Hrvoje Kusulja
My feedback
-
9 votes
Hrvoje Kusulja supported this idea ·
-
351 votes
Currently, we are not aware of any plans from Windows Server for this capability. We’ll continue to work with Windows Server to revisit this in the near future
Hrvoje Kusulja supported this idea ·
-
163 votes
Thanks for the idea.
Hrvoje Kusulja supported this idea ·
-
286 votes40 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
We are currently working on a method to allow users to sign in while their authentication methods are temporarily unavailable.
Hrvoje Kusulja supported this idea ·
-
20 votes1 comment · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
Hrvoje Kusulja supported this idea ·
-
95 votes12 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
There is planned work to address this scenario. We don’t feel that backup codes provide a good security option as they’re often misplaced. Also, it’s hard to have users print them out and have them when they’re needed. Instead, we are looking at a time-limited passcode that could be generated either by the user (just in time when it’s needed) or by an admin (for example a helpdesk agent). The organization admin would have control over when a user could generate these codes. The code can be used for a limited time, then it will no longer be valid.
Note – for areas with limited cellphone connectivity (or roaming charges), the code generated in the authenticator app will allow MFA login. The time-limited passcode is meant to stand in if the user temporarily forgot/lost their phone.
Richard
An error occurred while saving the comment Hrvoje Kusulja supported this idea ·
-
6,349 votes
Thank you for the strong feedback on this request. We are working on this and will share our plans for this offering soon. Thank you for your patience!
Aishwarya Manoharan
Program Manager, Azure storageHrvoje Kusulja supported this idea ·
-
5,099 votes
Thank you for the continued feedback on this request. We’re evaluating this support in the context of various storage services and connectivity mechanisms.
Hrvoje Kusulja supported this idea ·
-
28 votes
Hrvoje Kusulja supported this idea ·
-
38 votes
We have created samples to do this in custom policies here:
While we realize this is only works for custom policies (the part where you can track versions of consent), we currently don’t have plans to implement this in built in policies.
An error occurred while saving the comment Hrvoje Kusulja commented
I also confirm, that according to EU GDPR; users needs to select checkbox and mark as "I agree" on terms. This action also needs to be logged. It must be prior or during the registration process on AAD B2C. So what about this feature?
Hrvoje Kusulja supported this idea ·
-
57 votes
This is possible through custom policies (see documentation below). We are planning to bring it into built-in policies within the next 6 months.
https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-setup-commonaad-custom
/Parakh
Hrvoje Kusulja supported this idea ·
-
19 votes
Hrvoje Kusulja supported this idea ·
-
126 votesunder review · 2 comments · Networking » Content Delivery Network · Flag idea as inappropriate… · Admin →
Hrvoje Kusulja supported this idea ·
-
3,266 votes
Quick update,
We have been considering all of the risks and investigating the steps required to ensure we implement this feature with high positive impact and low to no negative impact.
After this investigation we have decided we will enable Pay-As-You-Go customers the option to configure a spending limit on a Pay-As-You-Go subscription, with appropriate safeguards and measures to prevent both service abuse and production service failure.
We have not yet finished determining the details of what this feature will look like, nor do we have a timeline for release, but we have heard your voices and have added this feature to our backlog.
Thanks for your continued feedback,
-Adam (Azure Billing Team)
An error occurred while saving the comment Hrvoje Kusulja commented
I am also interested in opt-in for CSP Azure subscription spending limit. To have hard / financial limit . After reaching the limit to automatically guarantee azure subscription is suspended / no further costs for end-customer should be generated.
Hrvoje Kusulja supported this idea ·
-
9 votes
Hrvoje Kusulja supported this idea ·
-
22 votes
Hrvoje Kusulja supported this idea ·
-
10 votes
Hrvoje Kusulja supported this idea ·
-
21 votes
Using the Linux Agent for OMS you can forward syslog to a Linux server and then have it send the syslog to OMS.
Is this sufficient for what you want to do?
An error occurred while saving the comment Hrvoje Kusulja commented
Hi, if you build Linux Agent for OMS, that can forward syslog and SNMP to the OMS - this is fine.
However you need to support standard Linux packages (Debian, CentOS/RHEL etc.)Also, this is not enough for some other devices, kind of IoT, or networking equipment, where you can not install your OMS Agent, it just simply supports the basic Syslog messages and SNMP monitoring, so direct supporting this protocols would be the best.
Ok, any info and ETA when will Azure AD > One-time bypass, work also without need for on-prem MFA server ?