67 votes16 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →Lance Hundt shared this idea ·
37 votes8 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
Our recommended approach to this situation is to not install MFA Server on premise. You can install the MFA adapter for NPS, which will proxy RADIUS request to Azure MFA in the cloud. This will support VPN or other RADIUS needs on-premise. https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-nps-extension
Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested featureLance Hundt commented
I agree with a lot of the comments in here about the need for true "console" access. Hearing the horror stories of failed remote access and getting console view is 1st step for most admins to troubleshoot the issue. It's a level of comfort for all of us to know that we can get to the console in an emergency situation.
I highly recommend talking with the RemoteApp guys about their HTML5 client implementation since it looks like it could certainly could be reused in Azure VM console access. - https://feedback.azure.com/forums/247748-azure-remoteapp/suggestions/5958080-we-want-an-html5-azure-remoteapp-client-to-support
Implementing a HTML5 VM console view seems like logical approach. Hope our voices are still heard on this. Thanks!