Webber,Michael T.

My feedback

  1. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  (General Feedback) » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. shared this idea  · 
  2. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  (General Feedback) » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. shared this idea  · 
  3. 10 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Governance » Azure Policy  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Webber,Michael T. commented  · 

    I would also like to use the same managed identity for multiple policy assignments where the roles and scope are the same. This would greatly reduce the number of managed identities required.

    Webber,Michael T. supported this idea  · 
  4. 3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Governance » Azure Policy  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. supported this idea  · 
  5. 6 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Governance » Azure Policy  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. supported this idea  · 
  6. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  (General Feedback) » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. shared this idea  · 
  7. 278 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  36 comments  ·  Azure Governance » Azure Policy  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. supported this idea  · 
  8. 54 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. supported this idea  · 
  9. 599 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Folks,
    Assigning cloud groups to built-in roles is in public preview starting today. Thanks a ton for all the great feedback that you shared with us. Here’s the published documentation -

    https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/roles-groups-concept

    https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/groups-features

    Next steps —> Support for custom roles and on-prem groups. Stay tuned!

    Regards,
    Abhijeet Kumar Sinha
    Azure Active Directory Team

    Webber,Michael T. supported this idea  · 
  10. 45 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    7 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. supported this idea  · 
  11. 80 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    7 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. supported this idea  · 
  12. 1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. shared this idea  · 
  13. 14 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. shared this idea  · 
  14. 113 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    6 comments  ·  Networking » Virtual Network  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Webber,Michael T. commented  · 

    Best practices for a virtual data center recommend having a hub and spoke vnet architecture. Ingress and egress controls are placed in the hub and traffic from and to the spokes is forced through the hub. This results in a large amount of data transiting the peered vnets. $.02 per GB for traffic that is not leaving the data center is not acceptable.

    Webber,Michael T. supported this idea  · 
  15. 402 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Webber,Michael T. supported this idea  · 
  16. 209 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    14 comments  ·  Azure Key Vault » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. shared this idea  · 
  17. 6 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    need-feedback  ·  4 comments  ·  Azure Active Directory » Domain Services  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. supported this idea  · 
  18. 19 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. shared this idea  · 
  19. 36 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    7 comments  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →
    Webber,Michael T. shared this idea  · 
  20. 91 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Webber,Michael T. commented  · 

    Use case 2 is similar to ours. We would like the ability to have VSTS perform the ARM deployment to create the database resource. Then create a contained database user for the service principal used in the VSTS service endpoint. Then VSTS would be able to deploy the SQL scripts in a subsequent task without requiring VSTS to have or use the SA credentials. This is very important when sharing the same logical server across multiple applications and teams.

    Webber,Michael T. supported this idea  · 
← Previous 1

Feedback and Knowledge Base