Currently, password-based SSO is not logged on Azure AD sign-in activity log. Though Azure AD (browser extension) is simply sending credentials to the external app and the external web apps is utimately responsible for sign-in success/failure, AAD admins at least need a way to know who and when users started password-based SSO.
I believe AD FS security logs will be integrated to AAD sign-in logs. Password-based SSO sign-in acitivity should also be monitored in AAD sign-in log.
Could you add telemetry or sign-in activity logs for password-based SSO?4 votes
Currently Password SSO in Azure AD is not working on Edge Insider (Chromium) browsers. "My Apps Secure Sign-in Extension" seems only available for Edge, Google Chrome and Firefox. It will be very helpful if this extension is available as Edge Extension from Microsoft Store or built-in:
Otherwise it could be a blocker for customers which are using this Azure AD feature to switch to modern Edge on Chromium.2 votes
I need to confirm that you are not contacting users about a hack and asking us to let you stop all microsoft use. Is this for real
I need to assure myself that you are for real when I get a phone call that you have been hacked and some of the software will be closed unless you do what the telephone tells you to do1 vote
It would be rad when accessing the SSO URL https://myapps.microsoft.com/signin/blah/blahblahblah if it could somehow peak at the end url and retrieve the favorite icon meta tags durning SSO process. It's annoying when you bookmark the above URL and it renders an unfound favorite icon.1 vote
- Don't see your idea?