Skip to content

Commit dc99153

Browse files
Merge pull request #113160 from msmimart/mm-whatsnew-april
What's New in Azure AD - April 2020
2 parents 1277f6f + deb9b3d commit dc99153

File tree

2 files changed

+571
-212
lines changed

2 files changed

+571
-212
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 210 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: fundamentals
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/25/2020
12+
ms.date: 04/30/2020
1313
ms.author: mimart
1414
ms.reviewer: dhanyahk
1515
ms.custom: "it-pro, seo-update-azuread-jan"
@@ -30,6 +30,214 @@ The What's new in Azure Active Directory? release notes provide information abou
3030

3131
---
3232

33+
## October 2019
34+
35+
### Deprecation of the identityRiskEvent API for Azure AD Identity Protection risk detections
36+
37+
**Type:** Plan for change
38+
**Service category:** Identity Protection
39+
**Product capability:** Identity Security & Protection
40+
41+
In response to developer feedback, Azure AD Premium P2 subscribers can now perform complex queries on Azure AD Identity Protection's risk detection data by using the new riskDetection API for Microsoft Graph. The existing [identityRiskEvent](https://docs.microsoft.com/graph/api/resources/identityriskevent?view=graph-rest-beta) API beta version will stop returning data around **January 10, 2020**. If your organization is using the identityRiskEvent API, you should transition to the new riskDetection API.
42+
43+
For more information about the new riskDetection API, see the [Risk detection API reference documentation](https://aka.ms/RiskDetectionsAPI).
44+
45+
---
46+
47+
### Application Proxy support for the SameSite Attribute and Chrome 80
48+
49+
**Type:** Plan for change
50+
**Service category:** App Proxy
51+
**Product capability:** Access Control
52+
53+
A couple of weeks prior to the Chrome 80 browser release, we plan to update how Application Proxy cookies treat the **SameSite** attribute. With the release of Chrome 80, any cookie that doesn't specify the **SameSite** attribute will be treated as though it was set to `SameSite=Lax`.
54+
55+
To help avoid potentially negative impacts due to this change, we're updating Application Proxy access and session cookies by:
56+
57+
- Setting the default value for the **Use Secure Cookie** setting to **Yes**.
58+
59+
- Setting the default value for the **SameSite** attribute to **None**.
60+
61+
>[!NOTE]
62+
> Application Proxy access cookies have always been transmitted exclusively over secure channels. These changes only apply to session cookies.
63+
64+
For more information about the Application Proxy cookie settings, see [Cookie settings for accessing on-premises applications in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-configure-cookie-settings).
65+
66+
---
67+
68+
### App registrations (legacy) and converged app management from the Application Registration Portal (apps.dev.microsoft.com) will no longer be available
69+
70+
**Type:** Plan for change
71+
**Service category:** N/A
72+
**Product capability:** Developer Experience
73+
74+
In the near future, users with Azure AD accounts will no longer be able to register and manage converged applications using the Application Registration Portal (apps.dev.microsoft.com), or register and manage applications in the App registrations (legacy) experience in the Azure portal.
75+
76+
To learn more about the new App registrations experience, see the [App registrations in the Azure portal training guide](../develop/app-registrations-training-guide-for-app-registrations-legacy-users.md).
77+
78+
---
79+
80+
### Users are no longer required to re-register during migration from per-user MFA to Conditional Access-based MFA
81+
82+
**Type:** Fixed
83+
**Service category:** MFA
84+
**Product capability:** Identity Security & Protection
85+
86+
We've fixed a known issue whereby when users were required to re-register if they were disabled for per-user Multi-Factor Authentication (MFA) and then enabled for MFA through a Conditional Access policy.
87+
88+
To require users to re-register, you can select the **Required re-register MFA** option from the user's authentication methods in the Azure AD portal. For more information about migrating users from per-user MFA to Conditional Access-based MFA, see [Convert users from per-user MFA to Conditional Access based MFA](https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-getstarted#convert-users-from-per-user-mfa-to-conditional-access-based-mfa).
89+
90+
---
91+
92+
### New capabilities to transform and send claims in your SAML token
93+
94+
**Type:** New feature
95+
**Service category:** Enterprise Apps
96+
**Product capability:** SSO
97+
98+
We've added additional capabilities to help you to customize and send claims in your SAML token. These new capabilities include:
99+
100+
- Additional claims transformation functions, helping you to modify the value you send in the claim.
101+
102+
- Ability to apply multiple transformations to a single claim.
103+
104+
- Ability to specify the claim source, based on the user type and the group to which the user belongs.
105+
106+
For detailed information about these new capabilities, including how to use them, see [Customize claims issued in the SAML token for enterprise applications](https://docs.microsoft.com/azure/active-directory/develop/active-directory-saml-claims-customization).
107+
108+
---
109+
110+
### New My Sign-ins page for end users in Azure AD
111+
112+
**Type:** New feature
113+
**Service category:** Authentications (Logins)
114+
**Product capability:** Monitoring & Reporting
115+
116+
We've added a new **My Sign-ins** page (https://mysignins.microsoft.com) to let your organization's users view their recent sign-in history to check for any unusual activity. This new page allows your users to see:
117+
118+
- If anyone is attempting to guess their password.
119+
120+
- If an attacker successfully signed in to their account and from what location.
121+
122+
- What apps the attacker tried to access.
123+
124+
For more information, see the [Users can now check their sign-in history for unusual activity](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Users-can-now-check-their-sign-in-history-for-unusual-activity/ba-p/916066) blog.
125+
126+
---
127+
128+
### Migration of Azure AD Domain Services (Azure AD DS) from classic to Azure Resource Manager virtual networks
129+
130+
**Type:** New feature
131+
**Service category:** Azure AD Domain Services
132+
**Product capability:** Azure AD Domain Services
133+
134+
To our customers who have been stuck on classic virtual networks -- we have great news for you! You can now perform a one-time migration from a classic virtual network to an existing Resource Manager virtual network. After moving to the Resource Manager virtual network, you'll be able to take advantage of the additional and upgraded features such as, fine-grained password policies, email notifications, and audit logs.
135+
136+
For more information, see [Preview - Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager](https://docs.microsoft.com/azure/active-directory-domain-services/migrate-from-classic-vnet).
137+
138+
---
139+
140+
### Updates to the Azure AD B2C page contract layout
141+
142+
**Type:** New feature
143+
**Service category:** B2C - Consumer Identity Management
144+
**Product capability:** B2B/B2C
145+
146+
We've introduced some new changes to version 1.2.0 of the page contract for Azure AD B2C. In this updated version, you can now control the load order for your elements, which can also help to stop the flicker that happens when the style sheet (CSS) is loaded.
147+
148+
For a full list of the changes made to the page contract, see the [Version change log](https://docs.microsoft.com/azure/active-directory-b2c/page-layout#120).
149+
150+
---
151+
152+
### Update to the My Apps page along with new workspaces (Public preview)
153+
154+
**Type:** New feature
155+
**Service category:** My Apps
156+
**Product capability:** Access Control
157+
158+
You can now customize the way your organization's users view and access the brand-new My Apps experience, including using the new workspaces feature to make it easier for them to find apps. The new workspaces functionality acts as a filter for the apps your organization's users already have access to.
159+
160+
For more information on rolling out the new My Apps experience and creating workspaces, see [Create workspaces on the My Apps (preview) portal](https://docs.microsoft.com/azure/active-directory/manage-apps/access-panel-workspaces).
161+
162+
---
163+
164+
### Support for the monthly active user-based billing model (General availability)
165+
166+
**Type:** New feature
167+
**Service category:** B2C - Consumer Identity Management
168+
**Product capability:** B2B/B2C
169+
170+
Azure AD B2C now supports monthly active users (MAU) billing. MAU billing is based on the number of unique users with authentication activity during a calendar month. Existing customers can switch to this new billing method at any time.
171+
172+
Starting on November 1, 2019, all new customers will automatically be billed using this method. This billing method benefits customers through cost benefits and the ability to plan ahead.
173+
174+
For more information, see [Upgrade to monthly active users billing model](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-how-to-enable-billing#upgrade-to-monthly-active-users-billing-model).
175+
176+
---
177+
178+
### New Federated Apps available in Azure AD App gallery - October 2019
179+
180+
**Type:** New feature
181+
**Service category:** Enterprise Apps
182+
**Product capability:** 3rd Party Integration
183+
184+
In October 2019, we've added these 35 new apps with Federation support to the app gallery:
185+
186+
[In Case of Crisis – Mobile](https://docs.microsoft.com/azure/active-directory/saas-apps/in-case-of-crisis-mobile-tutorial), [Juno Journey](https://docs.microsoft.com/azure/active-directory/saas-apps/juno-journey-tutorial), [ExponentHR](https://docs.microsoft.com/azure/active-directory/saas-apps/exponenthr-tutorial), [Tact](https://tact.ai/assistant/), [OpusCapita Cash Management](http://cm1.opuscapita.com/tenantname), [Salestim](https://prd.salestim.io/forms), [Learnster](https://docs.microsoft.com/azure/active-directory/saas-apps/learnster-tutorial), [Dynatrace](https://docs.microsoft.com/azure/active-directory/saas-apps/dynatrace-tutorial), [HunchBuzz](https://login.hunchbuzz.com/integrations/azure/process), [Freshworks](https://docs.microsoft.com/azure/active-directory/saas-apps/freshworks-tutorial), [eCornell](https://docs.microsoft.com/azure/active-directory/saas-apps/ecornell-tutorial), [ShipHazmat](https://docs.microsoft.com/azure/active-directory/saas-apps/shiphazmat-tutorial), [Netskope Cloud Security](https://docs.microsoft.com/azure/active-directory/saas-apps/netskope-cloud-security-tutorial), [Contentful](https://docs.microsoft.com/azure/active-directory/saas-apps/contentful-tutorial), [Bindtuning](https://bindtuning.com/login), [HireVue Coordinate – Europe](https://www.hirevue.com/), [HireVue Coordinate - USOnly](https://www.hirevue.com/), [HireVue Coordinate - US](https://www.hirevue.com/), [WittyParrot Knowledge Box](https://wittyapi.wittyparrot.com/wittyparrot/api/provision/trail/signup), [Cloudmore](https://docs.microsoft.com/azure/active-directory/saas-apps/cloudmore-tutorial), [Visit.org](https://docs.microsoft.com/azure/active-directory/saas-apps/visitorg-tutorial), [Cambium Xirrus EasyPass Portal](https://login.xirrus.com/azure-signup), [Paylocity](https://docs.microsoft.com/azure/active-directory/saas-apps/paylocity-tutorial), [Mail Luck!](https://docs.microsoft.com/azure/active-directory/saas-apps/mail-luck-tutorial), [Teamie](https://theteamie.com/), [Velocity for Teams](https://velocity.peakup.org/teams/login), [SIGNL4](https://account.signl4.com/manage), [EAB Navigate IMPL](https://docs.microsoft.com/azure/active-directory/saas-apps/eab-navigate-impl-tutorial), [ScreenMeet](https://console.screenmeet.com/), [Omega Point](https://pi.ompnt.com/), [Speaking Email for Intune (iPhone)](https://speaking.email/FAQ/98/email-access-via-microsoft-intune), [Speaking Email for Office 365 Direct (iPhone/Android)](https://speaking.email/FAQ/126/email-access-via-microsoft-office-365-direct), [ExactCare SSO](https://docs.microsoft.com/azure/active-directory/saas-apps/exactcare-sso-tutorial), [iHealthHome Care Navigation System](https://ihealthnav.com/account/signin), [Qubie](https://qubie.azurewebsites.net/static/adminTab/authorize.html)
187+
188+
For more information about the apps, see [SaaS application integration with Azure Active Directory](https://aka.ms/appstutorial). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](https://aka.ms/azureadapprequest).
189+
190+
---
191+
192+
### Consolidated Security menu item in the Azure AD portal
193+
194+
**Type:** Changed feature
195+
**Service category:** Identity Protection
196+
**Product capability:** Identity Security & Protection
197+
198+
You can now access all of the available Azure AD security features from the new **Security** menu item, and from the **Search** bar, in the Azure portal. Additionally, the new **Security** landing page, called **Security - Getting started**, will provide links to our public documentation, security guidance, and deployment guides.
199+
200+
The new **Security** menu includes:
201+
202+
- Conditional Access
203+
- Identity Protection
204+
- Security Center
205+
- Identity Secure Score
206+
- Authentication methods
207+
- MFA
208+
- Risk reports - Risky users, Risky sign-ins, Risk detections
209+
- And more...
210+
211+
For more information, see [Security - Getting started](https://portal.azure.com/#blade/Microsoft_AAD_IAM/SecurityMenuBlade/GettingStarted).
212+
213+
---
214+
215+
### Office 365 groups expiration policy enhanced with autorenewal
216+
217+
**Type:** Changed feature
218+
**Service category:** Group Management
219+
**Product capability:** Identity Lifecycle Management
220+
221+
The Office 365 groups expiration policy has been enhanced to automatically renew groups that are actively in use by its members. Groups will be autorenewed based on user activity across all the Office 365 apps, including Outlook, SharePoint, and Teams.
222+
223+
This enhancement helps to reduce your group expiration notifications and helps to make sure that active groups continue to be available. If you already have an active expiration policy for your Office 365 groups, you don't need to do anything to turn on this new functionality.
224+
225+
For more information, see [Configure the expiration policy for Office 365 groups](https://docs.microsoft.com/azure/active-directory/users-groups-roles/groups-lifecycle).
226+
227+
---
228+
229+
### Updated Azure AD Domain Services (Azure AD DS) creation experience
230+
231+
**Type:** Changed feature
232+
**Service category:** Azure AD Domain Services
233+
**Product capability:** Azure AD Domain Services
234+
235+
We've updated Azure AD Domain Services (Azure AD DS) to include a new and improved creation experience, helping you to create a managed domain in just three clicks! In addition, you can now upload and deploy Azure AD DS from a template.
236+
237+
For more information, see [Tutorial: Create and configure an Azure Active Directory Domain Services instance](https://docs.microsoft.com/azure/active-directory-domain-services/tutorial-create-instance).
238+
239+
---
240+
33241
## September 2019
34242

35243
### Plan for change: Deprecation of the Power BI content packs
@@ -2677,7 +2885,7 @@ For more information, see [Grant B2B users in Azure AD access to your on-premise
26772885
**Service category:** Other
26782886
**Product capability:** 3rd Party Integration
26792887

2680-
If an application that is listed in the [Azure marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/category/azure-active-directory-apps?page=1) supports SAML based single sign-on, clicking **Get it now** provides you with the integration tutorial associated with that application.
2888+
If an application that is listed in the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/category/azure-active-directory-apps?page=1) supports SAML based single sign-on, clicking **Get it now** provides you with the integration tutorial associated with that application.
26812889

26822890
---
26832891

0 commit comments

Comments
 (0)