in Azure Active Directory? release notes provide information abou
3131
---
3232

3333

34+
## October 2021
35+
36+
### Limits on the number of configured API permissions for an application registration will be enforced starting in October 2021
37+
38+
**Type:** Plan for change
39+
**Service category:** Other
40+
**Product capability:** Developer Experience
41+
42+
Sometimes, application developers configure their apps to require more permissions than it's possible to grant. To prevent this from happening, a limit on the total number of required permissions that can be configured for an app registration will be enforced.
43+
44+
The total number of required permissions for any single application registration mustn't exceed 400 permissions, across all APIs. The change to enforce this limit will begin rolling out mid-October 2021. Applications exceeding the limit can't increase the number of permissions they’re configured for. The existing limit on the number of distinct APIs for which permissions are required remains unchanged and may not exceed 50 APIs.
45+
46+
In the Azure portal, the required permissions are listed under API permissions for the application you wish to configure. Using Microsoft Graph or Microsoft Graph PowerShell, the required permissions are listed in the requiredResourceAccess property of an [application](/graph/api/resources/application) entity. [Learn more](../enterprise-users/directory-service-limits-restrictions.md).
47+
48+
---
49+
50+
### Email one-time passcode on by default change beginning rollout in November 2021
51+
52+
**Type:** Plan for change
53+
**Service category:** B2B
54+
**Product capability:** B2B/B2C
55+
56+
Previously, we announced that starting October 31, 2021, Microsoft Azure Active Directory [email one-time passcode](../external-identities/one-time-passcode.md) authentication will become the default method for inviting accounts and tenants for B2B collaboration scenarios. However, because of deployment schedules, we'll begin rolling out on November 1, 2021. Most of the tenants will see the change rolled out in January 2022 to minimize disruptions during the holidays and deployment lock downs. After this change, Microsoft will no longer allow redemption of invitations using Azure Active Directory accounts that are unmanaged. [Learn more](../external-identities/one-time-passcode.md#frequently-asked-questions).
57+
58+
---
59+
60+
### Conditional Access Guest Access Blocking Screen
61+
62+
**Type:** Fixed
63+
**Service category:** Conditional Access
64+
**Product capability:** End User Experiences
65+
66+
If there's no trust relation between a home and resource tenant, a guest user would have previously been asked to re-register their device, which would break the previous registration. However, the user would end up in a registration loop because only home tenant device registration is supported. In this specific scenario, instead of this loop, we’ve created a new conditional access blocking page. The page tells the end user that they can't get access to conditional access protected resources as a guest user. [Learn more](../external-identities/b2b-quickstart-add-guest-users-portal.md#prerequisites).
67+
68+
---
69+
70+
### 50105 Errors will now result in a UX error message instead of an error response to the application
71+
72+
**Type:** Fixed
73+
**Service category:** Authentications (Logins)
74+
**Product capability:** Developer Experience
75+
76+
Azure AD has fixed a bug in an error response that occurs when a user isn't assigned to an app that requires a user assignment. Previously, Azure AD would return error 50105 with the OIDC error code "interaction_required" even during interactive authentication. This would cause well-coded applications to loop indefinitely, as they do interactive authentication and receive an error telling them to do interactive authentication, which they would then do.
77+
78+
The bug has been fixed, so that during non-interactive auth an "interaction_required" error will still be returned. Also, during interactive authentication an error page will be directly displayed to the user.
79+
80+
For greater details, see the change notices for [Azure AD protocols](../develop/reference-breaking-changes.md#error-50105-has-been-fixed-to-not-return-interaction_required-during-interactive-authentication).
81+
82+
---
83+
84+
### Public preview - New claims transformation capabilities
85+
86+
**Type:** New feature
87+
**Service category:** Enterprise Apps
88+
**Product capability:** SSO
89+
90+
The following new capabilities have been added to the claims transformations available for manipulating claims in tokens issued from Azure AD:
91+
92+
- Join() on NameID. Used to be restricted to joining an email format address with a verified domain. Now Join() can be used on the NameID claim in the same way as any other claim, so NameID transforms can be used to create Windows account style NameIDs or any other string. For now if the result is an email address, the Azure AD will still validate that the domain is one that is verified in the tenant.
93+
- Substring(). A new transformation in the claims configuration UI allows extraction of defined position substrings such as five characters starting at character three - substring(3,5)
94+
- Claims transformations. These transformations can now be performed on Multi-valued attributes, and can emit multi-valued claims. Microsoft Graph can now be used to read/write multi-valued directory schema extension attributes. [Learn more](../develop/active-directory-saml-claims-customization.md).
95+
96+
---
97+
98+
### Public Preview – Flagged Sign-ins
99+
100+
**Type:** New feature
101+
**Service category:** Reporting
102+
**Product capability:** Monitoring & Reporting
103+
104+
Flagged sign-ins is a feature that will increase the signal to noise ratio for user sign-ins where users need help. The functionality is intended to empower users to raise awareness about sign-in errors they want help with. Also to help admins and help desk workers find the right sign-in events quickly and efficiently. [Learn more](../reports-monitoring/overview-flagged-sign-ins.md).
105+
106+
---
107+
108+
### Public preview - Device overview
109+
110+
**Type:** New feature
111+
**Service category:** Device Registration and Management
112+
**Product capability:** Device Lifecycle Management
113+
114+
The new Device Overview feature provides actionable insights about devices in your tenant. [Learn more](../devices/device-management-azure-portal.md).
115+
116+
---
117+
118+
### Public preview - Azure Active Directory workload identity federation
119+
120+
**Type:** New feature
121+
**Service category:** Enterprise Apps
122+
**Product capability:** Developer Experience
123+
124+
Azure AD workload identity federation is a new capability that's in public preview. It frees developers from handling application secrets or certificates. This includes secrets in scenarios such as using GitHub Actions and building applications on Kubernetes. Rather than creating an application secret and using that to get tokens for that application, developers can instead use tokens provided by the respective platforms such as GitHub and Kubernetes without having to manage any secrets manually.[Learn more](../develop/workload-identity-federation.md).
125+
126+
---
127+
128+
### Public Preview - Updates to Sign-in Diagnostic
129+
130+
**Type:** Changed feature
131+
**Service category:** Reporting
132+
**Product capability:** Monitoring & Reporting
133+
134+
With this update, the diagnostic covers more scenarios and is made more easily available to admins.
135+
136+
New scenarios covered when using the Sign-in Diagnostic:
137+
- Pass Through Authentication sign-in failures
138+
- Seamless Single-Sign On sign-in failures
139+
140+
Other changes include:
141+
- Flagged Sign-ins will automatically appear for investigation when using the Sign-in Diagnostic from Diagnose and Solve.
142+
- Sign-in Diagnostic is now available from the Enterprise Apps Diagnose and Solve blade.
143+
- The Sign-in Diagnostic is now available in the Basic Info tab of the Sign-in Log event view for all sign-in events. [Learn more](../reports-monitoring/concept-sign-in-diagnostics-scenarios.md#supported-scenarios).
144+
145+
---
146+
147+
### General Availability - Privileged Role Administrators can now create Azure AD access reviews on role-assignable groups
148+
149+
**Type:** Fixed
150+
**Service category:** Access Reviews
151+
**Product capability:** Identity Governance
152+
153+
Privileged Role Administrators can now create Azure AD access reviews on Azure AD role-assignable groups, in addition to Azure AD roles. [Learn more](../governance/deploy-access-reviews.md#who-will-create-and-manage-access-reviews).
154+
155+
---
156+
157+
### General Availability - Azure AD single Sign on and device-based Conditional Access support in Firefox on Windows 10/11
158+
159+
**Type:** New feature
160+
**Service category:** Authentications (Logins)
161+
**Product capability:** SSO
162+
163+
We now support native single sign-on (SSO) support and device-based Conditional Access to Firefox browser on Windows 10 and Windows Server 2019 starting in Firefox version 91. [Learn more](../conditional-access/require-managed-devices.md#prerequisites).
164+
165+
---
166+
167+
### General Availability - New app indicator in My Apps
168+
169+
**Type:** New feature
170+
**Service category:** My Apps
171+
**Product capability:** End User Experiences
172+
173+
Apps that have been recently assigned to the user show up with a "new" indicator. When the app is launched or the page is refreshed, this indicator disappears. [Learn more](/azure/active-directory/user-help/my-apps-portal-end-user-access).
174+
175+
---
176+
177+
### General availability - Custom domain support in Azure AD B2C
178+
179+
**Type:** New feature
180+
**Service category:** B2C - Consumer Identity Management
181+
**Product capability:** B2B/B2C
182+
183+
Azure AD B2C customers can now enable custom domains so their end-users are redirected to a custom URL domain for authentication. This is done via integration with Azure Front Door's custom domains capability. [Learn more](../../active-directory-b2c/custom-domain.md?pivots=b2c-user-flow).
184+
185+
---
186+
187+
### General availability - Edge Administrator built-in role
188+
189+
**Type:** New feature
190+
**Service category:** RBAC
191+
**Product capability:** Access Control
192+
193+
194+
Users in this role can create and manage the enterprise site list required for Internet Explorer mode on Microsoft Edge. This role grants permissions to create, edit, and publish the site list and additionally allows access to manage support tickets. [Learn more](/deployedge/edge-ie-mode-cloud-site-list-mgmt)
195+
196+
---
197+
198+
### General availability - Windows 365 Administrator built-in role
199+
200+
**Type:** New feature
201+
**Service category:** RBAC
202+
**Product capability:** Access Control
203+
204+
Users with this role have global permissions on Windows 365 resources, when the service is present. Additionally, this role contains the ability to manage users and devices to associate a policy, and create and manage groups. [Learn more](../roles/permissions-reference.md)
205+
206+
---
207+
208+
### New Federated Apps available in Azure AD Application gallery - October 2021
209+
210+
**Type:** New feature
211+
**Service category:** Enterprise Apps
212+
**Product capability:** 3rd Party Integration
213+
214+
In October 2021 we've added the following 10 new applications in our App gallery with Federation support:
215+
216+
[Adaptive Shield](../saas-apps/adaptive-shield-tutorial.md), [SocialChorus Search](https://socialchorus.com/), [Hiretual-SSO](../saas-apps/hiretual-tutorial.md), [TeamSticker by Communitio](../saas-apps/teamsticker-by-communitio-tutorial.md), [embed signage](../saas-apps/embed-signage-tutorial.md), [JoinedUp](../saas-apps/joinedup-tutorial.md), [VECOS Releezme Locker management system](../saas-apps/vecos-releezme-locker-management-system-tutorial.md), [Altoura](../saas-apps/altoura-tutorial.md), [Dagster Cloud](../saas-apps/dagster-cloud-tutorial.md), [Qualaroo](../saas-apps/qualaroo-tutorial.md)
217+
218+
You can also find the documentation of all the applications here: https://aka.ms/AppsTutorial
219+
220+
For listing your application in the Azure AD app gallery, read the following article: https://aka.ms/AzureADAppRequest
221+
222+
---
223+
224+
### Continuous Access Evaluation migration with Conditional Access
225+
226+
**Type:** Changed feature
227+
**Service category:** Conditional Access
228+
**Product capability:** User Authentication
229+
230+
A new user experience is available for our CAE tenants. Tenants will now access CAE as part of Conditional Access. Any tenants that were previously using CAE for some (but not all) user accounts under the old UX or had previously disabled the old CAE UX will now be required to undergo a one time migration experience.[Learn more](../conditional-access/concept-continuous-access-evaluation.md#migration).
231+
232+
---
233+
234+
### Improved group list blade
235+
236+
**Type:** Changed feature
237+
**Service category:** Group Management
238+
**Product capability:** Directory
239+
240+
The new group list blade offers more sort and filtering capabilities, infinite scrolling, and better performance. [Learn more](../enterprise-users/groups-members-owners-search.md).
241+
242+
---
243+
244+
### General availability - Google deprecation of Gmail sign-in support on embedded webviews on September 30, 2021
245+
246+
**Type:** Changed feature
247+
**Service category:** B2B
248+
**Product capability:** B2B/B2C
249+
250+
Google has deprecated Gmail sign-ins on Microsoft Teams mobile and custom apps that run Gmail authentications on embedded webviews on Sept. 30th, 2021.
251+
252+
If you would like to request an extension, impacted customers with affected OAuth client ID(s) should have received an email from Google Developers with the following information regarding a one-time policy enforcement extension, which must be completed by Jan 31, 2022.
253+
254+
To continue allowing your Gmail users to sign in and redeem, we strongly recommend that you refer to [Embedded vs System Web](../develop/msal-net-web-browsers.md#embedded-vs-system-web-ui) UI in the MSAL.NET documentation and modify your apps to use the system browser for sign-in. All MSAL SDKs use the system web-view by default.
255+
256+
As a workaround, we are deploying the device login flow by October 8. Between today and until then, it is likely that it may not be rolled out to all regions yet (in which case, end-users will be met with an error screen until it gets deployed to your region.)
257+
258+
For more details on the device login flow and details on requesting extension to Google, see [Add Google as an identity provider for B2B guest users](../external-identities/google-federation.md#deprecation-of-web-view-sign-in-support).
259+
260+
---
261+
262+
### Identity Governance Administrator can create and manage Azure AD access reviews of groups and applications
263+
264+
**Type:** Changed feature
265+
**Service category:** Access Reviews
266+
**Product capability:** Identity Governance
267+
268+
Identity Governance Administrator can create and manage Azure AD access reviews of groups and applications. [Learn more](../governance/deploy-access-reviews.md#who-will-create-and-manage-access-reviews).
269+
270+
---
271+
272+
273+
274+
34275
## September 2021
35276

36277
### Limits on the number of configured API permissions for an application registration will be enforced starting in October 2021

0 commit comments

Comments
 (0)