Jonas Sandbekk
My feedback
-
65 votes
Jonas Sandbekk supported this idea ·
-
616 votes
Jonas Sandbekk supported this idea ·
-
3,029 votes
Jonas Sandbekk supported this idea ·
-
150 votes
We are still planning to deliver this. Some preliminary work is underway, but we’ll wait to switch to the “Started” status until a few things are further along and we have a better sense of the timeline.
An error occurred while saving the comment Jonas Sandbekk supported this idea ·
-
59 votes
Jonas Sandbekk supported this idea ·
-
1,718 votes
We definitely recognize the popularity of this feature, and we discuss it constantly during the planning phases. However there are certain technical limitations in the system that add a large amount of development cost. Because of the cost and the fact that there is a workaround available, other features get prioritized over this one.
That being said, please keep voting for it. The popularity of the feature does help bring it up and makes us reconsider every time.
Apologies for the delay.
/Parakh
Old message:
We’re doing some research both on the specifics of this ask as well as what it would take to support this.
Is the ask here to do the same thing that regular Azure AD does (see: https://blogs.technet.microsoft.com/enterprisemobility/2014/12/18/azure-active-directory-now-with-group-claims-and-application-roles/) or is are there different requirements around this for Azure AD B2C?Jonas Sandbekk supported this idea ·
Any updates on this? Is it possible to add the inbound IP address to the firewall and use that? Seems to be working, but it's also in the outbound IP list, so unsure if it's actually a solution or something that will come back to bite us.