Thanks Peter and Nils,
We have some work in progress that will allow us to improve the sign-in data for these cases.
After enabling Exchange Online backend policy for blocking I don't even see attempt to perform authentication using BasicAuth anymore under Sign-In activity. It would be nice, if the customer could choose to see these event and are these attempts shared with Cloud App Security.
6 votesunder review · 1 comment · Azure Active Directory » Domain Services · Flag idea as inappropriate… · Admin →
4 votes0 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Thanks for your feedback! A couple of questions. Can you clarify what you mean by mop? Can you describe the scenario you’re wanting to accomplish?
Sadie Henry (sahenry)
117 votes20 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hi folks! This feature is still in progress and will go to public preview soon. I will update this request once it’s in public preview. I apologize for the delay – we know how important this is!
See this duplicate request for more information : https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/19248715-add-reporting-to-see-how-many-users-have-or-have-n
Consider using Jan Vidar Elven (@skillriver) workaround approach until Microsoft provide a permanent solution for this:
Please merge this request with this one:
Several request for this feature already exist. Please vote for this one: https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/14795625-authentication-phone
@Sadie : Please close or merge :)
1 vote0 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Thanks for the suggestion Peter. Can you give a bit more detail on the use case? You can apply conditional access policy to Azure SQL today. Is the additional requirement here to lock down access to specific devices (for example: not all compliant devices)?
For reference: Azure Active Directory Conditional Access feedback: https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/35919889-support-azure-conditional-access-for-azure-sql-ser
157 votesplanned · 47 comments · Azure Active Directory » End user experiences · Flag idea as inappropriate… · Admin →
Just some feedback from me. I also see this as an issue a lot.
I will be happy to have a call :) You have my contact details
/Peter Selch Dahl
Just a quick update. This is still on the roadmap, but not work that has started. The comments here are useful as we start the design. Thanks
Please also check this new request:
Please work with the entire Azure AD team to make a unified strategy for error messages in Azure Active Directory. We also have issues with Azure B2B and would really like the option to have custom error message depending on the SaaS app the user is trying to access.
@Jose & @Sarat from the B2B team.
Also vote for this idea under the Intune feedback site: https://microsoftintune.uservoice.com/forums/291681-ideas/suggestions/19197133-custom-text-for-block-access-option-in-conditional
It is not currently possible for to customize the "Access Denied" error message the end users receive when Conditional Access is enforced. Many companies would like support for this feature.
We don’t plan to provide the capability to customize the error message for now. But, we have been working on making the error messages more actionable.
If you have any suggestions for improving an specific error message. Please create another post and the team will improve it.
I would also very much like to see this behavior as well. It would improve the end user experience.
/Peter Selch Dahl
1 vote0 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
60 votes16 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hi folks! This work is still planned and will begin soon. I will update this request when work has begun. Thank you for your patience!
287 votes31 comments · Azure Active Directory » Role-based Access Control · Flag idea as inappropriate… · Admin →
We have released a public preview of custom roles with support for a handful of permissions related to managing application registrations. We’re now working on support for enterprise application management permissions, and will continue to release more permissions iteratively over time.
We very much appreciate all of your feedback here. We’re not done yet, so please keep letting us know what you think and where we can improve.
Azure Active Directory team
Make sure that these new RBAC permissions covers both Azure AD and Office 365.
/Peter Selch Dahl
The limit is 2000 custom roles. Is that not enough :D https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles
131 votes22 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hey folks! Thank you for your feedback. We are reviewing this ask and will keep you up to date on our findings. We have also added information about this limitation in our documentation. Thank you!
This would be great to have
6 votes1 comment · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Thank you for your feedback! We are reviewing this request and will keep you updated. Can you tell us more about where you want the message to be displayed and what you would customize it to be?
It should also be easy to movhttps://feedback.azure.com/forums/169401-azure-active-directory/suggestions/35058277-allow-for-logical-arrangement-of-conditional-acces rules up and down on the list