<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:a10="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <title>Azure Updates - Latest from Azure Charts</title>
    <link>https://azurecharts.com/</link>
    <description>Latest Azure updates provided by Azure Charts via Azure Terminal aka.ms/aztty RSS feed</description>
    <lastBuildDate>Sat, 09 May 2026 16:00:56 Z</lastBuildDate>
    <a10:id>https://aztty.azurewebsites.net/rss/updates?service=44</a10:id>
    <item>
      <guid isPermaLink="true">https://devblogs.microsoft.com/identity/native-auth-refresh-token-transfer-ga/</guid>
      <link>https://devblogs.microsoft.com/identity/native-auth-refresh-token-transfer-ga/</link>
      <category>GA</category>
      <title>Refresh Token (RT) Transfer to Apple Watch in Microsoft Entra External ID Native Authentication</title>
      <description>We’re excited to announce the General Availability (GA) of Single Sign-On (SSO) from Native Apps to Embedded Web Views for Microsoft Entra External ID (EEID) Native Authentication. This release marks a major milestone in delivering end-to-end seamless authentication experiences for modern CIAM applications bridging the gap between native and web-based app surfaces. Why RT transfer […]
The post General Availability: Refresh Token (RT) Transfer to Apple Watch in Microsoft Entra External ID Native Authentication appeared first on Microsoft Entra Identity Platform.&lt;br /&gt;Update Type: GA, Services: Microsoft Entra ID, Azure AD EI, Categories: </description>
      <pubDate>Wed, 29 Apr 2026 15:13:11 Z</pubDate>
      <a10:link rel="alternate" href="https://devblogs.microsoft.com/identity/native-auth-refresh-token-transfer-ga/" />
      <a10:updated>2026-04-29T15:13:11Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://devblogs.microsoft.com/identity/native-auth-sso-ga/</guid>
      <link>https://devblogs.microsoft.com/identity/native-auth-sso-ga/</link>
      <category>GA</category>
      <title>Single Sign-On (SSO) from Native Apps to Embedded Web Views in Microsoft Entra External ID Native Authentication</title>
      <description>We’re excited to announce the General Availability (GA) of Single Sign-On (SSO) from Native Apps to Embedded Web Views for Microsoft Entra External ID (EEID) Native Authentication. This release marks a major milestone in delivering end-to-end seamless authentication experiences for modern CIAM applications bridging the gap between native and web-based app surfaces. Why SSO matters […]
The post General Availability: Single Sign-On (SSO) from Native Apps to Embedded Web Views in Microsoft Entra External ID Native Authentication appeared first on Microsoft Entra Identity Platform.&lt;br /&gt;Update Type: GA, Services: Microsoft Entra ID, Azure AD EI, Categories: </description>
      <pubDate>Thu, 23 Apr 2026 16:51:24 Z</pubDate>
      <a10:link rel="alternate" href="https://devblogs.microsoft.com/identity/native-auth-sso-ga/" />
      <a10:updated>2026-04-23T16:51:24Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azureinfrastructureblog/entra-id-login-via-azure-bastion-fails-after-vm-recreation/4509337</guid>
      <link>https://techcommunity.microsoft.com/blog/azureinfrastructureblog/entra-id-login-via-azure-bastion-fails-after-vm-recreation/4509337</link>
      <category>Announcement</category>
      <title>Entra ID Login via Azure Bastion Fails After VM Recreation</title>
      <description>However, you may encounter a confusing scenario where: 
 An Entra ID user attempts to sign in to a Windows VM through Azure Bastion 
 
 The connection appears to succeed in the backend logs 
 The ses...&lt;br /&gt;Update Type: Announcement, Services: Virtual Machines, Microsoft Entra ID, Azure Bastion, Categories: </description>
      <pubDate>Thu, 23 Apr 2026 04:08:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azureinfrastructureblog/entra-id-login-via-azure-bastion-fails-after-vm-recreation/4509337" />
      <a10:updated>2026-04-23T04:08:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://blog.aks.azure.com/2026/04/22/argocd-extension-with-microsoft-entra</guid>
      <link>https://blog.aks.azure.com/2026/04/22/argocd-extension-with-microsoft-entra</link>
      <category>Announcement</category>
      <title>Securing Argo CD with Microsoft Entra ID: A Step-by-Step Guide</title>
      <description>Learn how to secure the Argo CD extension for AKS with Microsoft Entra ID using Terraform, workload identity, OIDC, RBAC, and policy-based access control.&lt;br /&gt;Update Type: Announcement, Services: Kubernetes Service, Microsoft Entra ID, Categories: </description>
      <pubDate>Wed, 22 Apr 2026 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://blog.aks.azure.com/2026/04/22/argocd-extension-with-microsoft-entra" />
      <a10:updated>2026-04-22T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=transition-to-azure-ad-to-query-data-from-azure-monitor-application-insights-by-31-march-2026</guid>
      <link>https://azure.microsoft.com/updates?id=transition-to-azure-ad-to-query-data-from-azure-monitor-application-insights-by-31-march-2026</link>
      <category>Deprecation</category>
      <title>Transition to Entra ID (formerly known as Azure AD) to query data from Azure Monitor application insights by September 30, 2026</title>
      <description>*Note: Previously announced to be retired March 31, 2026. We have extended the retirement date to September 30, 2026. On September 30, 2026, API keys used query application insights will be retired. ou'll need to transition to Microsoft Entra ID (formerl&lt;br /&gt;Update Type: Deprecation, Services: Microsoft Entra ID, Azure Monitor, Categories: Management, Retirements</description>
      <pubDate>Tue, 21 Apr 2026 18:15:14 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=transition-to-azure-ad-to-query-data-from-azure-monitor-application-insights-by-31-march-2026" />
      <a10:updated>2026-04-21T18:15:14Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=558662</guid>
      <link>https://azure.microsoft.com/updates?id=558662</link>
      <category>Preview</category>
      <title>Entra ID-Based Access for Azure Blob Storage SFTP</title>
      <description>Microsoft Entra ID-based access for Azure Blob Storage SFTP is now in public preview. This new capability empowers you to use Microsoft Entra ID identities (including guest users via Entra External Identities) to securely connect to Azure Blob Storage via&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Azure Storage, Categories: Features</description>
      <pubDate>Mon, 16 Mar 2026 18:30:34 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=558662" />
      <a10:updated>2026-03-16T18:30:34Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azurestorageblog/enterprise-identity-meets-secure-file-transfer-entra-id-public-preview-on-azure-/4501937</guid>
      <link>https://techcommunity.microsoft.com/blog/azurestorageblog/enterprise-identity-meets-secure-file-transfer-entra-id-public-preview-on-azure-/4501937</link>
      <category>Preview</category>
      <title>Enterprise Identity Meets Secure File Transfer: Entra ID Public Preview on Azure Blob Storage SFTP</title>
      <description>We are excited to announce the public preview of Entra ID-based access for Azure Blob Storage SFTP. This new capability enables you to use Microsoft Entra ID (formerly Azure Active Directory) identit...&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Azure Storage, Categories: </description>
      <pubDate>Fri, 13 Mar 2026 03:37:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azurestorageblog/enterprise-identity-meets-secure-file-transfer-entra-id-public-preview-on-azure-/4501937" />
      <a10:updated>2026-03-13T03:37:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=557694</guid>
      <link>https://azure.microsoft.com/updates?id=557694</link>
      <category>Preview</category>
      <title>Restrict usage of user delegation SAS to an Entra ID identity</title>
      <description>We’re excited to announce the addition of enhanced secure authentication in Azure Storage that combines the flexibility of user-delegation shared access signature (SAS) with the user-bound access of Entra ID. User-bound user delegation SAS is now in previ&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Azure Storage, Categories: Features, Security</description>
      <pubDate>Thu, 26 Feb 2026 19:45:06 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=557694" />
      <a10:updated>2026-02-26T19:45:06Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azurestorageblog/public-preview-restrict-usage-of-user-delegation-sas-to-an-entra-id-identity/4497196</guid>
      <link>https://techcommunity.microsoft.com/blog/azurestorageblog/public-preview-restrict-usage-of-user-delegation-sas-to-an-entra-id-identity/4497196</link>
      <category>Preview</category>
      <title>Public Preview: Restrict usage of user delegation SAS to an Entra ID identity</title>
      <description>Shared access signatures (SAS) grant time-bound, scoped access to Azure Storage resources without sharing account keys. Over time, Azure Storage has continued to strengthen SAS security, moving from ...&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Azure Storage, Categories: </description>
      <pubDate>Thu, 26 Feb 2026 07:15:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azurestorageblog/public-preview-restrict-usage-of-user-delegation-sas-to-an-entra-id-identity/4497196" />
      <a10:updated>2026-02-26T07:15:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azurearchitectureblog/securing-multi-agent-ai-with-user-context-entra-id-obo-for-databricks-genie-/4493308</guid>
      <link>https://techcommunity.microsoft.com/blog/azurearchitectureblog/securing-multi-agent-ai-with-user-context-entra-id-obo-for-databricks-genie-/4493308</link>
      <category>Announcement</category>
      <title>Securing Multi-Agent AI with User Context: Entra ID OBO for Databricks Genie.</title>
      <description>How we built an enterprise-grade multi-agent system that preserves user identity across AI agents and Databricks 
 Introduction 
 When building AI-powered applications for the enterprise, a common ch...&lt;br /&gt;Update Type: Announcement, Services: Databricks, Microsoft Entra ID, Categories: </description>
      <pubDate>Wed, 11 Feb 2026 22:27:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azurearchitectureblog/securing-multi-agent-ai-with-user-context-entra-id-obo-for-databricks-genie-/4493308" />
      <a10:updated>2026-02-11T22:27:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://devblogs.microsoft.com/cosmosdb/how-to-enable-microsoft-entra-id-for-azure-cosmos-db-nosql/</guid>
      <link>https://devblogs.microsoft.com/cosmosdb/how-to-enable-microsoft-entra-id-for-azure-cosmos-db-nosql/</link>
      <category>Announcement</category>
      <title>How to Enable Microsoft Entra ID for Azure Cosmos DB (NoSQL)</title>
      <description>Strengthen Identity Security and Eliminate Account Keys Identity is becoming the new security perimeter. As organizations modernize their cloud applications, long‑lived secrets and shared keys introduce unnecessary risk. Azure Cosmos DB now fully supports Microsoft Entra ID for both control plane and data plane access, giving customers a secure, passwordless, least‑privilege alternative to legacy key‑based […]
The post How to Enable Microsoft Entra ID for Azure Cosmos DB (NoSQL) appeared first on Azure Cosmos DB Blog.&lt;br /&gt;Update Type: Announcement, Services: Cosmos DB, Microsoft Entra ID, Categories: Security</description>
      <pubDate>Thu, 05 Feb 2026 15:38:42 Z</pubDate>
      <a10:link rel="alternate" href="https://devblogs.microsoft.com/cosmosdb/how-to-enable-microsoft-entra-id-for-azure-cosmos-db-nosql/" />
      <a10:updated>2026-02-05T15:38:42Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azurenetworksecurityblog/public-preview-entra-id-support-for-rdp-connections-in-portal/4472675</guid>
      <link>https://techcommunity.microsoft.com/blog/azurenetworksecurityblog/public-preview-entra-id-support-for-rdp-connections-in-portal/4472675</link>
      <category>Preview</category>
      <title>Public Preview: Entra ID support for RDP connections in portal</title>
      <description>Entra ID support for RDP connections in portal is now in public preview! Bastion support for Entra ID offers secure, identity-based authentication to your VMs with just one-click!&lt;br /&gt;Update Type: Preview, Services: Virtual Machines, Microsoft Entra ID, Categories: </description>
      <pubDate>Mon, 24 Nov 2025 20:15:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azurenetworksecurityblog/public-preview-entra-id-support-for-rdp-connections-in-portal/4472675" />
      <a10:updated>2025-11-24T20:15:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=526018</guid>
      <link>https://azure.microsoft.com/updates?id=526018</link>
      <category>Preview</category>
      <title>Entra ID support for RDP connections</title>
      <description>Announcing Azure Bastion now supports Microsoft Entra ID authentication for RDP connections to Windows VMs directly in the portal. This update brings two key benefits for RDP users connecting to their virtual machines: Enhanced Security: By eliminating lo&lt;br /&gt;Update Type: Preview, Services: Virtual Machines, Microsoft Entra ID, Azure Bastion, Categories: Security</description>
      <pubDate>Mon, 24 Nov 2025 17:15:03 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=526018" />
      <a10:updated>2025-11-24T17:15:03Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=508413</guid>
      <link>https://azure.microsoft.com/updates?id=508413</link>
      <category>GA</category>
      <title>Microsoft Entra ID token refresh code samples in Python and .NET</title>
      <description>You can now access code samples for Entra ID token refresh using Python and .NET in Azure Database for PostgreSQL. These samples are designed to help you securely manage authentication tokens when connecting to your PostgreSQL database with Entra ID, ensu&lt;br /&gt;Update Type: GA, Services: Database for PostgreSQL, Microsoft Entra ID, Categories: Features</description>
      <pubDate>Mon, 13 Oct 2025 15:00:46 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=508413" />
      <a10:updated>2025-10-13T15:00:46Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://devblogs.microsoft.com/azure-sdk/azure-storage-apis-gain-entra-id-and-rbac-support/</guid>
      <link>https://devblogs.microsoft.com/azure-sdk/azure-storage-apis-gain-entra-id-and-rbac-support/</link>
      <category>Announcement</category>
      <title>Azure Storage APIs gain Entra ID and RBAC support</title>
      <description>To align with security best practices, Microsoft Entra ID and RBAC support is now generally available for several Azure Storage data plane APIs.
The post Azure Storage APIs gain Entra ID and RBAC support appeared first on Azure SDK Blog.&lt;br /&gt;Update Type: Announcement, Services: Microsoft Entra ID, Azure Storage, Categories: Security</description>
      <pubDate>Wed, 10 Sep 2025 18:24:47 Z</pubDate>
      <a10:link rel="alternate" href="https://devblogs.microsoft.com/azure-sdk/azure-storage-apis-gain-entra-id-and-rbac-support/" />
      <a10:updated>2025-09-10T18:24:47Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/analyticsonazure/general-availability-automatic-identity-management-aim-for-entra-id-on-azure-dat/4452206</guid>
      <link>https://techcommunity.microsoft.com/blog/analyticsonazure/general-availability-automatic-identity-management-aim-for-entra-id-on-azure-dat/4452206</link>
      <category>GA</category>
      <title>General Availability: Automatic Identity Management (AIM) for Entra ID on Azure Databricks</title>
      <description>In February, we announced that Automatic Identity Management in public preview and loved to hear your overwhelmingly positive feedback. Prior to public preview, you either had to set up an Entra Ente...&lt;br /&gt;Update Type: GA, Services: Databricks, Microsoft Entra ID, Categories: Management</description>
      <pubDate>Wed, 10 Sep 2025 16:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/analyticsonazure/general-availability-automatic-identity-management-aim-for-entra-id-on-azure-dat/4452206" />
      <a10:updated>2025-09-10T16:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=500790</guid>
      <link>https://azure.microsoft.com/updates?id=500790</link>
      <category>Preview</category>
      <title>Azure Database for PostgreSQL Entra ID group login using user credentials</title>
      <description>The public preview of Entra ID group login using user credentials, now available on newly provisioned servers. This anticipated feature simplifies user management and improves security within the Azure Database for PostgreSQL Flexible Server environments.&lt;br /&gt;Update Type: Preview, Services: Database for PostgreSQL, Microsoft Entra ID, Categories: Features</description>
      <pubDate>Thu, 28 Aug 2025 14:45:15 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=500790" />
      <a10:updated>2025-08-28T14:45:15Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=496287</guid>
      <link>https://azure.microsoft.com/updates?id=496287</link>
      <category>GA</category>
      <title>Entra ID and RBAC support for GetAccountInfo and other supplemental APIs for Azure Storage</title>
      <description>To align with security best practices, Entra ID and RBAC support is now generally available for the following APIs for Azure Storage: Get Account InformationGet Container ACLSet Container ACLGet Queue ACLSet Queue ACLGet Table ACLSet Table ACL To learn mo&lt;br /&gt;Update Type: GA, Services: Microsoft Entra ID, Azure Storage, Categories: Security</description>
      <pubDate>Tue, 26 Aug 2025 17:45:29 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=496287" />
      <a10:updated>2025-08-26T17:45:29Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://devblogs.microsoft.com/identity/bicep-templates-for-microsoft-entra-id-resources-is-ga/</guid>
      <link>https://devblogs.microsoft.com/identity/bicep-templates-for-microsoft-entra-id-resources-is-ga/</link>
      <category>Announcement</category>
      <title>Announcing GA of Bicep templates support for Microsoft Entra ID resources</title>
      <description>We’re thrilled to announce that Bicep templates for Microsoft Entra ID resources is generally available from July 29th, 2025. Bicep templates bring declarative infrastructure as code (IaC) capabilities to Microsoft Graph resources. This new capability will initially be available for core Microsoft Entra ID resources. Bicep templates for Microsoft Graph resources allow you to define […]
The post Announcing GA of Bicep templates support for Microsoft Entra ID resources appeared first on Microsoft Entra Identity Platform.&lt;br /&gt;Update Type: Announcement, Services: Microsoft Entra ID, Categories: </description>
      <pubDate>Mon, 11 Aug 2025 16:08:26 Z</pubDate>
      <a10:link rel="alternate" href="https://devblogs.microsoft.com/identity/bicep-templates-for-microsoft-entra-id-resources-is-ga/" />
      <a10:updated>2025-08-11T16:08:26Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azuregovernanceandmanagementblog/announcing-ga-of-bicep-templates-support-for-microsoft-entra-id-resources/4437163</guid>
      <link>https://techcommunity.microsoft.com/blog/azuregovernanceandmanagementblog/announcing-ga-of-bicep-templates-support-for-microsoft-entra-id-resources/4437163</link>
      <category>Announcement</category>
      <title>Announcing GA of Bicep templates support for Microsoft Entra ID resources</title>
      <description>Declare Microsoft Entra ID resources like applications and groups in Bicep templates&lt;br /&gt;Update Type: Announcement, Services: Microsoft Entra ID, Categories: </description>
      <pubDate>Tue, 29 Jul 2025 15:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azuregovernanceandmanagementblog/announcing-ga-of-bicep-templates-support-for-microsoft-entra-id-resources/4437163" />
      <a10:updated>2025-07-29T15:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=490611</guid>
      <link>https://azure.microsoft.com/updates?id=490611</link>
      <category>GA</category>
      <title>Microsoft Entra ID for Azure Cosmos DB for MongoDB (vCore)</title>
      <description>Azure Cosmos DB for MongoDB (vCore) now supports authentication via Microsoft Entra ID, enhancing security and simplifying identity management. With this update, you can now add Entra ID accounts directly to your MongoDB vCore clusters and use them for se&lt;br /&gt;Update Type: GA, Services: Cosmos DB, Microsoft Entra ID, Categories: Features</description>
      <pubDate>Mon, 19 May 2025 17:15:23 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=490611" />
      <a10:updated>2025-05-19T17:15:23Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azureinfrastructureblog/entra-id-authentication-for-azure-postgresql/4412891</guid>
      <link>https://techcommunity.microsoft.com/blog/azureinfrastructureblog/entra-id-authentication-for-azure-postgresql/4412891</link>
      <category>Announcement</category>
      <title>Entra ID Authentication for Azure PostgreSQL</title>
      <description>How Microsoft Entra ID works in Azure Database for PostgreSQL flexible server 
 The following high-level diagram summarizes how authentication works when you use Microsoft Entra authentication with A...&lt;br /&gt;Update Type: Announcement, Services: Database for PostgreSQL, Microsoft Entra ID, Categories: </description>
      <pubDate>Mon, 12 May 2025 11:11:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azureinfrastructureblog/entra-id-authentication-for-azure-postgresql/4412891" />
      <a10:updated>2025-05-12T11:11:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/microsoft-entra-blog/service-principal-required-for-microsoft-entra-id/4405796</guid>
      <link>https://techcommunity.microsoft.com/blog/microsoft-entra-blog/service-principal-required-for-microsoft-entra-id/4405796</link>
      <category>Announcement</category>
      <title>Service principal required for Microsoft Entra ID</title>
      <description>Starting March 2026, Microsoft Entra ID will no longer support SP-less authentication behavior.&lt;br /&gt;Update Type: Announcement, Services: Microsoft Entra ID, Categories: </description>
      <pubDate>Wed, 23 Apr 2025 16:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/service-principal-required-for-microsoft-entra-id/4405796" />
      <a10:updated>2025-04-23T16:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=489265</guid>
      <link>https://azure.microsoft.com/updates?id=489265</link>
      <category>Preview</category>
      <title>Managed Identity for Azure Red Hat OpenShift</title>
      <description>Azure Red Hat OpenShift introduces managed identity and workload identity in public preview as a secure alternative to Service Principals. This feature offers short-term credentials with minimal permissions, reducing operational burden and enhancing secur&lt;br /&gt;Update Type: Preview, Services: Virtual Machines, Kubernetes Service, Microsoft Entra ID, Azure Key Vault, Azure Red Hat OpenShift, Categories: Features, Security</description>
      <pubDate>Mon, 14 Apr 2025 16:15:23 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=489265" />
      <a10:updated>2025-04-14T16:15:23Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=entra-id-support-for-ssh-connections-in-portal-is-now-generally-available</guid>
      <link>https://azure.microsoft.com/updates?id=entra-id-support-for-ssh-connections-in-portal-is-now-generally-available</link>
      <category>Preview</category>
      <title>Entra ID support for SSH connections in portal</title>
      <description>We are announcing that Azure Bastion now supports Microsoft Entra ID authentication for SSH connections in the portal. With Microsoft Entra ID authentication, there are two main benefits to users connecting to their virtual machines. First, it eliminates&lt;br /&gt;Update Type: Preview, Services: Virtual Machines, Microsoft Entra ID, Azure Bastion, Categories: Features, Security, Services</description>
      <pubDate>Fri, 15 Nov 2024 19:45:54 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=entra-id-support-for-ssh-connections-in-portal-is-now-generally-available" />
      <a10:updated>2024-11-15T19:45:54Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/identity/sync-identities-from-rippling-to-microsoft-entra-id/4279690</guid>
      <link>https://techcommunity.microsoft.com/blog/identity/sync-identities-from-rippling-to-microsoft-entra-id/4279690</link>
      <category>Announcement</category>
      <title>Sync identities from Rippling to Microsoft Entra ID</title>
      <description>Automate Joiner-Mover-Leaver identity workflows with Microsoft Entra ID and Rippling integration.&lt;br /&gt;Update Type: Announcement, Services: Microsoft Entra ID, Categories: </description>
      <pubDate>Mon, 04 Nov 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/identity/sync-identities-from-rippling-to-microsoft-entra-id/4279690" />
      <a10:updated>2024-11-04T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/identity/microsoft-entra-id-governance-for-government/3575578</guid>
      <link>https://techcommunity.microsoft.com/blog/identity/microsoft-entra-id-governance-for-government/3575578</link>
      <category>Announcement</category>
      <title>Microsoft Entra ID Governance for government</title>
      <description>Microsoft Entra ID Governane is now available for customers buying Government offers.&lt;br /&gt;Update Type: Announcement, Services: Microsoft Entra ID, Categories: </description>
      <pubDate>Mon, 04 Nov 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/identity/microsoft-entra-id-governance-for-government/3575578" />
      <a10:updated>2024-11-04T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/identity/manage-microsoft-entra-id-role-assignments-with-microsoft-entra-id-governance/4120307</guid>
      <link>https://techcommunity.microsoft.com/blog/identity/manage-microsoft-entra-id-role-assignments-with-microsoft-entra-id-governance/4120307</link>
      <category>Announcement</category>
      <title>Manage Microsoft Entra ID role assignments with Microsoft Entra ID Governance</title>
      <description>Apply governance best practices to Microsoft Entra ID Roles.&lt;br /&gt;Update Type: Announcement, Services: Microsoft Entra ID, Categories: </description>
      <pubDate>Mon, 28 Oct 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/identity/manage-microsoft-entra-id-role-assignments-with-microsoft-entra-id-governance/4120307" />
      <a10:updated>2024-10-28T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azurestorageblog/general-availability-azure-active-directory-kerberos-with-azure-files-for-hybrid/3612111</guid>
      <link>https://techcommunity.microsoft.com/blog/azurestorageblog/general-availability-azure-active-directory-kerberos-with-azure-files-for-hybrid/3612111</link>
      <category>GA</category>
      <title>General Availability: Azure Active Directory Kerberos with Azure Files for hybrid identities</title>
      <description>We are excited to announce General Availability of Azure Files integration with Azure Active Directory (Azure AD) Kerberos for hybrid identities. With this release, identities in Azure AD can ...&lt;br /&gt;Update Type: GA, Services: Microsoft Entra ID, Categories: </description>
      <pubDate>Tue, 22 Oct 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azurestorageblog/general-availability-azure-active-directory-kerberos-with-azure-files-for-hybrid/3612111" />
      <a10:updated>2024-10-22T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/updates?id=introducing-reporting-and-microsoft-entra-idauthentication-for-mpt</guid>
      <link>https://azure.microsoft.com/updates?id=introducing-reporting-and-microsoft-entra-idauthentication-for-mpt</link>
      <category>Preview</category>
      <title>Introducing Reporting and Microsoft Entra ID Authentication for Microsoft Playwright Testing</title>
      <description>We are excited to announce the public preview of reporting and Microsoft Entra ID authentication in Microsoft Playwright Testing, offering improved troubleshooting capabilities and enhanced security.Troubleshoot easily with ReportingThe new Microsoft Play&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Playwright Testing, Categories: Features</description>
      <pubDate>Thu, 26 Sep 2024 07:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/updates?id=introducing-reporting-and-microsoft-entra-idauthentication-for-mpt" />
      <a10:updated>2024-09-26T07:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/en-us/updates/v2/Introducing-Reporting-and-Microsoft-Entra-IDAuthentication-for-MPT</guid>
      <link>https://azure.microsoft.com/en-us/updates/v2/Introducing-Reporting-and-Microsoft-Entra-IDAuthentication-for-MPT</link>
      <category>Preview</category>
      <title>Public Preview: Introducing Reporting and Microsoft Entra ID Authentication for Microsoft Playwright Testing</title>
      <description>We are excited to announce the public preview of Reporting and Microsoft Entra ID authentication for Microsoft Playwright Testing.&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Playwright Testing, Categories: Features</description>
      <pubDate>Thu, 26 Sep 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/en-us/updates/v2/Introducing-Reporting-and-Microsoft-Entra-IDAuthentication-for-MPT" />
      <a10:updated>2024-09-26T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/appsonazureblog/introducing-reporting-and-entra-id-authentication-for-microsoft/4246610</guid>
      <link>https://techcommunity.microsoft.com/blog/appsonazureblog/introducing-reporting-and-entra-id-authentication-for-microsoft/4246610</link>
      <category>Announcement</category>
      <title>Introducing Reporting and Entra ID Authentication for Microsoft Playwright Testing</title>
      <description>Microsoft Playwright Testing is a managed service built for running Playwright tests easily at scale. As we aim to improve the developer experience, and through our interactions with users, we recognize the need for simpler, more efficient troubleshooting. Today, we’re excited to introduce a new web-hosted reporting dashboard to help speed up the troubleshooting and make it easier for developers to identify and resolve issues. To further enhance security, we’re also implementing Microsoft Entra ID as the default authentication method, providing a more secure and seamless workflow.
Read on to learn more about what’s now possible with Microsoft Playwright Testing.

Reporting Dashboard
As development teams scale and iterate rapidly, maintaining high quality becomes more critical than ever. Slow issue resolution impacts the entire development process. With our new reporting feature, anyone on your team can quickly access detailed test results from a CI/CD run, complete with rich artifacts like logs, screenshots, and traces for efficient troubleshooting.
The reporting feature streamlines your workflow by bringing the tests that needs your attention to your notice. The test run view is filtered by failed and flaky tests so that you can start troubleshooting instantly. You can click through each test to find all the information you need to troubleshoot.


Screen capture of troubleshooting in the Playwright dashboard
 
Troubleshoot easily using rich artifacts
All test logs and artifacts, including screenshots, videos, and traces are securely stored in a centralized location. They can be accessed through a unified dashboard with configurable permissions.
The Trace Viewer is a powerful tool that is hosted directly in the dashboard. It allows you to visually step through your test execution, or use the timeline to hover over steps and reveal the page state before and after each action. Detailed logs, DOM snapshot, network activity, errors, and console output are available&lt;br /&gt;Update Type: Announcement, Services: Microsoft Entra ID, Playwright Testing, Categories: Security, Services</description>
      <pubDate>Mon, 16 Sep 2024 18:46:58 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/appsonazureblog/introducing-reporting-and-entra-id-authentication-for-microsoft/4246610" />
      <a10:updated>2024-09-16T18:46:58Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/en-us/updates/v2/Entra-ID-support-for-SSH-connections-in-portal-is-now-generally-available</guid>
      <link>https://azure.microsoft.com/en-us/updates/v2/Entra-ID-support-for-SSH-connections-in-portal-is-now-generally-available</link>
      <category>GA</category>
      <title>Generally Available: Entra ID support for SSH connections in portal</title>
      <description>Entra ID support for SSH connections is now supported in the portal experience for a quicker, more secure, one click experience.&lt;br /&gt;Update Type: GA, Services: Microsoft Entra ID, Categories: Features, Security, Services</description>
      <pubDate>Thu, 05 Sep 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/en-us/updates/v2/Entra-ID-support-for-SSH-connections-in-portal-is-now-generally-available" />
      <a10:updated>2024-09-05T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/microsoftentrablog/public-preview-microsoft-entra-id-fido2-provisioning-apis/4062699</guid>
      <link>https://techcommunity.microsoft.com/blog/microsoftentrablog/public-preview-microsoft-entra-id-fido2-provisioning-apis/4062699</link>
      <category>Preview</category>
      <title>Public preview: Microsoft Entra ID FIDO2 provisioning APIs</title>
      <description>Today I'm excited to announce a great new way to onboard employees with admin provisioning of FIDO2 security keys (passkeys) on behalf of users.

Our customers love passkeys as a phishing-resistant method for their users, but some were concerned that registration was limited to users registering their own security keys. Today we’re announcing the new Microsoft Entra ID FIDO2 provisioning APIs that empowers organizations to handle this provisioning for their users, providing secure and seamless authentication from day one.

While customers can still deploy security keys in their default configuration to their users, or allow users to bring their own security keys which requires self-service registration by a user, the APIs allow keys to be pre-provisioned for users, so users have an easier experience on first use.

Adopting phishing-resistant authentication is critical - attackers have increased their use of Adversary-in-the-Middle (AitM) phishing and social engineering attacks to target MFA-enabled users. Phishing-resistant authentication methods, including passkeys, certificate-based authentication (CBA), and Windows Hello for Business, are the best ways to protect from these attacks.

Phishing-resistant authentication is also a key requirement of Executive Order 14028 which requires phishing-resistant authentication for all agency staff, contractors, and partners.  While most federal customers use preexisting smartcard systems to achieve compliance, passkeys provide a secure alternative for their users looking for improved ways to securely sign in. With today’s release of admin provisioning, they also have a simplified onboarding process for users.

With the Microsoft Entra ID FIDO2 provisioning APIs organizations can build their own admin provisioning clients, or partner with one of the many leading credential management system (CMS) providers who have integrated our APIs in their offerings.

Tim Larson, Senior Product Manager on Microsoft Entra, will n&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Categories: Compliance, Security, Services, Management</description>
      <pubDate>Wed, 07 Aug 2024 16:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/microsoftentrablog/public-preview-microsoft-entra-id-fido2-provisioning-apis/4062699" />
      <a10:updated>2024-08-07T16:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azuresqlblog/authenticating-microsoft-entra-id-using-windows-principal/4168647</guid>
      <link>https://techcommunity.microsoft.com/blog/azuresqlblog/authenticating-microsoft-entra-id-using-windows-principal/4168647</link>
      <category>Preview</category>
      <title>Authenticating Microsoft Entra ID using windows principal metadata - Public Preview</title>
      <description>Today we’re announcing the public preview for Native Windows Principals for SQL Managed Instance. This capability simplifies the migration to SQL Managed Instance and unblock the migration of legacy applications that are tied to windows logins.

This feature plays a vital role for SQL Managed Instance link. Managed Instance link enables near real-time data replication between SQL Server and SQL Managed Instance, the read-only replica in the cloud prevents creation of Microsoft Entra principals. The Windows authentication metadata mode allows customers to use an existing Windows login to authenticate to the replica if a failover happens.

with this feature, the following Authentication metadata modes are available for SQL Managed Instance, and the different modes determine which authentication metadata is used for authentication, along with how the login is created:

Microsoft Entra (Default): This mode allows authenticating Microsoft Entra users using Microsoft Entra user metadata. In order to use Windows authentication in this mode, see Windows Authentication for Microsoft Entra principals on Azure SQL Managed Instance.
Paired (SQL Server default): The default mode for SQL Server authentication.
Windows (New Mode:( This mode allows authenticating Microsoft Entra users using the Windows user metadata within SQL Managed Instance.

The Windows authentication metadata mode is a new mode that allows users to use Windows authentication or Microsoft Entra authentication (using a Windows principal metadata) with Azure SQL Managed Instance. This mode is available for SQL Managed Instance only. The Windows authentication metadata mode isn't available for Azure SQL Database

To learn more, please refer to the documentation https://learn.microsoft.com/en-us/azure/azure-sql/managed-instance/native-windows-principals&lt;br /&gt;Update Type: Preview, Services: SQL Database, Microsoft Entra ID, Categories: </description>
      <pubDate>Wed, 03 Jul 2024 17:39:10 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azuresqlblog/authenticating-microsoft-entra-id-using-windows-principal/4168647" />
      <a10:updated>2024-07-03T17:39:10Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/appsonazureblog/azure-postgresql-entra-id-authentication-and-net/4158132</guid>
      <link>https://techcommunity.microsoft.com/blog/appsonazureblog/azure-postgresql-entra-id-authentication-and-net/4158132</link>
      <category>Announcement</category>
      <title>Azure PostgreSQL, Entra ID Authentication and .NET</title>
      <description>I'm currently working on a project in which we are using Entra ID rather than a traditional Postgre username and password. This is a great way to secure your database and ensure that only the right people have access to it.
Note: For the purpose of this article, I'm going to use Entra ID to refer to a user identity, as well as a managed identity such as a service principal, as the approach is the same in this context here.
The above linked documentation covers how you would setup the Azure resource with Entra ID as the authentication mode, so I won't go over that here (also, you can configure that when you initial create the database, or using a Bicep script), instead I want to look at how we use that in a .NET application, because when you're connecting using Entra ID you don't have a password to use, or at least not in the traditional sense.
For this, I'm going to use the Npgql library, which is the most popular PostgreSQL driver for .NET. It's a great library and has a lot of features, and integrates nicely with Entity Framework Core and .NET Aspire.
What makes connecting different
Before we look at the how of connecting, we need to understand why this is a little different to using a username/password approach. When working with a PostgreSQL database that uses a username/password, you would have a connection string that looks like this:

Server=myServerAddress;Port=5432;Database=myDataBase;User Id=myUsername;Password=myPassword;

But when connecting using Entra ID, it looks like this:

Server=server-name.postgres.database.azure.com;Database=postgres;Port=5432;Username=&lt;Entra ID&gt;;Ssl Mode=Require;

Notice how there is no Password field in the connection string. This is because when you connect using Entra ID, you don't have a password to use. Instead, you need to use a token that is generated by Entra.
Generating a token
When you connect to the database using Entra ID, you need to request an access token from Entra that you can use to authenticate. You can&lt;br /&gt;Update Type: Announcement, Services: Database for PostgreSQL, Microsoft Entra ID, Categories: Features, Services</description>
      <pubDate>Mon, 03 Jun 2024 00:25:55 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/appsonazureblog/azure-postgresql-entra-id-authentication-and-net/4158132" />
      <a10:updated>2024-06-03T00:25:55Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/en-us/updates/public-preview-azure-netapp-files-support-for-active-directory-connection-per-netapp-account</guid>
      <link>https://azure.microsoft.com/en-us/updates/public-preview-azure-netapp-files-support-for-active-directory-connection-per-netapp-account</link>
      <category>Preview</category>
      <title>Public preview: Azure NetApp Files support for Active Directory connection per NetApp account</title>
      <description>Azure NetApp Files support for one Active Directory connection per NetApp account now enables connecting a NetApp account to its own distinct Active Directory Forest and Domain. Azure NetApp Files can now be used with more than one Active Directory Forest and Domain in a region under a subscription.&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Azure NetApp Files, Categories: Features, Security</description>
      <pubDate>Thu, 30 May 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/en-us/updates/public-preview-azure-netapp-files-support-for-active-directory-connection-per-netapp-account" />
      <a10:updated>2024-05-30T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/en-us/updates/general-availability-azure-cache-for-redis-now-supports-microsoft-entra-id-authentication-and-authorization</guid>
      <link>https://azure.microsoft.com/en-us/updates/general-availability-azure-cache-for-redis-now-supports-microsoft-entra-id-authentication-and-authorization</link>
      <category>GA</category>
      <title>General availability: Azure Cache for Redis now supports Microsoft Entra ID authentication and authorization</title>
      <description>Azure Cache for Redis now offers a password-free authentication mechanism by integrating with Microsoft Entra. This integration is complemented with the role-based access control that open source Redis supports. &lt;br /&gt;Update Type: GA, Services: Redis Cache, Microsoft Entra ID, Categories: Features</description>
      <pubDate>Tue, 21 May 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/en-us/updates/general-availability-azure-cache-for-redis-now-supports-microsoft-entra-id-authentication-and-authorization" />
      <a10:updated>2024-05-21T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/microsoftentrablog/public-preview-external-authentication-methods-in-microsoft/4078808</guid>
      <link>https://techcommunity.microsoft.com/blog/microsoftentrablog/public-preview-external-authentication-methods-in-microsoft/4078808</link>
      <category>Preview</category>
      <title>Public preview: External authentication methods in Microsoft Entra ID</title>
      <description>Hi folks,

Today I’m thrilled to share that the public preview of external authentication methods in Microsoft Entra ID is scheduled for release in the first half of May. This feature will allow you to use your preferred multifactor authentication (MFA) solution with Entra ID.
 
Deploying MFA is the single most important step to securing user identities. A Microsoft Research study of MFA effectiveness showed that the use of MFA reduced the risk of compromise by more than 99.2%! Some organizations have already deployed MFA and want to reuse that MFA solution with Entra ID. External authentication methods allows organizations to reuse any MFA solution to meet the MFA requirement with Entra ID.
 
Some of you might be familiar with custom controls. External authentication methods are the replacement of custom controls, and they provide several benefits over the custom controls approach. These include: 
 

External authentication method integration, which uses industry standards and supports an open model 
External authentication methods are managed the same way as Entra methods 
External authentication methods are supported for a wide range of Entra ID use cases (including PIM activation)


I've invited Greg Kinasewitz, Product Manager for Microsoft Entra ID, to tell you more about this new capability.

Thanks, and as always, let us know what you think!

Nitika Gupta
Group Product Manager

--

Hi folks,

Greg here. I’m super excited to walk you through some of the key capabilities of external authentication methods and readiness from partners. 

We’ve heard from some of you about wanting to use another MFA solution along with the power of Entra ID functionality like the rich features of Conditional Access, Identity Protection, and more.  Customers using Active Directory Federation Services (ADFS) with a deployment of another MFA solution have been vocal in wanting this functionality so they can migrate from AD FS to Entra ID. Orga&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Categories: Features, Services</description>
      <pubDate>Thu, 02 May 2024 21:18:55 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/microsoftentrablog/public-preview-external-authentication-methods-in-microsoft/4078808" />
      <a10:updated>2024-05-02T21:18:55Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/microsoftentrablog/public-preview-expanding-passkey-support-in-microsoft-entra-id/4062702</guid>
      <link>https://techcommunity.microsoft.com/blog/microsoftentrablog/public-preview-expanding-passkey-support-in-microsoft-entra-id/4062702</link>
      <category>Preview</category>
      <title>Public preview: Expanding passkey support in Microsoft Entra ID</title>
      <description>We really, really want to eliminate passwords. There’s really nothing anyone can do to make them better. As more users have adopted multifactor authentication (MFA), attackers have increased their use of Adversary-in-the-Middle (AitM) phishing and social engineering attacks, which trick people into revealing their credentials.  
 
How can we defeat these attacks while making safe sign-in even easier? Passkeys!  
 
A passkey is a strong, phishing-resistant authentication method you can use to sign in to any internet resource that supports the W3C WebAuthN standard. Passkeys represent the continuing evolution of the FIDO2 standard, which should be familiar to anyone who’s followed or joined the passwordless movement. We already support signing into Entra ID using a passkey hosted on a hardware security key and today, we’re delighted to announce additional support for passkeys. Specifically, we’re adding support for device-bound passkeys in the Microsoft Authenticator app on iOS and Android for customers with the strictest security requirements.

Before we describe the new capabilities we’re adding to Microsoft Authenticator, let’s review the basics of passkeys.

Passkeys neutralize phishing attempts

Passkeys provide high security assurance by applying public-private key cryptography and requiring direct interaction with the user. As I detailed in a previous blog, passkeys benefit from “Verifier Impersonation Resistance": 


URL-specific. The provisioning process for passkeys records the relying party’s URL, so the passkey will only work for sites with that same URL. 
 Device-specific. The relying party will only grant access to the user if the passkey is synched, stored, or connected to the device from which they’re requesting access.  
 User-specific. The user must prove they’re physically present during authentication, usually by performing a gesture on the device from which they’re requesting access.  

&amp;&lt;br /&gt;Update Type: Preview, Services: Microsoft Entra ID, Categories: Security</description>
      <pubDate>Thu, 02 May 2024 13:54:22 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/microsoftentrablog/public-preview-expanding-passkey-support-in-microsoft-entra-id/4062702" />
      <a10:updated>2024-05-02T13:54:22Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/en-us/updates/general-availability-microsoft-entra-id-integration-with-azure-cosmos-db-for-postgresql</guid>
      <link>https://azure.microsoft.com/en-us/updates/general-availability-microsoft-entra-id-integration-with-azure-cosmos-db-for-postgresql</link>
      <category>GA</category>
      <title>General availability: Microsoft Entra ID integration with Azure Cosmos DB for PostgreSQL</title>
      <description>Now you can use Microsoft Entra ID authentication on Azure Cosmos DB for PostgreSQL clusters in addition or instead of the native Postgres authentication.&lt;br /&gt;Update Type: GA, Services: Cosmos DB, Database for PostgreSQL, Microsoft Entra ID, Categories: Features</description>
      <pubDate>Wed, 13 Mar 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/en-us/updates/general-availability-microsoft-entra-id-integration-with-azure-cosmos-db-for-postgresql" />
      <a10:updated>2024-03-13T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://techcommunity.microsoft.com/blog/azurestorageblog/azcopy-support-for-entra-id-authentication/4037559</guid>
      <link>https://techcommunity.microsoft.com/blog/azurestorageblog/azcopy-support-for-entra-id-authentication/4037559</link>
      <category>Announcement</category>
      <title>AzCopy support for Entra ID authentication</title>
      <description>AzCopy support for Entra ID authentication using Azure CLI or PowerShell authentication tokens

Using AzCopy version 10.22.0 or newer you can reuse your existing Entra ID authentication tokens from Azure PowerShell and Azure CLI for authentication for blob transfers to and from your storage accounts. This will reduce the number of times you have to enter your credentials when using Azure PowerShell and Azure CLI in the same session as you login to either Azure PowerShell or Azure CLI once and you do not need to enter a separate set of credentials in AzCopy. By the end of this article, you will be able to authenticate AzCopy actions seamlessly on Linux or Windows by reusing an existing OAuth token.

Environment variables
To enable this new feature, you must set the AZCOPY_AUTO_LOGIN_TYPE environment variable to the appropriate value. Besides the existing authentication methods - using a Service Principal or Managed Service Identity - two new options are now available. AZCLI for Azure CLI and PSCRED for Azure PowerShell. If you want to learn more on AzCopy supported environment variables you can easily get overview using the following command: azcopy env

To change the login type to either reusing OAuth tokens from Azure CLI or Azure PowerShell use one of the following commands for each operating system:

Linux and macOS environment variables


export AZCOPY_AUTO_LOGIN_TYPE=AZCLI
export AZCOPY_AUTO_LOGIN_TYPE=PSCRED


Windows environment variables


$Env:AZCOPY_AUTO_LOGIN_TYPE="AZCLI"
$Env:AZCOPY_AUTO_LOGIN_TYPE="PSCRED"



Scenarios
The prerequisite for all samples is that you own an active Azure Subscription and already deployed a storage account with a container. Write Permissions on the data plane needs be granted for your Entra ID account (see Assign an Azure role for access to blob data).

Note: If you don’t own an Azure Subscription you can create your Azure Free Account today. If you are facing troubles creating a storage account or granting the needed permiss&lt;br /&gt;Update Type: Announcement, Services: Microsoft Entra ID, Categories: Services</description>
      <pubDate>Tue, 30 Jan 2024 09:43:22 Z</pubDate>
      <a10:link rel="alternate" href="https://techcommunity.microsoft.com/blog/azurestorageblog/azcopy-support-for-entra-id-authentication/4037559" />
      <a10:updated>2024-01-30T09:43:22Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/en-us/updates/generally-available-fhir-service-integration-azure-ad-b2c</guid>
      <link>https://azure.microsoft.com/en-us/updates/generally-available-fhir-service-integration-azure-ad-b2c</link>
      <category>GA</category>
      <title>Generally available: FHIR service integration with Azure Active Directory B2C</title>
      <description>Now you can use the FHIR service in Azure Health Data Services with Azure Active Directory B2C (Azure AD B2C). This capability gives healthcare organizations a secure and convenient way to grant access the FHIR service in Azure Health Data Services without creating or comingling user accounts in their organization’s Microsoft Entra ID tenant.&lt;br /&gt;Update Type: GA, Services: Microsoft Entra ID, Azure AD EI, Health Data Services, Categories: Services</description>
      <pubDate>Mon, 22 Jan 2024 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/en-us/updates/generally-available-fhir-service-integration-azure-ad-b2c" />
      <a10:updated>2024-01-22T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/en-us/updates/event-grid-graph-api-public-preview</guid>
      <link>https://azure.microsoft.com/en-us/updates/event-grid-graph-api-public-preview</link>
      <category>Preview</category>
      <title>Azure Event Grid releases public preview support for events from services like Microsoft Entra ID, Microsoft Outlook, and Microsoft Teams.</title>
      <description>Support for Microsoft Graph API events helps you automate actions in response to Microsoft resource changes.&lt;br /&gt;Update Type: Preview, Services: Event Grid, Microsoft Entra ID, Categories: Features, Services</description>
      <pubDate>Mon, 11 Dec 2023 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/en-us/updates/event-grid-graph-api-public-preview" />
      <a10:updated>2023-12-11T00:00:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="true">https://azure.microsoft.com/en-us/updates/changes-to-my-groups-admin-controls</guid>
      <link>https://azure.microsoft.com/en-us/updates/changes-to-my-groups-admin-controls</link>
      <category>Deprecation</category>
      <title>Changes to My Groups admin controls</title>
      <description>New settings will enable admins to restrict end users from viewing and editing security groups in My Groups. The existing settings that allow enabling or disabling of My Groups will be retired in June 2024. &lt;br /&gt;Update Type: Deprecation, Services: Microsoft Entra ID, Categories: Security, Retirements</description>
      <pubDate>Fri, 20 Oct 2023 00:00:00 Z</pubDate>
      <a10:link rel="alternate" href="https://azure.microsoft.com/en-us/updates/changes-to-my-groups-admin-controls" />
      <a10:updated>2023-10-20T00:00:00Z</a10:updated>
    </item>
  </channel>
</rss>