Skip to content

Commit b0230a6

Browse files
Merge pull request #225882 from OWinfreyATL/owinfreyATL-Fundamental-July
July moved partial->3
2 parents 6ed477e + b09ee68 commit b0230a6

File tree

1 file changed

+0
-65
lines changed

1 file changed

+0
-65
lines changed

articles/active-directory/fundamentals/whats-new.md

Lines changed: 0 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -1111,69 +1111,4 @@ For listing your application in the Azure AD app gallery, please read the detail
11111111
Pick a group of up to five members and provision them into your third-party applications in seconds. Get started testing, troubleshooting, and provisioning to non-Microsoft applications such as ServiceNow, ZScaler, and Adobe. For more information, see: [On-demand provisioning in Azure Active Directory](../app-provisioning/provision-on-demand.md).
11121112

11131113

1114-
---
1115-
1116-
1117-
### General Availability – Protect against by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD
1118-
1119-
**Type:** New feature
1120-
**Service category:** MS Graph
1121-
**Product capability:** Identity Security & Protection
1122-
1123-
1124-
We're delighted to announce a new security protection that prevents bypassing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD. When enabled for a federated domain in your Azure AD tenant, it ensures that a compromised federated account can't bypass Azure AD Multi-Factor Authentication by imitating that a multi factor authentication has already been performed by the identity provider. The protection can be enabled via new security setting, [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values&preserve-view=true).
1125-
1126-
1127-
We highly recommend enabling this new protection when using Azure AD Multi-Factor Authentication as your multi factor authentication for your federated users. To learn more about the protection and how to enable it, visit [Enable protection to prevent by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD](/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#enable-protection-to-prevent-by-passing-of-cloud-azure-ad-multi-factor-authentication-when-federated-with-azure-ad).
1128-
1129-
1130-
---
1131-
1132-
1133-
### Public preview - New provisioning connectors in the Azure AD Application Gallery - July 2022
1134-
1135-
**Type:** New feature
1136-
**Service category:** App Provisioning
1137-
**Product capability:** 3rd Party Integration
1138-
1139-
1140-
You can now automate creating, updating, and deleting user accounts for these newly integrated apps:
1141-
1142-
- [Tableau Cloud](../saas-apps/tableau-online-provisioning-tutorial.md)
1143-
1144-
For more information about how to better secure your organization by using automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
1145-
1146-
1147-
---
1148-
1149-
1150-
### General Availability - Tenant-based service outage notifications
1151-
1152-
**Type:** New feature
1153-
**Service category:** Other
1154-
**Product capability:** Platform
1155-
1156-
1157-
Azure Service Health supports service outage notifications to Tenant Admins for Azure Active Directory issues. These outages will also appear on the Azure AD Admin Portal Overview page with appropriate links to Azure Service Health. Outage events will be able to be seen by built-in Tenant Administrator Roles. We'll continue to send outage notifications to subscriptions within a tenant for transition. More information is available at: [What are Service Health notifications in Azure Active Directory?](../reports-monitoring/overview-service-health-notifications.md).
1158-
1159-
1160-
1161-
---
1162-
1163-
1164-
1165-
### Public Preview - Multiple Passwordless Phone sign-in Accounts for iOS devices
1166-
1167-
**Type:** New feature
1168-
**Service category:** Authentications (Logins)
1169-
**Product capability:** User Authentication
1170-
1171-
1172-
End users can now enable passwordless phone sign-in for multiple accounts in the Authenticator App on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device. The Azure AD accounts can be in either the same, or different, tenants. Guest accounts aren't supported for multiple account sign-ins from one device.
1173-
1174-
1175-
Note that end users are encouraged to enable the optional telemetry setting in the Authenticator App, if not done so already. For more information, see: [Enable passwordless sign-in with Microsoft Authenticator](../authentication/howto-authentication-passwordless-phone.md)
1176-
1177-
1178-
11791114
---

0 commit comments

Comments
 (0)