Skip to content

Commit 9f95cb0

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into erloc
2 parents 05da7e0 + 61b74b8 commit 9f95cb0

File tree

3 files changed

+29
-176
lines changed

3 files changed

+29
-176
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 0 additions & 157 deletions
Original file line numberDiff line numberDiff line change
@@ -7814,162 +7814,5 @@ For more information about setting up and managing your devices and apps using C
78147814

78157815
---
78167816

7817-
## March 2019
78187817

7819-
### Identity Experience Framework and custom policy support in Azure Active Directory B2C is now available (GA)
78207818

7821-
**Type:** New feature
7822-
**Service category:** B2C - Consumer Identity Management
7823-
**Product capability:** B2B/B2C
7824-
7825-
You can now create custom policies in Azure AD B2C, including the following tasks, which are supported at-scale and under our Azure SLA:
7826-
7827-
- Create and upload custom authentication user journeys by using custom policies.
7828-
7829-
- Describe user journeys step-by-step as exchanges between claims providers.
7830-
7831-
- Define conditional branching in user journeys.
7832-
7833-
- Transform and map claims for use in real-time decisions and communications.
7834-
7835-
- Use REST API-enabled services in your custom authentication user journeys. For example, with email providers, CRMs, and proprietary authorization systems.
7836-
7837-
- Federate with identity providers who are compliant with the OpenIDConnect protocol. For example, with multi-tenant Azure AD, social account providers, or two-factor verification providers.
7838-
7839-
For more information about creating custom policies, see [Developer notes for custom policies in Azure Active Directory B2C](../../active-directory-b2c/custom-policy-developer-notes.md) and read [Alex Simon's blog post, including case studies](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-B2C-custom-policies-to-build-your-own-identity-journeys/ba-p/382791).
7840-
7841-
---
7842-
7843-
### New Federated Apps available in Azure AD app gallery - March 2019
7844-
7845-
**Type:** New feature
7846-
**Service category:** Enterprise Apps
7847-
**Product capability:** 3rd Party Integration
7848-
7849-
In March 2019, we've added these 14 new apps with Federation support to the app gallery:
7850-
7851-
[ISEC7 Mobile Exchange Delegate](https://www.isec7.com/english/), [MediusFlow](https://office365.cloudapp.mediusflow.com/), [ePlatform](../saas-apps/eplatform-tutorial.md), [Fulcrum](../saas-apps/fulcrum-tutorial.md), [ExcelityGlobal](../saas-apps/excelityglobal-tutorial.md), [Explanation-Based Auditing System](../saas-apps/explanation-based-auditing-system-tutorial.md), [Lean](../saas-apps/lean-tutorial.md), [Powerschool Performance Matters](../saas-apps/powerschool-performance-matters-tutorial.md), [Cinode](https://cinode.com/), [Iris Intranet](../saas-apps/iris-intranet-tutorial.md), [Empactis](../saas-apps/empactis-tutorial.md), [SmartDraw](../saas-apps/smartdraw-tutorial.md), [Confirmit Horizons](../saas-apps/confirmit-horizons-tutorial.md), [TAS](../saas-apps/tas-tutorial.md)
7852-
7853-
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
7854-
7855-
---
7856-
7857-
### New Zscaler and Atlassian provisioning connectors in the Azure AD gallery - March 2019
7858-
7859-
**Type:** New feature
7860-
**Service category:** App Provisioning
7861-
**Product capability:** 3rd Party Integration
7862-
7863-
Automate creating, updating, and deleting user accounts for the following apps:
7864-
7865-
[Zscaler](../saas-apps/zscaler-provisioning-tutorial.md), [Zscaler Beta](../saas-apps/zscaler-beta-provisioning-tutorial.md), [Zscaler One](../saas-apps/zscaler-one-provisioning-tutorial.md), [Zscaler Two](../saas-apps/zscaler-two-provisioning-tutorial.md), [Zscaler Three](../saas-apps/zscaler-three-provisioning-tutorial.md), [Zscaler ZSCloud](../saas-apps/zscaler-zscloud-provisioning-tutorial.md), [Atlassian Cloud](../saas-apps/atlassian-cloud-provisioning-tutorial.md)
7866-
7867-
For more information about how to better secure your organization through automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
7868-
7869-
---
7870-
7871-
### Restore and manage your deleted Office 365 groups in the Azure portal
7872-
7873-
**Type:** New feature
7874-
**Service category:** Group Management
7875-
**Product capability:** Collaboration
7876-
7877-
You can now view and manage your deleted Office 365 groups from the Azure portal. This change helps you to see which groups are available to restore, along with letting you permanently delete any groups that aren't needed by your organization.
7878-
7879-
For more information, see [Restore expired or deleted groups](../enterprise-users/groups-restore-deleted.md#view-and-manage-the-deleted-microsoft-365-groups-that-are-available-to-restore).
7880-
7881-
---
7882-
7883-
### Single sign-on is now available for Azure AD SAML-secured on-premises apps through Application Proxy (public preview)
7884-
7885-
**Type:** New feature
7886-
**Service category:** App Proxy
7887-
**Product capability:** Access Control
7888-
7889-
You can now provide a single sign-on (SSO) experience for on-premises, SAML-authenticated apps, along with remote access to these apps through Application Proxy. For more information about how to set up SAML SSO with your on-premises apps, see [SAML single sign-on for on-premises applications with Application Proxy (Preview)](../app-proxy/application-proxy-configure-single-sign-on-on-premises-apps.md).
7890-
7891-
---
7892-
7893-
### Client apps in request loops will be interrupted to improve reliability and user experience
7894-
7895-
**Type:** New feature
7896-
**Service category:** Authentications (Logins)
7897-
**Product capability:** User Authentication
7898-
7899-
Client apps can incorrectly issue hundreds of the same login requests over a short period of time. These requests, whether they're successful or not, all contribute to a poor user experience and heightened workloads for the IDP, increasing latency for all users and reducing the availability of the IDP.
7900-
7901-
This update sends an `invalid_grant` error: `AADSTS50196: The server terminated an operation because it encountered a loop while processing a request` to client apps that issue duplicate requests multiple times over a short period of time, beyond the scope of normal operation. Client apps that encounter this issue should show an interactive prompt, requiring the user to sign in again. For more information about this change and about how to fix your app if it encounters this error, see [What's new for authentication?](../develop/reference-breaking-changes.md#looping-clients-will-be-interrupted).
7902-
7903-
---
7904-
7905-
### New Audit Logs user experience now available
7906-
7907-
**Type:** Changed feature
7908-
**Service category:** Reporting
7909-
**Product capability:** Monitoring & Reporting
7910-
7911-
We've created a new Azure AD **Audit logs** page to help improve both readability and how you search for your information. To see the new **Audit logs** page, select **Audit logs** in the **Activity** section of Azure AD.
7912-
7913-
![New Audit logs page, with sample info](media/whats-new/audit-logs-page.png)
7914-
7915-
For more information about the new **Audit logs** page, see [Audit activity reports in the Azure portal](../reports-monitoring/concept-audit-logs.md).
7916-
7917-
---
7918-
7919-
### New warnings and guidance to help prevent accidental administrator lockout from misconfigured Conditional Access policies
7920-
7921-
**Type:** Changed feature
7922-
**Service category:** Conditional Access
7923-
**Product capability:** Identity Security & Protection
7924-
7925-
To help prevent administrators from accidentally locking themselves out of their own tenants through misconfigured Conditional Access policies, we've created new warnings and updated guidance in the Azure portal. For more information about the new guidance, see [What are service dependencies in Azure Active Directory Conditional Access](../conditional-access/service-dependencies.md).
7926-
7927-
---
7928-
7929-
### Improved end-user terms of use experiences on mobile devices
7930-
7931-
**Type:** Changed feature
7932-
**Service category:** Terms of use
7933-
**Product capability:** Governance
7934-
7935-
We've updated our existing terms of use experiences to help improve how you review and consent to terms of use on a mobile device. You can now zoom in and out, go back, download the information, and select hyperlinks. For more information about the updated terms of use, see [Azure Active Directory terms of use feature](../conditional-access/terms-of-use.md#what-terms-of-use-looks-like-for-users).
7936-
7937-
---
7938-
7939-
### New Azure AD Activity logs download experience available
7940-
7941-
**Type:** Changed feature
7942-
**Service category:** Reporting
7943-
**Product capability:** Monitoring & Reporting
7944-
7945-
You can now download large amounts of activity logs directly from the Azure portal. This update lets you:
7946-
7947-
- Download up to 250,000 rows.
7948-
7949-
- Get notified after the download completes.
7950-
7951-
- Customize your file name.
7952-
7953-
- Determine your output format, either JSON or CSV.
7954-
7955-
For more information about this feature, see [Quickstart: Download an audit report using the Azure portal](../reports-monitoring/howto-download-logs.md)
7956-
7957-
---
7958-
7959-
### Breaking change: Updates to condition evaluation by Exchange ActiveSync (EAS)
7960-
7961-
**Type:** Plan for change
7962-
**Service category:** Conditional Access
7963-
**Product capability:** Access Control
7964-
7965-
We're in the process of updating how Exchange ActiveSync (EAS) evaluates the following conditions:
7966-
7967-
- User location, based on country/region or IP address
7968-
7969-
- Sign-in risk
7970-
7971-
- Device platform
7972-
7973-
If you've previously used these conditions in your Conditional Access policies, be aware that the condition behavior might change. For example, if you previously used the user location condition in a policy, you might find the policy now being skipped based on the location of your user.
7974-
7975-
---

0 commit comments

Comments
 (0)