Nathan Manzi

My feedback

  1. 150 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    24 comments  ·  Azure Functions » Feature  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Nathan Manzi commented  · 

    Echoing others here, this is an extremely important requirement for us with a large project to migrate apps into Azure.

    Nathan Manzi supported this idea  · 
  2. 25 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Dev Spaces  ·  Flag idea as inappropriate…  ·  Admin →
    Nathan Manzi supported this idea  · 
  3. 166 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    16 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →

    We are in the process of planning this feature and hope to have a preview available by the end of november. In the meantime, could you please respond to aadb2cpreview@microsoft.com with your responses to the following questions:

    - If you had a “password change” policy, what kind of information would you like to get back once the policy has been executed?
    - Would you prefer to have a policy that forces you to sign in first, and then asks you to change the password, or one that let’s you do it all on the same page?
    - Would you want an email to get sent out to the user whenever the password is changed?

    Nathan Manzi supported this idea  · 
  4. 193 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    26 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    Nathan Manzi supported this idea  · 
  5. 218 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    22 comments  ·  Azure Active Directory » B2B  ·  Flag idea as inappropriate…  ·  Admin →

    We do have some capabilities in this space by using either Access Reviews (https://docs.microsoft.com/en-us/azure/active-directory/governance/manage-guest-access-with-access-reviews) or the newly-released-to-preview Entitlement Management feature (https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-overview).

    If neither of those fulfill your requirements, please add a comment with your scenario for the feature to help us prioritize and design it better.

    /Elisabeth

    An error occurred while saving the comment
    Nathan Manzi commented  · 

    First logged in 2017, now 2020, and still sorely needed. Imagine an organization making use of B2B guest accounts for MS Teams, Applications etc over that timeframe. How many guest accounts exist where the source account is no longer active?

    We need the ability to expire guest accounts after a period of inactivity or a specified timeframe.

    Nathan Manzi supported this idea  · 

Feedback and Knowledge Base