You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
-65Lines changed: 0 additions & 65 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1111,69 +1111,4 @@ For listing your application in the Azure AD app gallery, please read the detail
1111
1111
Pick a group of up to five members and provision them into your third-party applications in seconds. Get started testing, troubleshooting, and provisioning to non-Microsoft applications such as ServiceNow, ZScaler, and Adobe. For more information, see: [On-demand provisioning in Azure Active Directory](../app-provisioning/provision-on-demand.md).
1112
1112
1113
1113
1114
-
---
1115
-
1116
-
1117
-
### General Availability – Protect against by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD
We're delighted to announce a new security protection that prevents bypassing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD. When enabled for a federated domain in your Azure AD tenant, it ensures that a compromised federated account can't bypass Azure AD Multi-Factor Authentication by imitating that a multi factor authentication has already been performed by the identity provider. The protection can be enabled via new security setting, [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values&preserve-view=true).
1125
-
1126
-
1127
-
We highly recommend enabling this new protection when using Azure AD Multi-Factor Authentication as your multi factor authentication for your federated users. To learn more about the protection and how to enable it, visit [Enable protection to prevent by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD](/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#enable-protection-to-prevent-by-passing-of-cloud-azure-ad-multi-factor-authentication-when-federated-with-azure-ad).
1128
-
1129
-
1130
-
---
1131
-
1132
-
1133
-
### Public preview - New provisioning connectors in the Azure AD Application Gallery - July 2022
1134
-
1135
-
**Type:** New feature
1136
-
**Service category:** App Provisioning
1137
-
**Product capability:** 3rd Party Integration
1138
-
1139
-
1140
-
You can now automate creating, updating, and deleting user accounts for these newly integrated apps:
For more information about how to better secure your organization by using automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
1145
-
1146
-
1147
-
---
1148
-
1149
-
1150
-
### General Availability - Tenant-based service outage notifications
1151
-
1152
-
**Type:** New feature
1153
-
**Service category:** Other
1154
-
**Product capability:** Platform
1155
-
1156
-
1157
-
Azure Service Health supports service outage notifications to Tenant Admins for Azure Active Directory issues. These outages will also appear on the Azure AD Admin Portal Overview page with appropriate links to Azure Service Health. Outage events will be able to be seen by built-in Tenant Administrator Roles. We'll continue to send outage notifications to subscriptions within a tenant for transition. More information is available at: [What are Service Health notifications in Azure Active Directory?](../reports-monitoring/overview-service-health-notifications.md).
1158
-
1159
-
1160
-
1161
-
---
1162
-
1163
-
1164
-
1165
-
### Public Preview - Multiple Passwordless Phone sign-in Accounts for iOS devices
1166
-
1167
-
**Type:** New feature
1168
-
**Service category:** Authentications (Logins)
1169
-
**Product capability:** User Authentication
1170
-
1171
-
1172
-
End users can now enable passwordless phone sign-in for multiple accounts in the Authenticator App on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device. The Azure AD accounts can be in either the same, or different, tenants. Guest accounts aren't supported for multiple account sign-ins from one device.
1173
-
1174
-
1175
-
Note that end users are encouraged to enable the optional telemetry setting in the Authenticator App, if not done so already. For more information, see: [Enable passwordless sign-in with Microsoft Authenticator](../authentication/howto-authentication-passwordless-phone.md)
0 commit comments