You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-authentication-oath-tokens.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ Programmable OATH TOTP hardware tokens that can be reseeded can also be set up w
42
42
43
43
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
44
44
45
-

45
+
:::image type="content" border="true" source="./media/concept-authentication-methods/oath-tokens.png" alt-text="Screenshot of OATH token management." lightbox="./media/concept-authentication-methods/oath-tokens.png":::
46
46
47
47
Once tokens are acquired they must be uploaded in a comma-separated values (CSV) file format including the UPN, serial number, secret key, time interval, manufacturer, and model, as shown in the following example:
> Make sure you include the header row in your CSV file.
56
56
57
-
Once properly formatted as a CSV file, a global administrator can then sign in to the Azure portal, navigate to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the resulting CSV file.
57
+
Once properly formatted as a CSV file, a Global Administrator can then sign in to the Azure portal, navigate to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the resulting CSV file.
58
58
59
59
Depending on the size of the CSV file, it may take a few minutes to process. Select the **Refresh** button to get the current status. If there are any errors in the file, you can download a CSV file that lists any errors for you to resolve. The field names in the downloaded CSV file are different than the uploaded version.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-sovereign-clouds-archive.md
+42Lines changed: 42 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,48 @@ The primary [What's new in sovereign clouds release notes](whats-new-sovereign-c
21
21
---
22
22
23
23
24
+
## October 2022
25
+
26
+
### General Availability - Azure AD certificate-based authentication
27
+
28
+
**Type:** New feature
29
+
**Service category:** Other
30
+
**Product capability:** User Authentication
31
+
32
+
33
+
Azure AD certificate-based authentication (CBA) enables customers to allow or require users to authenticate with X.509 certificates against their Azure Active Directory (Azure AD) for applications and browser sign-in. This feature enables customers to adopt a phishing resistant authentication and authenticate with an X.509 certificate against their Enterprise Public Key Infrastructure (PKI). For more information, see: [Overview of Azure AD certificate-based authentication (Preview)](../authentication/concept-certificate-based-authentication.md).
34
+
35
+
---
36
+
37
+
### General Availability - Audited BitLocker Recovery
BitLocker keys are sensitive security items. Audited BitLocker recovery ensures that when BitLocker keys are read, an audit log is generated so that you can trace who accesses this information for given devices. For more information, see: [View or copy BitLocker keys](../devices/device-management-azure-portal.md#view-or-copy-bitlocker-keys).
45
+
46
+
---
47
+
48
+
### General Availability - More device properties supported for Dynamic Device groups
49
+
50
+
**Type:** Changed feature
51
+
**Service category:** Group Management
52
+
**Product capability:** Directory
53
+
54
+
55
+
You can now create or update dynamic device groups using the following properties:
56
+
57
+
- deviceManagementAppId
58
+
- deviceTrustType
59
+
- extensionAttribute1-15
60
+
- profileType
61
+
62
+
For more information on how to use this feature, see: [Dynamic membership rule for device groups](../enterprise-users/groups-dynamic-membership.md#rules-for-devices)
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-sovereign-clouds.md
+70-47Lines changed: 70 additions & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,72 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
21
21
22
22
This page updates monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Sovereign Clouds](whats-new-archive.md).
23
23
24
+
## April 2023
25
+
26
+
### General Availability - Azure Active Directory Domain Services: Trusts for User Forests
27
+
28
+
**Type:** New feature
29
+
**Service category:** Azure Active Directory Domain Services
30
+
**Product capability:** Azure Active Directory Domain Services
31
+
32
+
You can now create trusts on both user and resource forests. On-premises Active Directory DS users can't authenticate to resources in the Azure Active Directory DS resource forest until you create an outbound trust to your on-premises Active Directory DS. An outbound trust requires network connectivity to your on-premises virtual network to which you have installed Azure AD Domain Service. On a user forest, trusts can be created for on-premises Active Directory forests that aren't synchronized to Azure Active Directory DS.
33
+
34
+
For more information, see: [How trust relationships work for forests in Active Directory](/azure/active-directory-domain-services/concepts-forest-trust).
35
+
36
+
---
37
+
38
+
### General Availability - Azure AD SCIM Validator Tool
39
+
40
+
**Type:** New feature
41
+
**Service category:** Provisioning
42
+
**Product capability:** Developer Experience
43
+
44
+
Azure Active Directory SCIM validator will enable you to test your server for compatibility with the Azure Active Directory SCIM client. For more information, see: [Tutorial: Validate a SCIM endpoint](../app-provisioning/scim-validator-tutorial.md).
45
+
46
+
---
47
+
48
+
### General Availability - Enablement of combined security information registration for MFA and self-service password reset (SSPR)
Last year we announced the combined registration user experience for MFA and self-service password reset (SSPR) was rolling out as the default experience for all organizations. We're happy to announce that the combined security information registration experience is now fully rolled out. This change doesn't affect tenants located in the China region. For more information, see: [Combined security information registration for Azure Active Directory overview](../authentication/concept-registration-mfa-sspr-combined.md).
55
+
56
+
---
57
+
58
+
### General Availability - Devices settings Self-Help Capability for Pending Devices
59
+
60
+
**Type:** New feature
61
+
**Service category:** Device Registration and Management
62
+
**Product capability:** End User Experiences
63
+
64
+
In the **All Devices** settings under the Registered column, you can now select any pending devices you have, and it opens a context pane to help troubleshoot why a device may be pending. You can also offer feedback on if the summarized information is helpful or not. For more information, see [Pending devices in Azure Active Directory](/troubleshoot/azure/active-directory/pending-devices).
65
+
66
+
---
67
+
68
+
### General availability - Consolidated App launcher (My Apps) settings and new preview settings
69
+
70
+
**Type:** New feature
71
+
**Service category:** My Apps
72
+
**Product capability:** End User Experiences
73
+
74
+
We have consolidated relevant app launcher settings in a new App launchers section in the Azure and Entra portals. The entry point can be found under Enterprise applications, where Collections used to be. You can find the Collections option by selecting App launchers. In addition, we've added a new App launchers Settings option. This option has some settings you may already be familiar with like the Microsoft 365 settings. The new Settings options also have controls for previews. As an admin, you can choose to try out new app launcher features while they are in preview. Enabling a preview feature means that the feature turns on for your organization. This enabled feature reflects in the My Apps portal, and other app launchers for all of your users. To learn more about the preview settings, see: [End-user experiences for applications](../manage-apps/end-user-experiences.md).
75
+
76
+
77
+
---
78
+
79
+
### General Availability - RBAC: Delegated app registration management using custom roles
80
+
81
+
**Type:** New feature
82
+
**Service category:** RBAC
83
+
**Product capability:** Access Control
84
+
85
+
Custom roles give you fine-grained control over what access your admins have. This release of custom roles includes the ability to delegate management of app registrations and enterprise apps. For more information, see: [Overview of role-based access control in Azure Active Directory](../roles/custom-overview.md).
86
+
87
+
---
88
+
89
+
24
90
## March 2023
25
91
26
92
### General Availability - Provisioning Insights Workbook
@@ -98,7 +164,7 @@ For more information, see: [Protect user accounts from attacks with Azure Active
98
164
**Service category:** Enterprise Apps
99
165
**Product capability:** SSO
100
166
101
-
Filter and transform group names in token claims configuration using regular expression. Many application configurations on ADFS and other IdPs rely on the ability to create authorization claims based on the content of Group Names using regular expression functions in the claim rules. Azure AD now has the capability to use a regular expression match and replace function to create claim content based on Group **onpremisesSAMAccount** names. This functionality will allow those applications to be moved to Azure AD for authentication using the same group management patterns. For more information, see: [Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
167
+
Filter and transform group names in token claims configuration using regular expression. Many application configurations on ADFS and other IdPs rely on the ability to create authorization claims based on the content of Group Names using regular expression functions in the claim rules. Azure AD now has the capability to use a regular expression match and replace function to create claim content based on Group **onpremisesSAMAccount** names. This functionality allows those applications to be moved to Azure AD for authentication using the same group management patterns. For more information, see: [Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
102
168
103
169
---
104
170
@@ -108,7 +174,7 @@ Filter and transform group names in token claims configuration using regular exp
108
174
**Service category:** Enterprise Apps
109
175
**Product capability:** SSO
110
176
111
-
Azure AD now has the capability to filter the groups included in the token using substring match on the display name or **onPremisesSAMAccountName** attributes of the group object. Only Groups the user is a member of will be included in the token. This was a blocker for some of our customers to migrate their apps from ADFS to Azure AD. This feature will unblock those challenges.
177
+
Azure AD now has the capability to filter the groups included in the token using substring match on the display name or **onPremisesSAMAccountName** attributes of the group object. Only Groups the user is a member of will be included in the token. This was a blocker for some of our customers to migrate their apps from ADFS to Azure AD. This feature unblocks those challenges.
Post-authentication anomalous activity detection for workload identities. This detection focuses specifically on detection of post authenticated anomalous behavior performed by a workload identity (service principal). Post-authentication behavior will be assessed for anomalies based on an action and/or sequence of actions occurring for the account. Based on the scoring of anomalies identified, the offline detection may score the account as low, medium, or high risk. The risk allocation from the offline detection will be available within the Risky workload identities reporting blade. A new detection type identified as Anomalous service principal activity will appear in filter options. For more information, see: [Securing workload identities](../identity-protection/concept-workload-identity-risk.md).
203
+
Post-authentication anomalous activity detection for workload identities. This detection focuses specifically on detection of post authenticated anomalous behavior performed by a workload identity (service principal). Post-authentication behavior is assessed for anomalies based on an action and/or sequence of actions occurring for the account. Based on the scoring of anomalies identified, the offline detection may score the account as low, medium, or high risk. The risk allocation from the offline detection will be available within the Risky workload identities reporting blade. A new detection type identified as Anomalous service principal activity appears in filter options. For more information, see: [Securing workload identities](../identity-protection/concept-workload-identity-risk.md).
138
204
139
205
---
140
206
@@ -308,7 +374,7 @@ Azure AD Connect Cloud Sync Password writeback now provides customers the abilit
308
374
309
375
310
376
311
-
Accidental deletion of users in any system could be disastrous. We’re excited to announce the general availability of the accidental deletions prevention capability as part of the Azure AD provisioning service. When the number of deletions to be processed in a single provisioning cycle spikes above a customer defined threshold, the Azure AD provisioning service will pause, provide you with visibility into the potential deletions, and allow you to accept or reject the deletions. This functionality has historically been available for Azure AD Connect, and Azure AD Connect Cloud Sync. It's now available across the various provisioning flows, including both HR-driven provisioning and application provisioning.
377
+
Accidental deletion of users in any system could be disastrous. We’re excited to announce the general availability of the accidental deletions prevention capability as part of the Azure AD provisioning service. When the number of deletions to be processed in a single provisioning cycle spikes above a customer defined threshold, the Azure AD provisioning service pauses, provide you with visibility into the potential deletions, and allow you to accept or reject the deletions. This functionality has historically been available for Azure AD Connect, and Azure AD Connect Cloud Sync. It's now available across the various provisioning flows, including both HR-driven provisioning and application provisioning.
312
378
313
379
For more information, see: [Enable accidental deletions prevention in the Azure AD provisioning service](../app-provisioning/accidental-deletions.md)
314
380
@@ -364,49 +430,6 @@ For more information, see: [How to use additional context in Microsoft Authentic
364
430
365
431
---
366
432
367
-
368
-
## October 2022
369
-
370
-
### General Availability - Azure AD certificate-based authentication
371
-
372
-
**Type:** New feature
373
-
**Service category:** Other
374
-
**Product capability:** User Authentication
375
-
376
-
377
-
Azure AD certificate-based authentication (CBA) enables customers to allow or require users to authenticate with X.509 certificates against their Azure Active Directory (Azure AD) for applications and browser sign-in. This feature enables customers to adopt a phishing resistant authentication and authenticate with an X.509 certificate against their Enterprise Public Key Infrastructure (PKI). For more information, see: [Overview of Azure AD certificate-based authentication (Preview)](../authentication/concept-certificate-based-authentication.md).
378
-
379
-
---
380
-
381
-
### General Availability - Audited BitLocker Recovery
BitLocker keys are sensitive security items. Audited BitLocker recovery ensures that when BitLocker keys are read, an audit log is generated so that you can trace who accesses this information for given devices. For more information, see: [View or copy BitLocker keys](../devices/device-management-azure-portal.md#view-or-copy-bitlocker-keys).
389
-
390
-
---
391
-
392
-
### General Availability - More device properties supported for Dynamic Device groups
393
-
394
-
**Type:** Changed feature
395
-
**Service category:** Group Management
396
-
**Product capability:** Directory
397
-
398
-
399
-
You can now create or update dynamic device groups using the following properties:
400
-
401
-
- deviceManagementAppId
402
-
- deviceTrustType
403
-
- extensionAttribute1-15
404
-
- profileType
405
-
406
-
For more information on how to use this feature, see: [Dynamic membership rule for device groups](../enterprise-users/groups-dynamic-membership.md#rules-for-devices)
407
-
408
-
---
409
-
410
433
## Next steps
411
434
<!-- Add a context sentence for the following links -->
412
435
-[What's new in Azure Active Directory?](whats-new.md)
@@ -63,6 +63,9 @@ The following section describes, in-depth, how password hash synchronization wor
63
63
> [!NOTE]
64
64
> The original MD4 hash is not transmitted to Azure AD. Instead, the SHA256 hash of the original MD4 hash is transmitted. As a result, if the hash stored in Azure AD is obtained, it cannot be used in an on-premises pass-the-hash attack.
65
65
66
+
> [!NOTE]
67
+
> The password hash value is **NEVER** stored in SQL. These values are only processed in memory prior to being sent to Azure AD.
68
+
66
69
### Security considerations
67
70
68
71
When synchronizing passwords, the plain-text version of your password is not exposed to the password hash synchronization feature, to Azure AD, or any of the associated services.
0 commit comments