Anonymous

My feedback

  1. 100 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  2. 430 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    6 comments  ·  Web Apps » App Service Environment  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  3. 295 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  API Management  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  4. 873 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  15 comments  ·  API Management » Developer portal  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  5. 147 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    21 comments  ·  Data Lake  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  6. 18 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  7. 4 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
    An error occurred while saving the comment
    Anonymous commented  · 

    We require our admins to use 'admin' accounts to access privileged functions. Their day to day accounts are separate (i.e. for general productivity applications such as email or line of business application access) ,

    This makes Access Reviews problematic as an admin user might not use their admin account often thus they do not log in to review their Admin Account email in their day to day activities.

    We do configure our Admin Accounts with the Day to Day user account email as an alternate email address in the admin accounts AAD record.

    Thus by being able to request that Access review emails are sent to the alternate address as well / instead of the primary address is a key enabler to ensure that admins are notified when they need to reattest their access.

  8. 37 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  9. 395 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    11 comments  ·  Storage » General  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  10. 8 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Functions  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
    Anonymous shared this idea  · 
  11. 4 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  0 comments  ·  Azure Active Directory » Authentication  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous shared this idea  · 
  12. 3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory » Developer Experiences  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous shared this idea  · 
  13. 19 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Monitor-Application Insights » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  14. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  1 comment  ·  API Management  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous shared this idea  · 
  15. 15 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous shared this idea  · 
  16. 64 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  17. 60 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  API Management » API management experience  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  18. 11 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Key Vault  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  19. 20 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Security Center  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    We really would like this one, we have some Azure App Service components, that operate as a custom identity provider. We have code in the App that detects brute force attempts and other anomalous behaviour, but currently we cant send alerts directly Azure Security Centre, (instead we have had to implement a workaround using an Azure hosted linux box as a proxy to send Common Event Format (CEF) alert messages back to security centre). An out of the box integration would be preferred.

    Anonymous supported this idea  · 
  20. 2,014 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    416 comments  ·  Azure Active Directory » SaaS Applications  ·  Flag idea as inappropriate…  ·  Admin →

    We’re currently evaluating an option that will provide the functionality offered by nested groups, but removes the complexity nested groups adds. We appreciate your patience on this ask and want to ensure we deliver a solution that benefits all of our customers. Below are use cases that we’d like for you to stack rank, with #1 being priority for you. We thank you for the continued comments and feedback.

    Use case A: nested group in a cloud security group inherits apps assignment
    Use case B: nested group in a cloud security group inherits license assignment
    Use case C: nesting groups under Office 365 groups

    An error occurred while saving the comment
    Anonymous commented  · 

    Key one for me is Nested Group App Role Assignment, our Enterprise App role blades are fairly unmanageable with two or 3 App's requiring a list of over 50 groups per app assigned with the right claim!, we have already had instances where the claims associated with a mobile app and a web app were inconstant, because the admin had set the wrong claim on one of the groups, even being only able to nest 1 level would be a massive step forward,

    Anonymous supported this idea  · 
    An error occurred while saving the comment
    Anonymous commented  · 

    Please, add support for assignment of App roles to nested groups, As is stands we have to have a huge list of groups defined on the enterprise application level, this creates quite an overhead, we would prefer to be able to assign access to e.g. a Azure-AG-appname-readonly group assigned the readonly role, and have users in dynamic child groups e.g. Azure-AG-BU-Finance Azure-AG-BU-Sales etc to be automatically assigned the role.

← Previous 1

Feedback and Knowledge Base