You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-archive.md
-244Lines changed: 0 additions & 244 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6930,248 +6930,4 @@ If you're an existing customer, who activated Azure AD Multi-Factor Authenticati
6930
6930
Starting July 1, 2019, Microsoft stopped offering multifactor authentication (MFA) Server for new deployments. New customers who require multifactor authentication should use cloud-based Azure AD Multi-Factor Authentication. For more information, see [Planning a cloud-based Azure AD Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
6931
6931
6932
6932
---
6933
-
6934
-
## August 2019
6935
-
6936
-
### Enhanced search, filtering, and sorting for groups is available in the Azure portal (Public Preview)
6937
-
6938
-
**Type:** New feature
6939
-
**Service category:** Group Management
6940
-
**Product capability:** Collaboration
6941
-
6942
-
We're pleased to announce public preview availability of the enhanced groups-related experiences in the Azure portal. These enhancements help you better manage groups and member lists, by providing:
6943
-
6944
-
- Advanced search capabilities, such as substring search on groups lists.
6945
-
- Advanced filtering and sorting options on member and owner lists.
6946
-
- New search capabilities for member and owner lists.
6947
-
- More accurate group counts for large groups.
6948
-
6949
-
For more information, see [Manage groups in the Azure portal](./active-directory-groups-members-azure-portal.md?context=azure%2factive-directory%2fusers-groups-roles%2fcontext%2fugr-context).
6950
-
6951
-
---
6952
-
6953
-
### New custom roles are available for app registration management (Public Preview)
6954
-
6955
-
**Type:** New feature
6956
-
**Service category:** Azure AD roles
6957
-
**Product capability:** Access Control
6958
-
6959
-
Custom roles (available with an Azure AD P1 or P2 subscription) can now help provide you with fine-grained access, by letting you create role definitions with specific permissions and then to assign those roles to specific resources. Currently, you create custom roles by using permissions for managing app registrations and then assigning the role to a specific app. For more information about custom roles, see [Custom administrator roles in Azure Active Directory (preview)](../roles/custom-overview.md).
6960
-
6961
-
If you need other permissions or resources supported, which you don't currently see, you can send feedback to our [Azure feedback site](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789) and we'll add your request to our update road map.
6962
-
6963
-
---
6964
-
6965
-
### New provisioning logs can help you monitor and troubleshoot your app provisioning deployment (Public Preview)
New provisioning logs are available to help you monitor and troubleshoot the user and group provisioning deployment. These new log files include information about:
6972
-
6973
-
- What groups were successfully created in [ServiceNow](../saas-apps/servicenow-provisioning-tutorial.md)
6974
-
- What roles were imported from [AWS Single-Account Access](../saas-apps/amazon-web-service-tutorial.md#configure-and-test-azure-ad-sso-for-aws-single-account-access)
6975
-
- What employees weren't imported from [Workday](../saas-apps/workday-inbound-tutorial.md)
6976
-
6977
-
For more information, see [Provisioning reports in the Azure portal (preview)](../reports-monitoring/concept-provisioning-logs.md).
6978
-
6979
-
---
6980
-
6981
-
### New security reports for all Azure AD administrators (General Availability)
By default, all Azure AD administrators will soon be able to access modern security reports within Azure AD. Until the end of September, you'll be able to use the banner at the top of the modern security reports to return to the old reports.
6988
-
6989
-
The modern security reports will provide more capabilities from the older versions, including:
6990
-
6991
-
- Advanced filtering and sorting
6992
-
- Bulk actions, such as dismissing user risk
6993
-
- Confirmation of compromised or safe entities
6994
-
- Risk state, covering: At risk, Dismissed, Remediated, and Confirmed compromised
6995
-
- New risk-related detections (available to Azure AD Premium subscribers)
6996
-
6997
-
For more information, see [Risky users](../identity-protection/howto-identity-protection-investigate-risk.md#risky-users), [Risky sign-ins](../identity-protection/howto-identity-protection-investigate-risk.md#risky-sign-ins), and [Risk detections](../identity-protection/howto-identity-protection-investigate-risk.md#risk-detections).
6998
-
6999
-
---
7000
-
7001
-
### User-assigned managed identity is available for Virtual Machines and Virtual Machine Scale Sets (General Availability)
7002
-
7003
-
**Type:** New feature
7004
-
**Service category:** Managed identities for Azure resources
7005
-
**Product capability:** Developer Experience
7006
-
7007
-
User-assigned managed identities are now generally available for Virtual Machines and Virtual Machine Scale Sets. As part of this, Azure can create an identity in the Azure AD tenant that's trusted by the subscription in use, and can be assigned to one or more Azure service instances. For more information about user-assigned managed identities, see [What is managed identities for Azure resources?](../managed-identities-azure-resources/overview.md).
7008
-
7009
-
---
7010
-
7011
-
### Users can reset their passwords using a mobile app or hardware token (General Availability)
7012
-
7013
-
**Type:** Changed feature
7014
-
**Service category:** Self Service Password Reset
7015
-
**Product capability:** User Authentication
7016
-
7017
-
Users who have registered a mobile app with your organization can now reset their own password by approving a notification from the Microsoft Authenticator app or by entering a code from their mobile app or hardware token.
7018
-
7019
-
For more information, see [How it works: Azure AD self-service password reset](../authentication/concept-sspr-howitworks.md). For more information about the user experience, see [Reset your own work or school password overview](https://support.microsoft.com/account-billing/register-the-password-reset-verification-method-for-a-work-or-school-account-47a55d4a-05b0-4f67-9a63-f39a43dbe20a).
7020
-
7021
-
---
7022
-
7023
-
### ADAL.NET ignores the MSAL.NET shared cache for on-behalf-of scenarios
7024
-
7025
-
**Type:** Fixed
7026
-
**Service category:** Authentications (Logins)
7027
-
**Product capability:** User Authentication
7028
-
7029
-
Starting with Azure AD authentication library (ADAL.NET) version 5.0.0-preview, app developers must [serialize one cache per account for web apps and web APIs](https://github.com/AzureAD/azure-activedirectory-library-for-dotnet/wiki/Token-cache-serialization#custom-token-cache-serialization-in-web-applications--web-api). Otherwise, some scenarios using the [on-behalf-of flow](../develop/scenario-web-api-call-api-app-configuration.md?tabs=java) for Java, along with some specific use cases of `UserAssertion`, may result in an elevation of privilege. To avoid this vulnerability, ADAL.NET now ignores the Microsoft Authentication Library for dotnet (MSAL.NET) shared cache for on-behalf-of scenarios.
7030
-
7031
-
For more information about this issue, see [Azure Active Directory Authentication Library Elevation of Privilege Vulnerability](https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2019-1258).
7032
-
7033
-
---
7034
-
7035
-
### New Federated Apps available in Azure AD App gallery - August 2019
7036
-
7037
-
**Type:** New feature
7038
-
**Service category:** Enterprise Apps
7039
-
**Product capability:** 3rd Party Integration
7040
-
7041
-
In August 2019, we've added these 26 new apps with Federation support to the app gallery:
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
7046
-
7047
-
---
7048
-
7049
-
### New versions of the AzureAD PowerShell and AzureADPreview PowerShell modules are available
7050
-
7051
-
**Type:** Changed feature
7052
-
**Service category:** Other
7053
-
**Product capability:** Directory
7054
-
7055
-
New updates to the AzureAD and AzureAD Preview PowerShell modules are available:
7056
-
7057
-
- A new `-Filter` parameter was added to the `Get-AzureADDirectoryRole` parameter in the AzureAD module. This parameter helps you filter on the directory roles returned by the cmdlet.
7058
-
- New cmdlets were added to the AzureADPreview module, to help define and assign custom roles in Azure AD, including:
7059
-
7060
-
-`Get-AzureADMSRoleAssignment`
7061
-
-`Get-AzureADMSRoleDefinition`
7062
-
-`New-AzureADMSRoleAssignment`
7063
-
-`New-AzureADMSRoleDefinition`
7064
-
-`Remove-AzureADMSRoleAssignment`
7065
-
-`Remove-AzureADMSRoleDefinition`
7066
-
-`Set-AzureADMSRoleDefinition`
7067
-
7068
-
---
7069
-
7070
-
### Improvements to the UI of the dynamic group rule builder in the Azure portal
7071
-
7072
-
**Type:** Changed feature
7073
-
**Service category:** Group Management
7074
-
**Product capability:** Collaboration
7075
-
7076
-
We've made some UI improvements to the dynamic group rule builder, available in the Azure portal, to help you more easily set up a new rule, or change existing rules. This design improvement allows you to create rules with up to five expressions, instead of just one. We've also updated the device property list to remove deprecated device properties.
7077
-
7078
-
For more information, see [Manage dynamic membership rules](../enterprise-users/groups-dynamic-membership.md).
7079
-
7080
-
---
7081
-
7082
-
### New Microsoft Graph app permission available for use with access reviews
7083
-
7084
-
**Type:** Changed feature
7085
-
**Service category:** Access Reviews
7086
-
**Product capability:** Identity Governance
7087
-
7088
-
We've introduced a new Microsoft Graph app permission, `AccessReview.ReadWrite.Membership`, which allows apps to automatically create and retrieve access reviews for group memberships and app assignments. This permission can be used by your scheduled jobs or as part of your automation, without requiring a logged-in user context.
7089
-
7090
-
For more information, see the [Example how to create Azure AD access reviews using Microsoft Graph app permissions with PowerShell blog](https://techcommunity.microsoft.com/t5/Azure-Active-Directory/Example-how-to-create-Azure-AD-access-reviews-using-Microsoft/m-p/807241).
7091
-
7092
-
---
7093
-
7094
-
### Azure AD activity logs are now available for government cloud instances in Azure Monitor
7095
-
7096
-
**Type:** Changed feature
7097
-
**Service category:** Reporting
7098
-
**Product capability:** Monitoring & Reporting
7099
-
7100
-
We're excited to announce that Azure AD activity logs are now available for government cloud instances in Azure Monitor. You can now send Azure AD logs to your storage account or to an event hub to integrate with your SIEM tools, like [Sumologic](../reports-monitoring/howto-integrate-activity-logs-with-sumologic.md), [Splunk](../reports-monitoring/howto-integrate-activity-logs-with-splunk.md), and [ArcSight](../reports-monitoring/howto-integrate-activity-logs-with-arcsight.md).
7101
-
7102
-
For more information about setting up Azure Monitor, see [Azure AD activity logs in Azure Monitor](../reports-monitoring/concept-activity-logs-azure-monitor.md#cost-considerations).
7103
-
7104
-
---
7105
-
7106
-
### Update your users to the new, enhanced security info experience
7107
-
7108
-
**Type:** Changed feature
7109
-
**Service category:** Authentications (Logins)
7110
-
**Product capability:** User Authentication
7111
-
7112
-
On September 25, 2019, we'll be turning off the old, non-enhanced security info experience for registering and managing user security info and only turning on the new, [enhanced version](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Cool-enhancements-to-the-Azure-AD-combined-MFA-and-password/ba-p/354271). This means that your users will no longer be able to use the old experience.
7113
-
7114
-
For more information about the enhanced security info experience, see our [admin documentation](../authentication/concept-registration-mfa-sspr-combined.md) and our [user documentation](https://support.microsoft.com/account-billing/set-up-your-security-info-from-a-sign-in-prompt-28180870-c256-4ebf-8bd7-5335571bf9a8).
7115
-
7116
-
#### To turn on this new experience, you must:
7117
-
7118
-
1. Sign in to the Azure portal as a Global Administrator or User Administrator.
7119
-
7120
-
2. Go to **Azure Active Directory > User settings > Manage settings for access panel preview features**.
7121
-
7122
-
3. In the **Users can use preview features for registering and managing security info - enhanced** area, select **Selected**, and then either choose a group of users or choose **All** to turn on this feature for all users in the tenant.
7123
-
7124
-
4. In the **Users can use preview features for registering and managing security **info**** area, select **None**.
7125
-
7126
-
5. Save your settings.
7127
-
7128
-
After you save your settings, you'll no longer have access to the old security info experience.
7129
-
7130
-
>[!Important]
7131
-
>If you don't complete these steps before September 25, 2019, your Azure Active Directory tenant will be automatically enabled for the enhanced experience. If you have questions, please contact us at [email protected].
7132
-
7133
-
---
7134
-
7135
-
### Authentication requests using POST logins will be more strictly validated
7136
-
7137
-
**Type:** Changed feature
7138
-
**Service category:** Authentications (Logins)
7139
-
**Product capability:** Standards
7140
-
7141
-
Starting on September 2, 2019, authentication requests using the POST method will be more strictly validated against the HTTP standards. Specifically, spaces and double-quotes (") will no longer be removed from request form values. These changes aren't expected to break any existing clients, and will help to make sure that requests sent to Azure AD are reliably handled every time.
7142
-
7143
-
For more information, see the [Azure AD breaking changes notices](../develop/reference-breaking-changes.md#post-form-semantics-will-be-enforced-more-strictly---spaces-and-quotes-will-be-ignored).
0 commit comments