You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
-53Lines changed: 0 additions & 53 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1176,57 +1176,4 @@ Note that end users are encouraged to enable the optional telemetry setting in t
1176
1176
1177
1177
1178
1178
1179
-
---
1180
-
1181
-
1182
-
1183
-
### Public Preview - Azure AD Domain Services - Fine Grain Permissions
1184
-
1185
-
**Type:** Changed feature
1186
-
**Service category:** Azure AD Domain Services
1187
-
**Product capability:** Azure AD Domain Services
1188
-
1189
-
1190
-
1191
-
Previously to set up and administer your AAD-DS instance you needed top level permissions of Azure Contributor and Azure AD Global Administrator. Now for both initial creation, and ongoing administration, you can utilize more fine grain permissions for enhanced security and control. The prerequisites now minimally require:
1192
-
1193
-
- You need [Application Administrator](../roles/permissions-reference.md#application-administrator) and [Groups Administrator](../roles/permissions-reference.md#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
1194
-
- You need [Domain Services Contributor](../../role-based-access-control/built-in-roles.md#domain-services-contributor) Azure role to create the required Azure AD DS resources.
1195
-
1196
-
1197
-
Check out these resources to learn more:
1198
-
1199
-
-[Tutorial - Create an Azure Active Directory Domain Services managed domain | Microsoft Docs](../../active-directory-domain-services/tutorial-create-instance.md#prerequisites)
1200
-
-[Least privileged roles by task - Azure Active Directory | Microsoft Docs](../roles/delegate-by-task.md#domain-services)
1201
-
-[Azure built-in roles - Azure RBAC | Microsoft Docs](../../role-based-access-control/built-in-roles.md#domain-services-contributor)
1202
-
1203
-
1204
-
1205
-
---
1206
-
1207
-
1208
-
### General Availability- Azure AD Connect update release with new functionality and bug fixes
A new Azure AD Connect release fixes several bugs and includes new functionality. This release is also available for auto upgrade for eligible servers. For more information, see: [Azure AD Connect: Version release history](../hybrid/reference-connect-version-history.md#21150).
1217
-
1218
-
---
1219
-
1220
-
1221
-
### General Availability - Cross-tenant access settings for B2B collaboration
1222
-
1223
-
**Type:** Changed feature
1224
-
**Service category:** B2B
1225
-
**Product capability:** B2B/B2C
1226
-
1227
-
1228
-
1229
-
Cross-tenant access settings enable you to control how users in your organization collaborate with members of external Azure AD organizations. Now you’ll have granular inbound and outbound access control settings that work on a per org, user, group, and application basis. These settings also make it possible for you to trust security claims from external Azure AD organizations like multi-factor authentication (MFA), device compliance, and hybrid Azure AD joined devices. For more information, see: [Cross-tenant access with Azure AD External Identities](../external-identities/cross-tenant-access-overview.md).
0 commit comments