Anonymous

My feedback

  1. 117 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    16 comments  ·  Data Lake  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  2. 11 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  3. 4 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
    Anonymous commented  · 

    We require our admins to use 'admin' accounts to access privileged functions. Their day to day accounts are separate (i.e. for general productivity applications such as email or line of business application access) ,

    This makes Access Reviews problematic as an admin user might not use their admin account often thus they do not log in to review their Admin Account email in their day to day activities.

    We do configure our Admin Accounts with the Day to Day user account email as an alternate email address in the admin accounts AAD record.

    Thus by being able to request that Access review emails are sent to the alternate address as well / instead of the primary address is a key enabler to ensure that admins are notified when they need to reattest their access.

  4. 44 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  (General Feedback)  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  5. 327 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    10 comments  ·  Storage » General  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  6. 8 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Functions  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
    Anonymous shared this idea  · 
  7. 143 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  8. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  0 comments  ·  Azure Active Directory » Authentication  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous shared this idea  · 
  9. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous shared this idea  · 
  10. 16 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Monitor-Application Insights » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  11. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  1 comment  ·  API Management  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous shared this idea  · 
  12. 8 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous shared this idea  · 
  13. 47 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  14. 55 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  API Management » API management experience  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  15. 23 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  (General Feedback) » Availability  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  16. 231 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Service Bus  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  17. 19 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Security Center  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous commented  · 

    We really would like this one, we have some Azure App Service components, that operate as a custom identity provider. We have code in the App that detects brute force attempts and other anomalous behaviour, but currently we cant send alerts directly Azure Security Centre, (instead we have had to implement a workaround using an Azure hosted linux box as a proxy to send Common Event Format (CEF) alert messages back to security centre). An out of the box integration would be preferred.

    Anonymous supported this idea  · 
  18. 1,355 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    154 comments  ·  Azure Active Directory » SaaS Applications  ·  Flag idea as inappropriate…  ·  Admin →

    We’re continuing to investigate options for adding this support. There are technical challenges to overcome in order to make this happen. We thank you for all your valuable comments so far, and welcome any additional feedback you have on what are the most important use cases involved with these scenarios.

    Anonymous commented  · 

    Key one for me is Nested Group App Role Assignment, our Enterprise App role blades are fairly unmanageable with two or 3 App's requiring a list of over 50 groups per app assigned with the right claim!, we have already had instances where the claims associated with a mobile app and a web app were inconstant, because the admin had set the wrong claim on one of the groups, even being only able to nest 1 level would be a massive step forward,

    Anonymous supported this idea  · 
    Anonymous commented  · 

    Please, add support for assignment of App roles to nested groups, As is stands we have to have a huge list of groups defined on the enterprise application level, this creates quite an overhead, we would prefer to be able to assign access to e.g. a Azure-AG-appname-readonly group assigned the readonly role, and have users in dynamic child groups e.g. Azure-AG-BU-Finance Azure-AG-BU-Sales etc to be automatically assigned the role.

  19. 8 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  2 comments  ·  API Management » Defining APIs  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous shared this idea  · 
  20. 37 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  API Management » Policies  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
← Previous 1

Feedback and Knowledge Base