Skip to content

Commit d0cf5e2

Browse files
authored
Merge pull request #239148 from MicrosoftDocs/main
5/24 AM Publish
2 parents d0f0871 + 913b3b2 commit d0cf5e2

File tree

64 files changed

+1161
-773
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+1161
-773
lines changed

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Programmable OATH TOTP hardware tokens that can be reseeded can also be set up w
4242

4343
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
4444

45-
![Uploading OATH tokens to the MFA OATH tokens blade](media/concept-authentication-methods/mfa-server-oath-tokens-azure-ad.png)
45+
:::image type="content" border="true" source="./media/concept-authentication-methods/oath-tokens.png" alt-text="Screenshot of OATH token management." lightbox="./media/concept-authentication-methods/oath-tokens.png":::
4646

4747
Once tokens are acquired they must be uploaded in a comma-separated values (CSV) file format including the UPN, serial number, secret key, time interval, manufacturer, and model, as shown in the following example:
4848

@@ -54,7 +54,7 @@ [email protected],1234567,2234567abcdef2234567abcdef,60,Contoso,HardwareKey
5454
> [!NOTE]
5555
> Make sure you include the header row in your CSV file.
5656
57-
Once properly formatted as a CSV file, a global administrator can then sign in to the Azure portal, navigate to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the resulting CSV file.
57+
Once properly formatted as a CSV file, a Global Administrator can then sign in to the Azure portal, navigate to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the resulting CSV file.
5858

5959
Depending on the size of the CSV file, it may take a few minutes to process. Select the **Refresh** button to get the current status. If there are any errors in the file, you can download a CSV file that lists any errors for you to resolve. The field names in the downloaded CSV file are different than the uploaded version.
6060

161 KB
Loading

articles/active-directory/fundamentals/whats-new-sovereign-clouds-archive.md

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,48 @@ The primary [What's new in sovereign clouds release notes](whats-new-sovereign-c
2121
---
2222

2323

24+
## October 2022
25+
26+
### General Availability - Azure AD certificate-based authentication
27+
28+
**Type:** New feature
29+
**Service category:** Other
30+
**Product capability:** User Authentication
31+
32+
33+
Azure AD certificate-based authentication (CBA) enables customers to allow or require users to authenticate with X.509 certificates against their Azure Active Directory (Azure AD) for applications and browser sign-in. This feature enables customers to adopt a phishing resistant authentication and authenticate with an X.509 certificate against their Enterprise Public Key Infrastructure (PKI). For more information, see: [Overview of Azure AD certificate-based authentication (Preview)](../authentication/concept-certificate-based-authentication.md).
34+
35+
---
36+
37+
### General Availability - Audited BitLocker Recovery
38+
39+
**Type:** New feature
40+
**Service category:** Device Access Management
41+
**Product capability:** Device Lifecycle Management
42+
43+
44+
BitLocker keys are sensitive security items. Audited BitLocker recovery ensures that when BitLocker keys are read, an audit log is generated so that you can trace who accesses this information for given devices. For more information, see: [View or copy BitLocker keys](../devices/device-management-azure-portal.md#view-or-copy-bitlocker-keys).
45+
46+
---
47+
48+
### General Availability - More device properties supported for Dynamic Device groups
49+
50+
**Type:** Changed feature
51+
**Service category:** Group Management
52+
**Product capability:** Directory
53+
54+
55+
You can now create or update dynamic device groups using the following properties:
56+
57+
- deviceManagementAppId
58+
- deviceTrustType
59+
- extensionAttribute1-15
60+
- profileType
61+
62+
For more information on how to use this feature, see: [Dynamic membership rule for device groups](../enterprise-users/groups-dynamic-membership.md#rules-for-devices)
63+
64+
---
65+
2466
## September 2022
2567

2668

articles/active-directory/fundamentals/whats-new-sovereign-clouds.md

Lines changed: 70 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,72 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
2121

2222
This page updates monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Sovereign Clouds](whats-new-archive.md).
2323

24+
## April 2023
25+
26+
### General Availability - Azure Active Directory Domain Services: Trusts for User Forests
27+
28+
**Type:** New feature
29+
**Service category:** Azure Active Directory Domain Services
30+
**Product capability:** Azure Active Directory Domain Services
31+
32+
You can now create trusts on both user and resource forests. On-premises Active Directory DS users can't authenticate to resources in the Azure Active Directory DS resource forest until you create an outbound trust to your on-premises Active Directory DS. An outbound trust requires network connectivity to your on-premises virtual network to which you have installed Azure AD Domain Service. On a user forest, trusts can be created for on-premises Active Directory forests that aren't synchronized to Azure Active Directory DS.
33+
34+
For more information, see: [How trust relationships work for forests in Active Directory](/azure/active-directory-domain-services/concepts-forest-trust).
35+
36+
---
37+
38+
### General Availability - Azure AD SCIM Validator Tool
39+
40+
**Type:** New feature
41+
**Service category:** Provisioning
42+
**Product capability:** Developer Experience
43+
44+
Azure Active Directory SCIM validator will enable you to test your server for compatibility with the Azure Active Directory SCIM client. For more information, see: [Tutorial: Validate a SCIM endpoint](../app-provisioning/scim-validator-tutorial.md).
45+
46+
---
47+
48+
### General Availability - Enablement of combined security information registration for MFA and self-service password reset (SSPR)
49+
50+
**Type:** New feature
51+
**Service category:** MFA
52+
**Product capability:** Identity Security & Protection
53+
54+
Last year we announced the combined registration user experience for MFA and self-service password reset (SSPR) was rolling out as the default experience for all organizations. We're happy to announce that the combined security information registration experience is now fully rolled out. This change doesn't affect tenants located in the China region. For more information, see: [Combined security information registration for Azure Active Directory overview](../authentication/concept-registration-mfa-sspr-combined.md).
55+
56+
---
57+
58+
### General Availability - Devices settings Self-Help Capability for Pending Devices
59+
60+
**Type:** New feature
61+
**Service category:** Device Registration and Management
62+
**Product capability:** End User Experiences
63+
64+
In the **All Devices** settings under the Registered column, you can now select any pending devices you have, and it opens a context pane to help troubleshoot why a device may be pending. You can also offer feedback on if the summarized information is helpful or not. For more information, see [Pending devices in Azure Active Directory](/troubleshoot/azure/active-directory/pending-devices).
65+
66+
---
67+
68+
### General availability - Consolidated App launcher (My Apps) settings and new preview settings
69+
70+
**Type:** New feature
71+
**Service category:** My Apps
72+
**Product capability:** End User Experiences
73+
74+
We have consolidated relevant app launcher settings in a new App launchers section in the Azure and Entra portals. The entry point can be found under Enterprise applications, where Collections used to be. You can find the Collections option by selecting App launchers. In addition, we've added a new App launchers Settings option. This option has some settings you may already be familiar with like the Microsoft 365 settings. The new Settings options also have controls for previews. As an admin, you can choose to try out new app launcher features while they are in preview. Enabling a preview feature means that the feature turns on for your organization. This enabled feature reflects in the My Apps portal, and other app launchers for all of your users. To learn more about the preview settings, see: [End-user experiences for applications](../manage-apps/end-user-experiences.md).
75+
76+
77+
---
78+
79+
### General Availability - RBAC: Delegated app registration management using custom roles
80+
81+
**Type:** New feature
82+
**Service category:** RBAC
83+
**Product capability:** Access Control
84+
85+
Custom roles give you fine-grained control over what access your admins have. This release of custom roles includes the ability to delegate management of app registrations and enterprise apps. For more information, see: [Overview of role-based access control in Azure Active Directory](../roles/custom-overview.md).
86+
87+
---
88+
89+
2490
## March 2023
2591

2692
### General Availability - Provisioning Insights Workbook
@@ -98,7 +164,7 @@ For more information, see: [Protect user accounts from attacks with Azure Active
98164
**Service category:** Enterprise Apps
99165
**Product capability:** SSO
100166

101-
Filter and transform group names in token claims configuration using regular expression. Many application configurations on ADFS and other IdPs rely on the ability to create authorization claims based on the content of Group Names using regular expression functions in the claim rules. Azure AD now has the capability to use a regular expression match and replace function to create claim content based on Group **onpremisesSAMAccount** names. This functionality will allow those applications to be moved to Azure AD for authentication using the same group management patterns. For more information, see: [Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
167+
Filter and transform group names in token claims configuration using regular expression. Many application configurations on ADFS and other IdPs rely on the ability to create authorization claims based on the content of Group Names using regular expression functions in the claim rules. Azure AD now has the capability to use a regular expression match and replace function to create claim content based on Group **onpremisesSAMAccount** names. This functionality allows those applications to be moved to Azure AD for authentication using the same group management patterns. For more information, see: [Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
102168

103169
---
104170

@@ -108,7 +174,7 @@ Filter and transform group names in token claims configuration using regular exp
108174
**Service category:** Enterprise Apps
109175
**Product capability:** SSO
110176

111-
Azure AD now has the capability to filter the groups included in the token using substring match on the display name or **onPremisesSAMAccountName** attributes of the group object. Only Groups the user is a member of will be included in the token. This was a blocker for some of our customers to migrate their apps from ADFS to Azure AD. This feature will unblock those challenges.
177+
Azure AD now has the capability to filter the groups included in the token using substring match on the display name or **onPremisesSAMAccountName** attributes of the group object. Only Groups the user is a member of will be included in the token. This was a blocker for some of our customers to migrate their apps from ADFS to Azure AD. This feature unblocks those challenges.
112178

113179
For more information, see:
114180
- [Group Filter](../develop/reference-claims-mapping-policy-type.md#group-filter).
@@ -134,7 +200,7 @@ Azure AD now supports claims transformations on multi-valued attributes and can
134200
**Service category:** Access Reviews
135201
**Product capability:** Identity Security & Protection
136202

137-
Post-authentication anomalous activity detection for workload identities. This detection focuses specifically on detection of post authenticated anomalous behavior performed by a workload identity (service principal). Post-authentication behavior will be assessed for anomalies based on an action and/or sequence of actions occurring for the account. Based on the scoring of anomalies identified, the offline detection may score the account as low, medium, or high risk. The risk allocation from the offline detection will be available within the Risky workload identities reporting blade. A new detection type identified as Anomalous service principal activity will appear in filter options. For more information, see: [Securing workload identities](../identity-protection/concept-workload-identity-risk.md).
203+
Post-authentication anomalous activity detection for workload identities. This detection focuses specifically on detection of post authenticated anomalous behavior performed by a workload identity (service principal). Post-authentication behavior is assessed for anomalies based on an action and/or sequence of actions occurring for the account. Based on the scoring of anomalies identified, the offline detection may score the account as low, medium, or high risk. The risk allocation from the offline detection will be available within the Risky workload identities reporting blade. A new detection type identified as Anomalous service principal activity appears in filter options. For more information, see: [Securing workload identities](../identity-protection/concept-workload-identity-risk.md).
138204

139205
---
140206

@@ -308,7 +374,7 @@ Azure AD Connect Cloud Sync Password writeback now provides customers the abilit
308374

309375

310376

311-
Accidental deletion of users in any system could be disastrous. We’re excited to announce the general availability of the accidental deletions prevention capability as part of the Azure AD provisioning service. When the number of deletions to be processed in a single provisioning cycle spikes above a customer defined threshold, the Azure AD provisioning service will pause, provide you with visibility into the potential deletions, and allow you to accept or reject the deletions. This functionality has historically been available for Azure AD Connect, and Azure AD Connect Cloud Sync. It's now available across the various provisioning flows, including both HR-driven provisioning and application provisioning.
377+
Accidental deletion of users in any system could be disastrous. We’re excited to announce the general availability of the accidental deletions prevention capability as part of the Azure AD provisioning service. When the number of deletions to be processed in a single provisioning cycle spikes above a customer defined threshold, the Azure AD provisioning service pauses, provide you with visibility into the potential deletions, and allow you to accept or reject the deletions. This functionality has historically been available for Azure AD Connect, and Azure AD Connect Cloud Sync. It's now available across the various provisioning flows, including both HR-driven provisioning and application provisioning.
312378

313379
For more information, see: [Enable accidental deletions prevention in the Azure AD provisioning service](../app-provisioning/accidental-deletions.md)
314380

@@ -364,49 +430,6 @@ For more information, see: [How to use additional context in Microsoft Authentic
364430

365431
---
366432

367-
368-
## October 2022
369-
370-
### General Availability - Azure AD certificate-based authentication
371-
372-
**Type:** New feature
373-
**Service category:** Other
374-
**Product capability:** User Authentication
375-
376-
377-
Azure AD certificate-based authentication (CBA) enables customers to allow or require users to authenticate with X.509 certificates against their Azure Active Directory (Azure AD) for applications and browser sign-in. This feature enables customers to adopt a phishing resistant authentication and authenticate with an X.509 certificate against their Enterprise Public Key Infrastructure (PKI). For more information, see: [Overview of Azure AD certificate-based authentication (Preview)](../authentication/concept-certificate-based-authentication.md).
378-
379-
---
380-
381-
### General Availability - Audited BitLocker Recovery
382-
383-
**Type:** New feature
384-
**Service category:** Device Access Management
385-
**Product capability:** Device Lifecycle Management
386-
387-
388-
BitLocker keys are sensitive security items. Audited BitLocker recovery ensures that when BitLocker keys are read, an audit log is generated so that you can trace who accesses this information for given devices. For more information, see: [View or copy BitLocker keys](../devices/device-management-azure-portal.md#view-or-copy-bitlocker-keys).
389-
390-
---
391-
392-
### General Availability - More device properties supported for Dynamic Device groups
393-
394-
**Type:** Changed feature
395-
**Service category:** Group Management
396-
**Product capability:** Directory
397-
398-
399-
You can now create or update dynamic device groups using the following properties:
400-
401-
- deviceManagementAppId
402-
- deviceTrustType
403-
- extensionAttribute1-15
404-
- profileType
405-
406-
For more information on how to use this feature, see: [Dynamic membership rule for device groups](../enterprise-users/groups-dynamic-membership.md#rules-for-devices)
407-
408-
---
409-
410433
## Next steps
411434
<!-- Add a context sentence for the following links -->
412435
- [What's new in Azure Active Directory?](whats-new.md)

articles/active-directory/hybrid/connect/how-to-connect-password-hash-synchronization.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 05f16c3e-9d23-45dc-afca-3d0fa9dbf501
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 01/26/2023
12+
ms.date: 05/18/2023
1313
ms.subservice: hybrid
1414
ms.author: billmath
1515
search.appverid:
@@ -63,6 +63,9 @@ The following section describes, in-depth, how password hash synchronization wor
6363
> [!NOTE]
6464
> The original MD4 hash is not transmitted to Azure AD. Instead, the SHA256 hash of the original MD4 hash is transmitted. As a result, if the hash stored in Azure AD is obtained, it cannot be used in an on-premises pass-the-hash attack.
6565
66+
> [!NOTE]
67+
> The password hash value is **NEVER** stored in SQL. These values are only processed in memory prior to being sent to Azure AD.
68+
6669
### Security considerations
6770

6871
When synchronizing passwords, the plain-text version of your password is not exposed to the password hash synchronization feature, to Azure AD, or any of the associated services.

0 commit comments

Comments
 (0)