You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can now create custom policies in Azure AD B2C, including the following tasks, which are supported at-scale and under our Azure SLA:
7826
-
7827
-
- Create and upload custom authentication user journeys by using custom policies.
7828
-
7829
-
- Describe user journeys step-by-step as exchanges between claims providers.
7830
-
7831
-
- Define conditional branching in user journeys.
7832
-
7833
-
- Transform and map claims for use in real-time decisions and communications.
7834
-
7835
-
- Use REST API-enabled services in your custom authentication user journeys. For example, with email providers, CRMs, and proprietary authorization systems.
7836
-
7837
-
- Federate with identity providers who are compliant with the OpenIDConnect protocol. For example, with multi-tenant Azure AD, social account providers, or two-factor verification providers.
7838
-
7839
-
For more information about creating custom policies, see [Developer notes for custom policies in Azure Active Directory B2C](../../active-directory-b2c/custom-policy-developer-notes.md) and read [Alex Simon's blog post, including case studies](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-B2C-custom-policies-to-build-your-own-identity-journeys/ba-p/382791).
7840
-
7841
-
---
7842
-
7843
-
### New Federated Apps available in Azure AD app gallery - March 2019
7844
-
7845
-
**Type:** New feature
7846
-
**Service category:** Enterprise Apps
7847
-
**Product capability:** 3rd Party Integration
7848
-
7849
-
In March 2019, we've added these 14 new apps with Federation support to the app gallery:
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
7854
-
7855
-
---
7856
-
7857
-
### New Zscaler and Atlassian provisioning connectors in the Azure AD gallery - March 2019
7858
-
7859
-
**Type:** New feature
7860
-
**Service category:** App Provisioning
7861
-
**Product capability:** 3rd Party Integration
7862
-
7863
-
Automate creating, updating, and deleting user accounts for the following apps:
For more information about how to better secure your organization through automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
7868
-
7869
-
---
7870
-
7871
-
### Restore and manage your deleted Office 365 groups in the Azure portal
7872
-
7873
-
**Type:** New feature
7874
-
**Service category:** Group Management
7875
-
**Product capability:** Collaboration
7876
-
7877
-
You can now view and manage your deleted Office 365 groups from the Azure portal. This change helps you to see which groups are available to restore, along with letting you permanently delete any groups that aren't needed by your organization.
7878
-
7879
-
For more information, see [Restore expired or deleted groups](../enterprise-users/groups-restore-deleted.md#view-and-manage-the-deleted-microsoft-365-groups-that-are-available-to-restore).
7880
-
7881
-
---
7882
-
7883
-
### Single sign-on is now available for Azure AD SAML-secured on-premises apps through Application Proxy (public preview)
7884
-
7885
-
**Type:** New feature
7886
-
**Service category:** App Proxy
7887
-
**Product capability:** Access Control
7888
-
7889
-
You can now provide a single sign-on (SSO) experience for on-premises, SAML-authenticated apps, along with remote access to these apps through Application Proxy. For more information about how to set up SAML SSO with your on-premises apps, see [SAML single sign-on for on-premises applications with Application Proxy (Preview)](../app-proxy/application-proxy-configure-single-sign-on-on-premises-apps.md).
7890
-
7891
-
---
7892
-
7893
-
### Client apps in request loops will be interrupted to improve reliability and user experience
7894
-
7895
-
**Type:** New feature
7896
-
**Service category:** Authentications (Logins)
7897
-
**Product capability:** User Authentication
7898
-
7899
-
Client apps can incorrectly issue hundreds of the same login requests over a short period of time. These requests, whether they're successful or not, all contribute to a poor user experience and heightened workloads for the IDP, increasing latency for all users and reducing the availability of the IDP.
7900
-
7901
-
This update sends an `invalid_grant` error: `AADSTS50196: The server terminated an operation because it encountered a loop while processing a request` to client apps that issue duplicate requests multiple times over a short period of time, beyond the scope of normal operation. Client apps that encounter this issue should show an interactive prompt, requiring the user to sign in again. For more information about this change and about how to fix your app if it encounters this error, see [What's new for authentication?](../develop/reference-breaking-changes.md#looping-clients-will-be-interrupted).
7902
-
7903
-
---
7904
-
7905
-
### New Audit Logs user experience now available
7906
-
7907
-
**Type:** Changed feature
7908
-
**Service category:** Reporting
7909
-
**Product capability:** Monitoring & Reporting
7910
-
7911
-
We've created a new Azure AD **Audit logs** page to help improve both readability and how you search for your information. To see the new **Audit logs** page, select **Audit logs** in the **Activity** section of Azure AD.
7912
-
7913
-

7914
-
7915
-
For more information about the new **Audit logs** page, see [Audit activity reports in the Azure portal](../reports-monitoring/concept-audit-logs.md).
7916
-
7917
-
---
7918
-
7919
-
### New warnings and guidance to help prevent accidental administrator lockout from misconfigured Conditional Access policies
To help prevent administrators from accidentally locking themselves out of their own tenants through misconfigured Conditional Access policies, we've created new warnings and updated guidance in the Azure portal. For more information about the new guidance, see [What are service dependencies in Azure Active Directory Conditional Access](../conditional-access/service-dependencies.md).
7926
-
7927
-
---
7928
-
7929
-
### Improved end-user terms of use experiences on mobile devices
7930
-
7931
-
**Type:** Changed feature
7932
-
**Service category:** Terms of use
7933
-
**Product capability:** Governance
7934
-
7935
-
We've updated our existing terms of use experiences to help improve how you review and consent to terms of use on a mobile device. You can now zoom in and out, go back, download the information, and select hyperlinks. For more information about the updated terms of use, see [Azure Active Directory terms of use feature](../conditional-access/terms-of-use.md#what-terms-of-use-looks-like-for-users).
7936
-
7937
-
---
7938
-
7939
-
### New Azure AD Activity logs download experience available
7940
-
7941
-
**Type:** Changed feature
7942
-
**Service category:** Reporting
7943
-
**Product capability:** Monitoring & Reporting
7944
-
7945
-
You can now download large amounts of activity logs directly from the Azure portal. This update lets you:
7946
-
7947
-
- Download up to 250,000 rows.
7948
-
7949
-
- Get notified after the download completes.
7950
-
7951
-
- Customize your file name.
7952
-
7953
-
- Determine your output format, either JSON or CSV.
7954
-
7955
-
For more information about this feature, see [Quickstart: Download an audit report using the Azure portal](../reports-monitoring/howto-download-logs.md)
7956
-
7957
-
---
7958
-
7959
-
### Breaking change: Updates to condition evaluation by Exchange ActiveSync (EAS)
7960
-
7961
-
**Type:** Plan for change
7962
-
**Service category:** Conditional Access
7963
-
**Product capability:** Access Control
7964
-
7965
-
We're in the process of updating how Exchange ActiveSync (EAS) evaluates the following conditions:
7966
-
7967
-
- User location, based on country/region or IP address
7968
-
7969
-
- Sign-in risk
7970
-
7971
-
- Device platform
7972
-
7973
-
If you've previously used these conditions in your Conditional Access policies, be aware that the condition behavior might change. For example, if you previously used the user location condition in a policy, you might find the policy now being skipped based on the location of your user.
0 commit comments