Samir
My feedback
-
1,040 votes
An error occurred while saving the comment Samir supported this idea ·
-
33 votes
Samir supported this idea ·
An error occurred while saving the comment Samir commented
Hello,
I also need this feature.
-
44 votes
We understand the gap, and are actively reviewing the scenario around password expiry notifications
An error occurred while saving the comment Samir commented
Any update?
-
254 votes
We are currently investigating how we can best implement this feature.
An error occurred while saving the comment Samir commented
any update?
-
189 votes
Thank you for your feedback! Would you like the feature to be controlled by the admin or available for everyone?
Thanks,
Sadie HenryAn error occurred while saving the comment Samir commented
+1
Azure should have a native tool for this so every user could be informed with or without Azure AD Connect and with PHS or PTA -
137 votes12 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
An error occurred while saving the comment Samir commented
Due to the pandemic it is imperative that users (all are working remotely) are notified about password's expiry.
Is there any native app in Azure AD for this while using azure ad connect with password sync? -
459 votes55 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hey folks! Thank you for your feedback. We are reviewing this ask and will keep you up to date on our findings. We have also added information about this limitation in our documentation. Thank you!
An error occurred while saving the comment Samir commented
As juju said, this is a major caveat.
If user password expires there is no way to log back into the device.
-
49 votes
Thank you for taking the time to vote for this item. We are glad to let you know that you can accomplish this today using Azure Blueprints locking mechanism. You can read about this here: https://docs.microsoft.com/en-us/azure/governance/blueprints/concepts/resource-locking
We encourage customers to use this path.
An error occurred while saving the comment Samir commented
Hello,
Any update on this? I need to give read access to one specific resource group (they need to see details of it) and read access to just one key vault within that resource group.
I can grant the Key Vault Reader permissions at the resource level but they see all key vaults within that resource group.
Denying access on other key vaults is also not efficient.
It would be great to resolve private endpoints FQDNs without using an extra VM as a DNS Forwarder.