Martin Wüthrich

My feedback

  1. 676 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    93 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →

    Due to various technical limitations, the first iteration of the customer-owned domains functionality will not be available for a few more months. We will provide an update as soon as we can get a more specific ETA.

    If you are looking to use custom domains to use javascript, we are now looking to enable that experience by providing a new (non-customizable) domain. Please look for updates here: https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/15493536-add-support-for-javascript-inside-the-custom-ui-br

    /Parakh

    Martin Wüthrich supported this idea  · 
  2. 1,453 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    161 comments  ·  Azure Active Directory » SaaS Applications  ·  Flag idea as inappropriate…  ·  Admin →

    We’re continuing to investigate options for adding this support. There are technical challenges to overcome in order to make this happen. We thank you for all your valuable comments so far, and welcome any additional feedback you have on what are the most important use cases involved with these scenarios.

    Martin Wüthrich supported this idea  · 
  3. 278 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    We have released a public preview of custom roles with support for a handful of permissions related to managing application registrations. We’re now working on support for enterprise application management permissions, and will continue to release more permissions iteratively over time.

    https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/roles-custom-overview

    We very much appreciate all of your feedback here. We’re not done yet, so please keep letting us know what you think and where we can improve.

    Regards,
    Vince Smith
    Azure Active Directory team

    Martin Wüthrich supported this idea  · 
  4. 119 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    20 comments  ·  Azure Active Directory » Devices  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for your feedback. We are looking into it and evaluating different options for solving the use cases mentioned in this thread. We will update this thread once we have more information to share.

    Martin Wüthrich supported this idea  · 
    Martin Wüthrich commented  · 

    yes, would love that too.
    the existing cmdlet Restore-AzureADMSDeletedDirectoryObject should be renamed until then, it's kind of misleading with "Objects" when it does only cover specific O365 groups

  5. 24 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Active Directory » Authentication  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Wüthrich supported this idea  · 
  6. 2 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Martin Wüthrich supported this idea  · 
  7. 5 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Martin Wüthrich supported this idea  · 
  8. 1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory » B2B  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Wüthrich shared this idea  · 
  9. 15 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Wüthrich supported this idea  · 
  10. 26 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    7 comments  ·  Azure Active Directory » B2B  ·  Flag idea as inappropriate…  ·  Admin →

    This is good feedback and is in our backlog but not currently under development. While we work on prioritizing/designing the feature, it’s helpful to hear from you how you would use this information in your scenarios. Please let us know by adding comments here.

    Thanks,
    Elisabeth

    Martin Wüthrich commented  · 

    this would be highly needed. but please do not set an existing attribute automatically. It would be great to have an additional attribute like "InvitedBy"

    Martin Wüthrich supported this idea  · 
  11. 26 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Azure Monitor-Log Analytics  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Wüthrich supported this idea  · 
  12. 367 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Martin Wüthrich supported this idea  · 
  13. 36 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Wüthrich commented  · 

    As another contributor already suggested:
    This affects all User Accounts within a Azure AD. We need to be able to alert, if a specific user logs uses the Azure AD as an identity provider.
    If you read the following article of Microsoft carefully:
    https://support.office.com/en-us/article/protect-your-office-365-global-administrator-accounts-6b4ded77-ac8d-42ed-8606-c014fd947560
    You will find, that Microsoft recommends to use specfic, cloud only Accounts for the permanent Global Administrator assignment. And that you should avoid conditional Access on those, to make sure the Fallback Admins will work, if your Admin Account doesn't.
    So with no CA, and maybe also without MFA, we have Global Administrator Accounts with only a Password.
    This leads to the fact: We need to be alerted as fast as possible, if one of those Fallback Accounts is used for authentication, because they should not be used, until an emergency.

    Martin Wüthrich supported this idea  · 
  14. 26 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    7 comments  ·  Azure Cloud Shell » PowerShell  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Wüthrich supported this idea  · 
  15. 119 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    9 comments  ·  Azure Active Directory » Domain Join  ·  Flag idea as inappropriate…  ·  Admin →

    We’re currently working on this capability and will provide an update when it’s done.

    However, instead of expanding the “Additional Local administrators” setting, we will support adding AAD groups to Windows 10 local groups (.e.g Administrators, Remote Desktop Users) via MDM policy and elevate user privileges on logon. This will provide greater flexibility to assign different groups to different devices


    Ravi

    Martin Wüthrich commented  · 

    and thus there are huge organization, and they only want to have a reasonable amount of admin per device:
    Please make the group assignment more finegrained, so that I can add only the Asia IT on the ASIA Devices. Maybe connect it with:
    Administrative Units?
    https://docs.microsoft.com/en-us/azure/active-directory/active-directory-administrative-units-management

    Martin Wüthrich supported this idea  · 
  16. 48 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Martin Wüthrich commented  · 

    Yes, this is highly requested. To be able to delete a Device (Azure AD Join or Device Registration), you will need to be Global Administrator.

    Martin Wüthrich supported this idea  · 
  17. 1,825 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  83 comments  ·  Azure Backup  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Wüthrich supported this idea  · 
  18. 1,593 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    69 comments  ·  Networking » IPv6  ·  Flag idea as inappropriate…  ·  Admin →

    IPv6 in Azure VNET is currently previewing globally- in ALL Azure Public cloud regions.

    Announcement (Service Update): https://azure.microsoft.com/en-us/updates/public-preview-microsoft-adds-full-ipv6-support-for-azure-vnets/

    Links to Documentation & Samples
    Full documentation including sample scripts is available here: https://aka.ms/IPv6ForAzureVNETdoc

    A sample JSON template is posted in the quickstart repository: https://azure.microsoft.com/en-us/resources/templates/ipv6-in-vnet/

    Martin Wüthrich commented  · 

    Yes, many of the Microsoft Service do not Support IPv6, an example is also DirSync, which is often used in Hybrid Scenarios.

    Martin Wüthrich supported this idea  · 

Feedback and Knowledge Base