Matt Varblow

My feedback

  1. 95 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Matt Varblow supported this idea  · 
  2. 205 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    13 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Matt Varblow supported this idea  · 
  3. 306 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    49 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →

    We have started the planning for this feature and hope to have a preview by the end of the calendar year. In the meantime, could you respond to aadb2cpreview@microsoft.com with the answers to the following questions:
    - In which scenarios do you plan to force the user to change his/her password?
    - What kind of information (if any) would you like to get back if the user goes through the reset flow?
    - Do you currently or plan to track which users have reset their password?

    Matt Varblow supported this idea  · 
  4. 245 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    44 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →

    Thank you. We will examine the experience of duplicate sign ups across Identity providers. Would performing this check by using the email address be sufficient?

    BTW, Linking multiple provider accounts to one user is in our roadmap and we’ve already achieved it in preview…

    We look forward to your feedback

    /Jose Rojas

    Matt Varblow supported this idea  · 
  5. 386 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    30 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Matt Varblow supported this idea  · 
  6. 212 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    21 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Matt Varblow supported this idea  · 
  7. 213 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    7 comments  ·  Storage » Tables  ·  Flag idea as inappropriate…  ·  Admin →
    Matt Varblow supported this idea  · 
  8. 338 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    26 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →

    Currently, you can use “App Registration” blade in the Azure Portal (outside of the Azure AD B2C blades) to register an apps that define application permission and the register apps that use client credentials to request these. The caveat is that this is done using the same mechanism that you’d use in regular Azure AD.

    Ideally we’d have a first class experience for this in the Azure AD B2C blades or at least have an Azure doc that walks you through the experience I just summarized, so I’m leaving this feature ask open.

    It would be great if you guys can add comments with your feedback. What scenarios areyou trying to achieve? Does the approach above help you achieve what you want to achieve? Does the experience to do so work for you guys and if not, what would you like to see?

    Matt Varblow supported this idea  · 
  9. 1,055 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    125 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Matt Varblow supported this idea  · 
  10. 779 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    62 comments  ·  Azure Analysis Services  ·  Flag idea as inappropriate…  ·  Admin →
    Matt Varblow supported this idea  · 
  11. 19 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Azure Backup » MARS  ·  Flag idea as inappropriate…  ·  Admin →
    Matt Varblow supported this idea  · 
    An error occurred while saving the comment
    Matt Varblow commented  · 

    Specifically, we're using SOFS and are unable to back up the cluster storage volume. This is critical data that should be backed up by DPM on prem and especially the Azure backup agent since it's the only supported clustering approach in Azure.

  12. 129 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Matt Varblow supported this idea  · 
  13. 1,940 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    175 comments  ·  Signup and Billing  ·  Flag idea as inappropriate…  ·  Admin →

    Hey folks, sorry for the late update. Some backend changes were made to alleviate this issue but I believe it doesn’t solve it for everyone yet. Let me go get some details and come back with a better update. Thanks!

    John

    An error occurred while saving the comment
    Matt Varblow commented  · 

    Yes, please! Hard to believe this is not possible yet.

    An error occurred while saving the comment
    Matt Varblow commented  · 

    This suggestion has been tagged as 'started' for over a year now. Is 'started' really the correct tag for this? An updated timeframe would be appreciated. But we'd all love to see this one 'finished'.

    Matt Varblow supported this idea  · 
  14. 10 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Azure Monitor-Log Analytics » Extensibility  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Matt Varblow commented  · 

    Yes, please. I'd like to be able to include the unhealthy network links, the servers that are no longer reporting to OMS, the drives that are full, etc.

    Matt Varblow supported this idea  · 

Feedback and Knowledge Base