Azure Active Directory

Azure Active Directory is Microsoft’s Identity Management-as-a-Service solution, offering seamless access, easy collaboration, efficiency in IT processes and improved security and compliance. In its Release Notes for Azure Active Directory, Microsoft communicated the following planned, new and changed functionality for Azure Active Directory for December 2019:

 

What’s New

Integrate SAP SuccessFactors provisioning into Azure AD and on-premises AD Public Preview

Service category: App Provisioning
Product capability: Identity Lifecycle Management

Azure AD administrators can now integrate  (SAP) SuccessFactors as an authoritative identity source in Azure AD. This integration helps organizations automate the end-to-end identity lifecycle, including using HR-based events, like new hires or terminations, to control provisioning of Azure AD accounts.

 

Support for customized emails in Azure AD B2C Public Preview

Service category: B2C – Consumer Identity Management
Product capability: B2B/B2C

Azure AD administrators can now use Azure AD B2C to create customized emails when people sign up to use their organization’s apps. By using DisplayControls (currently in preview) and a third-party email provider (such as, SendGrid, SparkPost, or a custom REST API), they can use their own email template, From address, and subject text, as well as support localization and custom one-time password (OTP) settings.

 

What’s Changed

Replacement of baseline policies with security defaults

Service category: Other
Product capability: Identity Security and Protection

As part of a secure-by-default model for authentication, Microsoft is removing the existing baseline protection policies from all Azure AD tenants. This removal is targeted for completion at the end of February 2020.

The replacement for these baseline protection policies is security defaults. If Azure AD administrators have been using baseline protection policies, they must plan to move to the new security defaults policy or to Conditional Access.

Note:
If Azure AD administrators haven’t used these policies, there is no action for them to take.