Jack

My feedback

  1. 42 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Site Recovery  ·  Flag idea as inappropriate…  ·  Admin →
    Jack shared this idea  · 
  2. 9 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Government » Feature Request  ·  Flag idea as inappropriate…  ·  Admin →
    Jack supported this idea  · 
  3. 370 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    started  ·  15 comments  ·  Site Recovery  ·  Flag idea as inappropriate…  ·  Admin →
    Jack supported this idea  · 
  4. 14 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure portal  ·  Flag idea as inappropriate…  ·  Admin →
    Jack supported this idea  · 
  5. 11 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Azure Backup » Management  ·  Flag idea as inappropriate…  ·  Admin →
    Jack shared this idea  · 
  6. 3,627 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    141 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →
    Jack supported this idea  · 
  7. 194 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    unplanned  ·  15 comments  ·  Azure Backup  ·  Flag idea as inappropriate…  ·  Admin →
    Jack supported this idea  · 
  8. 53 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    11 comments  ·  Azure portal » Resource management  ·  Flag idea as inappropriate…  ·  Admin →

    The portal uses cross-origin resource sharing (CORS) to communicate to back-end services directly from the browser. We are working with our partner teams to get a full list of URLs required to manage your resources in the portal. Here are a few known URLs:

    *.azure.com
    *.azure.net
    *.windows.net
    *.azurecomcdn.net
    *.azureedge.net
    *.msecnd.net
    login.microsoftonline.com
    login.live.com

    Third-party services:

    *.sendgrid.com
    *.newrelic.com

    Please let us know if we missed any.

    Jack supported this idea  · 
  9. 11 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    14 comments  ·  Lab Services  ·  Flag idea as inappropriate…  ·  Admin →
    Jack supported this idea  · 
  10. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Azure Marketplace » Ecosystem  ·  Flag idea as inappropriate…  ·  Admin →
    Jack shared this idea  · 
  11. 103 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    10 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    Jack supported this idea  · 
  12. 11 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Lab Services  ·  Flag idea as inappropriate…  ·  Admin →
    Jack shared this idea  · 
  13. 118 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    unplanned  ·  20 comments  ·  System Center Data Protection Manager  ·  Flag idea as inappropriate…  ·  Admin →
  14. 6 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    Jack shared this idea  · 
  15. 368 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    13 comments  ·  Networking » Virtual Network  ·  Flag idea as inappropriate…  ·  Admin →
    Jack supported this idea  · 
  16. 534 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    20 comments  ·  Networking » Virtual Network  ·  Flag idea as inappropriate…  ·  Admin →
    Jack shared this idea  · 
  17. 1,526 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    156 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Jack supported this idea  · 
  18. 3,087 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    125 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    Hi everyone,

    We recently announce the General Availability of Azure Active Directory Domain Services (Azure AD DS) authentication for Azure Files! By enabling integration with Azure AD DS, you can mount your Azure file share over SMB using Azure AD credentials from Azure AD DS domain joined Windows VMs with NTFS ACLs enforced. For more details, please refer to our blog post:http://aka.ms/azure-file-aadds-authentication-ga-blog.

    A part of the GA announcement, we shared the upcoming plan to extend the authentication support to Active Directory (AD) either hosted on-premises or in cloud. If you need an Azure Files solution with AD authentication today, you can consider installing Azure File Sync (AFS) on your Windows File Servers where AD integration is fully supported.

    If you are interested to hear future updates on Azure Files Active Directory Authentication, please complete this sign-up survey:https://aka.ms/AzureFilesADAuthPreviewSurvey.

    Thanks,
    Azure Files Team

    Jack commented  · 

    Or if it is not feasible to utilize Azure AD, at least have the ability to generate unique keys per share.

    Jack commented  · 

    I have seen a lot of customers ask if Azure Files could be integrated with Azure AD authentication vs the standard Storage Account name/key. With the current model of Azure Files, it would be a security risk to create more than 2 File Shares as we don't have enough unique storage keys for each share.

    Jack supported this idea  · 
  19. 3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  0 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    Jack shared this idea  · 

Feedback and Knowledge Base