You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For more information about how to better secure your organization by using automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
47
+
48
+
49
+
---
50
+
51
+
52
+
### Public Preview - Roles are being assigned outside of Privileged Identity Management
Customers can be alerted on assignments made outside PIM either directly on the Azure portal or also via email. For the current public preview, the assignments are being tracked at the subscription level. For more information, see [Configure security alerts for Azure roles in Privileged Identity Management](../privileged-identity-management/pim-resource-roles-configure-alerts.md#alerts).
59
+
60
+
---
61
+
62
+
63
+
### General Availability - Temporary Access Pass is now available
64
+
65
+
**Type:** New feature
66
+
**Service category:** MFA
67
+
**Product capability:** User Authentication
68
+
69
+
70
+
71
+
Temporary Access Pass (TAP) is now generally available. TAP can be used to securely register password-less methods such as Phone Sign-in, phishing resistant methods such as FIDO2, and even help Windows onboarding (AADJ and WHFB). TAP also makes recovery easier when a user has lost or forgotten their strong authentication methods and needs to sign in to register new authentication methods. For more information, see: [Configure Temporary Access Pass in Azure AD to register Passwordless authentication methods](../authentication/howto-authentication-temporary-access-pass.md).
72
+
73
+
74
+
---
75
+
76
+
77
+
78
+
### Public Preview of Dynamic Group support for MemberOf
79
+
80
+
**Type:** New feature
81
+
**Service category:** Group Management
82
+
**Product capability:** Directory
83
+
84
+
85
+
86
+
Create "nested" groups with Azure AD Dynamic Groups! This feature enables you to build dynamic Azure AD Security Groups and Microsoft 365 groups based on other groups! For example, you can now create Dynamic-Group-A with members of Group-X and Group-Y. For more information, see: [Steps to create a memberOf dynamic group](../enterprise-users/groups-dynamic-rule-member-of.md#steps-to-create-a-memberof-dynamic-group).
87
+
88
+
89
+
---
90
+
91
+
92
+
93
+
### New Federated Apps available in Azure AD Application gallery - June 2022
94
+
95
+
**Type:** New feature
96
+
**Service category:** Enterprise Apps
97
+
**Product capability:** 3rd Party Integration
98
+
99
+
100
+
101
+
In June 2022 we've added the following 22 new applications in our App gallery with Federation support:
We're delighted to announce a new security protection that prevents bypassing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD. When enabled for a federated domain in your Azure AD tenant, it ensures that a compromised federated account can't bypass Azure AD Multi-Factor Authentication by imitating that a multi factor authentication has already been performed by the identity provider. The protection can be enabled via new security setting, [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-1.0#federatedidpmfabehavior-values&preserve-view=true).
126
+
127
+
We highly recommend enabling this new protection when using Azure AD Multi-Factor Authentication as your multi factor authentication for your federated users. To learn more about the protection and how to enable it, visit [Enable protection to prevent by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD](/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#enable-protection-to-prevent-by-passing-of-cloud-azure-ad-multi-factor-authentication-when-federated-with-azure-ad).
128
+
129
+
130
+
---
131
+
132
+
133
+
134
+
### Public Preview - New Azure AD Portal All Users list and User Profile UI
135
+
136
+
**Type:** Changed feature
137
+
**Service category:** User Management
138
+
**Product capability:** User Management
139
+
140
+
141
+
We're enhancing the All Users list and User Profile in the Azure AD Portal to make it easier to find and manage your users. Improvements include:
142
+
143
+
144
+
All Users List:
145
+
- Infinite scrolling (yes, no 'Load more')
146
+
- More user properties can be added as columns and filtered on
147
+
- Columns can be reordered via drag and drop
148
+
- Default columns shown and their order can be managed via the column picker
149
+
- The ability to copy and share the current view
150
+
151
+
152
+
User Profile:
153
+
- A new Overview page that surfaces insights (that is, group memberships, account enabled, MFA capable, risky user, etc.)
154
+
- A new monitoring tab
155
+
- More user properties can be viewed and edited in the properties tab
156
+
157
+
For more information, see: [User management enhancements in Azure Active Directory](../enterprise-users/users-search-enhanced.md).
158
+
159
+
---
160
+
161
+
162
+
163
+
### General Availability - More device properties supported for Dynamic Device groups
164
+
165
+
**Type:** Changed feature
166
+
**Service category:** Group Management
167
+
**Product capability:** Directory
168
+
169
+
170
+
171
+
You can now create or update dynamic device groups using the following properties:
172
+
- deviceManagementAppId
173
+
- deviceTrustType
174
+
- extensionAttribute1-15
175
+
- profileType
176
+
177
+
For more information on how to use this feature, see: [Dynamic membership rule for device groups](../enterprise-users/groups-dynamic-membership.md#rules-for-devices).
178
+
179
+
180
+
---
181
+
182
+
183
+
184
+
185
+
32
186
## May 2022
33
187
34
188
### General Availability: Tenant-based service outage notifications
Copy file name to clipboardExpand all lines: articles/active-directory/governance/identity-governance-applications-deploy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.workload: identity
11
11
ms.tgt_pltfrm: na
12
12
ms.topic: conceptual
13
13
ms.subservice: compliance
14
-
ms.date: 6/28/2022
14
+
ms.date: 12/19/2022
15
15
ms.author: amsliu
16
16
ms.reviewer: markwahl-msft
17
17
ms.collection: M365-identity-device-management
@@ -57,7 +57,7 @@ Azure AD, in conjunction with Azure Monitor, provides several reports to help yo
57
57
58
58
* An administrator, or a catalog owner, can [retrieve the list of users who have access package assignments](entitlement-management-access-package-assignments.md), via the Azure portal, Graph or PowerShell.
59
59
* You can also send the audit logs to Azure Monitor and view a history of [changes to the access package](entitlement-management-logs-and-reporting.md#view-events-for-an-access-package), in the Azure portal, or via PowerShell.
60
-
* You can view the last 30 days of signins to an application in the [signins report](../reports-monitoring/howto-find-activity-reports.md#sign-ins-report) in the Azure portal, or via [Graph](/graph/api/signin-list?view=graph-rest-1.0&tabs=http&preserve-view=true).
60
+
* You can view the last 30 days of sign-ins to an application in the [sign-ins report](../reports-monitoring/reference-basic-info-sign-in-logs.md) in the Azure portal, or via [Graph](/graph/api/signin-list?view=graph-rest-1.0&tabs=http&preserve-view=true).
61
61
* You can also send the [sign in logs to Azure Monitor](../reports-monitoring/concept-activity-logs-azure-monitor.md) to archive sign in activity for up to two years.
62
62
63
63
## Monitor to adjust entitlement management policies and access as needed
0 commit comments