Richard Harrison
My feedback
-
369 votes
This remains on our long-term backlog as something we want to offer
-Mario [MSFT]
Richard Harrison supported this idea ·
-
3 votes0 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
Richard Harrison shared this idea ·
-
19 votes
Richard Harrison supported this idea ·
-
54 votes
Marking this as part of our backlog. The votes and comments about how you would use this are really helpful, please keep voting/commenting if this is an interesting scenario for you.
/Elisabeth
An error occurred while saving the comment Richard Harrison supported this idea ·
-
1,428 votes283 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
We have released the Authentication administrator and Privileged authentication administrator roles that can manage the authentication methods of the user. If you are using Azure AD Premium, consider enforcing MFA on the user using Conditional Access. We are continuing to work on other roles that will let you manage other MFA settings.
Richard Harrison supported this idea ·
-
994 votes
We’ve recently picked up this work again and apologize for the lack of updates.
The approach we previously pursued did not work well and we’re re-pivoting to a different solution that will enable custom domains to be easier to set up and manage.
We hope to have this ready for a public preview late-2020 or early-2021.
Richard Harrison supported this idea ·
-
2,411 votes
We’re currently evaluating an option that will provide the functionality offered by nested groups, but removes the complexity nested groups adds. We appreciate your patience on this ask and want to ensure we deliver a solution that benefits all of our customers. Below are use cases that we’d like for you to stack rank, with #1 being priority for you. We thank you for the continued comments and feedback.
Use case A: nested group in a cloud security group inherits apps assignment
Use case B: nested group in a cloud security group inherits license assignment
Use case C: nesting groups under Office 365 groupsRichard Harrison supported this idea ·
-
1,121 votes
We continue evaluating several alternatives to provide full email customization. We are actively working on an alternative.
Unfortunately we do no yet have an ETA.
Richard Harrison supported this idea ·
-
1,674 votes
We definitely recognize the popularity of this feature, and we discuss it constantly during the planning phases. However there are certain technical limitations in the system that add a large amount of development cost. Because of the cost and the fact that there is a workaround available, other features get prioritized over this one.
That being said, please keep voting for it. The popularity of the feature does help bring it up and makes us reconsider every time.
Apologies for the delay.
/Parakh
Old message:
We’re doing some research both on the specifics of this ask as well as what it would take to support this.
Is the ask here to do the same thing that regular Azure AD does (see: https://blogs.technet.microsoft.com/enterprisemobility/2014/12/18/azure-active-directory-now-with-group-claims-and-application-roles/) or is are there different requirements around this for Azure AD B2C?Richard Harrison supported this idea ·
-
885 votes127 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
We’re really pleased to let you know that we’ve released the first authentication method APIs to public preview:
https://docs.microsoft.com/graph/api/resources/authenticationmethods-overview
So far there are APIs for managing phone numbers and password resets. When phone numbers are set with the API, the user can use that number for MFA and SSPR (as allowed by your tenant’s policy).
The team is hard at work at building out APIs for all of the other authentication methods, and we’ll update the response here as they’re released.
An error occurred while saving the comment Richard Harrison commented
Any ETA on this capability. My organization is considering moving to a new AAD tenant for marketing and legal reasons. I would like to use Microsoft Graft to extract current AAD user MFA information using Get and then reload users in new AAD tenant and use Set functionality to reapply MFA configuration settings avoiding requiring entire AAD user community reregistering for AAD MFA. Will this be possible once the Graph API exposes MFA data??? ETA please
Richard Harrison supported this idea ·
-
268 votes34 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
We are currently working on a method to allow users to sign in while their authentication methods are temporarily unavailable.
Richard Harrison shared this idea ·
-
2 votes
Richard Harrison shared this idea ·
It would also be helpful if the usertype is member instead of guest if fields like EmployeeID would be retrieved through the process. Since these users are a part of our 'organization' not guest I would like to see more information.