You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
+128-1Lines changed: 128 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,134 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
32
32
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Azure Active Directory](whats-new-archive.md).
33
33
34
34
35
-
## July 2022
35
+
## August 2022
36
+
37
+
### General Availability - Multi-Stage Access Reviews
38
+
39
+
**Type:** Changed feature
40
+
**Service category:** Access Reviews
41
+
**Product capability:** Identity Governance
42
+
43
+
Customers can now meet their complex audit and recertification requirements through multiple stages of reviews. For more information, see: [Create a multi-stage access review](../governance/create-access-review.md#create-a-multi-stage-access-review).
44
+
45
+
46
+
47
+
---
48
+
49
+
### Public Preview - External user leave settings
50
+
51
+
**Type:** New feature
52
+
**Service category:** Enterprise Apps
53
+
**Product capability:** B2B/B2C
54
+
55
+
Currently, users can self-service leave for an organization without the visibility of their IT administrators. Some organizations may want more control over this self-service process.
56
+
57
+
With this feature, IT administrators can now allow or restrict external identities to leave an organization by Microsoft provided self-service controls via Azure Active Directory in the Microsoft Entra portal. In order to restrict users to leave an organization, customers need to include "Global privacy contact" and "Privacy statement URL" under tenant properties.
58
+
59
+
A new policy API is available for the administrators to control tenant wide policy:
### Public Preview - Restrict self-service BitLocker for devices
72
+
73
+
**Type:** New feature
74
+
**Service category:** Device Registration and Management
75
+
**Product capability:** Access Control
76
+
77
+
In some situations, you may want to restrict the ability for end users to self-service BitLocker keys. With this new functionality, you can now turn off self-service of BitLocker keys, so that only specific individuals with right privileges can recover a BitLocker key.
78
+
79
+
For more information, see: [Block users from viewing their BitLocker keys (preview)](../devices/device-management-azure-portal.md#block-users-from-viewing-their-bitlocker-keys-preview)
80
+
81
+
82
+
---
83
+
84
+
### Public Preview- Identity Protection Alerts in Microsoft 365 Defender
Identity Protection risk detections (alerts) are now also available in Microsoft 365 Defender to provide a unified investigation experience for security professionals. For more information, see: [Investigate alerts in Microsoft 365 Defender](/microsoft-365/security/defender/investigate-alerts?view=o365-worldwide#alert-sources)
91
+
92
+
93
+
94
+
95
+
---
96
+
97
+
### New Federated Apps available in Azure AD Application gallery - August 2022
98
+
99
+
**Type:** New feature
100
+
**Service category:** Enterprise Apps
101
+
**Product capability:** 3rd Party Integration
102
+
103
+
In August 2022, we've added the following 40 new applications in our App gallery with Federation support
For more information about how to better secure your organization by using automated user account provisioning, see: [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
131
+
132
+
133
+
134
+
---
135
+
### General Availability - Workload Identity Federation with App Registrations are available now
136
+
137
+
**Type:** New feature
138
+
**Service category:** Other
139
+
**Product capability:** Developer Experience
140
+
141
+
Entra Workload Identity Federation allows developers to exchange tokens issued by another identity provider with Azure AD tokens, without needing secrets. It eliminates the need to store, and manage, credentials inside the code or secret stores to access Azure AD protected resources such as Azure and Microsoft Graph. By removing the secrets required to access Azure AD protected resources, workload identity federation can improve the security posture of your organization. This feature also reduces the burden of secret management and minimizes the risk of service downtime due to expired credentials.
142
+
143
+
For more information on this capability and supported scenarios, see [Workload identity federation](../develop/workload-identity-federation.md).
144
+
145
+
146
+
---
147
+
148
+
### Public Preview - Entitlement management automatic assignment policies
149
+
150
+
**Type:** Changed feature
151
+
**Service category:** Entitlement Management
152
+
**Product capability:** Identity Governance
153
+
154
+
In Azure AD entitlement management, a new form of access package assignment policy is being added. The automatic assignment policy includes a filter rule, similar to a dynamic group, that specifies the users in the tenant who should have assignments. When users come into scope of matching that filter rule criteria, an assignment is automatically created, and when they no longer match, the assignment is removed.
155
+
156
+
For more information, see: [Configure an automatic assignment policy for an access package in Azure AD entitlement management (Preview)](../governance/entitlement-management-access-package-auto-assignment-policy.md).
157
+
158
+
159
+
160
+
---
161
+
162
+
## July 2022
36
163
37
164
### Public Preview - ADFS to Azure AD: SAML App Multi-Instancing
0 commit comments