Steve Whitcher
My feedback
-
1,118 votes
Thanks for the feedback, we’re currently reviewing this capability to see how we can support RADIUS auth on NPS specifically, for AAD Joined Windows 10 devices to authenticate to WiFi access points
If there are scenarios beyond the above, please provide the details in the comments
—
RaviSteve Whitcher supported this idea ·
-
500 votes
This is currently in planning for enabling it for Azure AD joined devices, NOT for AAD DS
Steve Whitcher supported this idea ·
-
1 vote
An error occurred while saving the comment -
16 votes
Steve Whitcher supported this idea ·
-
1 vote
Steve Whitcher shared this idea ·
-
2,568 votes
We’re currently evaluating an option that will provide the functionality offered by nested groups, but removes the complexity nested groups adds. We appreciate your patience on this ask and want to ensure we deliver a solution that benefits all of our customers. Below are use cases that we’d like for you to stack rank, with #1 being priority for you. We thank you for the continued comments and feedback.
Use case A: nested group in a cloud security group inherits apps assignment
Use case B: nested group in a cloud security group inherits license assignment
Use case C: nesting groups under Office 365 groupsAn error occurred while saving the comment Steve Whitcher commented
1:C
2:B
3:ASteve Whitcher supported this idea ·
-
696 votes
We’re working on a solution and will update you when we know more.
An error occurred while saving the comment Steve Whitcher commented
Wow, I got the email that this was changed to Started, that's great! Of course, then I see that notes to that effect were posted in April, which I hadn't seen. And those notes say that there should be an update with a timeline in 3 months. So, I assume that has slipped since today's update has no mention of a timeline.
Steve Whitcher supported this idea ·
-
265 votes
We are currently investigating how to implement this. The expiration status is not a directory attribute so it is not straight forward how to sync it.
Steve Whitcher supported this idea ·
An error occurred while saving the comment Steve Whitcher commented
@Rob de Jong - I think you misunderstood the request. This is not about AD password expiration. This is for account expiration -- In on-prem AD, we can set an account to expire on a specified date. After that date, the user would not be able to sign in. When this happens, AzureAD should block sign in for the account as well, just as it does if the on-prem account is disabled.
-
3 votes
Steve Whitcher supported this idea ·
-
30 votes9 comments · Azure Active Directory Application Requests » Single Sign-On · Flag idea as inappropriate… · Admin →
Thanks for your app request. If not already, please fill out this app request form at http://aka.ms/aadappsurvey so we can follow up with you. Thanks!
An error occurred while saving the comment Steve Whitcher commented
Just chiming in to add my voice to this request. I'd love to have SSO for Meraki, but it just doesn't make sense to use AzureAD's password vaulting/plugin based SSO when SAML is available. Please update the gallery app to support SAML.
For reference, Meraki's documentation on SAML support is available here: https://documentation.meraki.com/zGeneral_Administration/Managing_Dashboard_Access/Configuring_SAML_Single_Sign-on_for_DashboardSteve Whitcher supported this idea ·
-
4 votes1 comment · Azure Active Directory Application Requests » Single Sign-On · Flag idea as inappropriate… · Admin →
Thanks for your app request. In order to evaluate your request, can you please fill out this app request form at http://aka.ms/aadappsurvey? It will help us prioritize the request and be able to follow up with you.
/Luis
Steve Whitcher shared this idea ·
For what it's worth, this looks like basically the same request as the feedback item below. You may want to consolidate the votes by upvoting that one.
https://feedback.azure.com/forums/34192--general-feedback/suggestions/40565848-show-additional-information-about-authentication-m