Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Microsoft Entra SCIM 2.0: Now with bidirectional provisioning

Entra now supports bidirectional scim provisioning
Microsoft introduced new SCIM 2.0 APIs for Microsoft Entra. The APIs now support bidirectional provisioning, which allows external identity systems to provision users and groups directly into Entra. SCIM (System for Cross-domain Identity Management) is an open internet standard that defines a common HTTP-based protocol for managing user accounts across different systems. Previously, Entra could only push user data to other applications via SCIM. Now, it also accepts incoming SCIM requests. The APIs follow a consumption-based pricing model, require an Azure subscription, and are generally available in the Microsoft public cloud.

Source

Entra ID Conditional Access Optimization Agent: AI-driven policy gap detection

Creating a phased rollout plan (image Microsoft)
Microsoft's Conditional Access Optimization Agent uses AI to continuously scan your Microsoft Entra ID environment for policy gaps and recommend remediations. It requires a Microsoft Entra ID P1 license and a Microsoft Security Copilot subscription. Several new features are in public preview, including context-aware recommendations, deep gap analysis across all policies, and phased policy rollouts. This article explains what Conditional Access policies are, how the agent works, what you need to run it, and where its limitations lie.

Source

Microsoft Entra March 2026: Passkeys GA, backup preview, and Hybrid Security Fix

Microsoft entra backup and recovery in admin center (image microsoft)
Microsoft's March 2026 Entra update promotes passkey authentication to general availability, introduces a built-in tenant backup feature in public preview, and announces a breaking security change for hybrid environments, taking effect June 1, 2026. Additional changes enforce TLS 1.2 for Entra Connect Health agents and bring several multi-tenant governance capabilities into preview. This article covers changes relevant to administrators managing Microsoft 365 tenants and hybrid Active Directory environments.

Source

Using OpenID Connect (OIDC) for external MFA in Entra ID

External MFA in Microsoft Entra ID (image Microsoft)
Microsoft has introduced external Multi-Factor Authentication (MFA) as the new, fully integrated OpenID Connect (OIDC)-based way to connect third-party MFA providers, replacing the Custom Controls mechanism that previously enabled external MFA in a more limited way. Custom Controls will be deprecated on September 30, 2026.

Source

Microsoft adds passkeys to Entra ID registration campaigns

Configuring registration campaigns in Entra admin center (image Microsoft)
Starting April 2026, Microsoft Registration Campaigns in Entra ID will support Passkeys (FIDO2) as an authentication method, enabling organizations to deploy phishing-resistant credentials. The update introduces significant configuration changes, particularly for tenants using the Microsoft-managed state, where several campaign settings become non-configurable. This rollout is part of Microsoft's broader strategy to eliminate passwords and aligns with the introduction of Windows Hello passkey support for Entra accounts.

Source

Microsoft Security Dashboard for AI: Aggregate risk signals from Microsoft Defender, Microsoft Entra, and Microsoft Purview

Security Dashboard for AI (image Microsoft)
The Microsoft Security Dashboard for AI is a unified governance tool now available in public preview that aggregates real-time risk signals from Microsoft Defender, Microsoft Entra, and Microsoft Purview into a single interactive interface. Designed for CISOs and AI risk leaders, it provides inventory discovery, posture tracking, and remediation paths for AI agents, models, MCP servers, and applications. No additional licensing is required — access is included for organizations that already hold enterprise subscriptions to the relevant Microsoft security products.

Source

Microsoft Entra ID fixes Conditional Access policy bypass, will enforce MFA sign-in for OIDC-only requests

Grant or block access to resource in Conditional Access (image Microsoft)
Microsoft will improve how Conditional Access policies are enforced in Microsoft Entra ID starting March 27, 2026. This change addresses a security loophole in which policies targeting all resources with specific exclusions could be bypassed in certain authentication scenarios. The rollout continues through June 2026 and forms part of Microsoft's Secure Future Initiative. Because these sign-ins will no longer bypass Conditional Access, users may now be required to complete MFA, meet device compliance requirements, or satisfy other configured Conditional Access controls, such as approved apps, app protection policies, or authentication strength, before accessing the resource.

Source

Microsoft Entra ID auto-enables passkey profiles in March 2026

Configure passkey settings (image Microsoft)
Starting March 2026, Microsoft Entra ID will introduce passkey profiles and synced passkeys to general availability, enabling group-based authentication configurations with granular control over device-bound and synced passkeys. Microsoft will automatically enable passkey profiles for tenants that don't opt in during the initial rollout, with existing settings preserved to maintain their current security posture.

Source

❌