AdminAzure AD Team (Product Manager, Microsoft Azure)

My feedback

  1. 3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Device Registration  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure AD Team (Product Manager, Microsoft Azure) commented  · 

    Hi, could you clarify this more?

  2. 4 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Terms of Use  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure AD Team (Product Manager, Microsoft Azure) commented  · 

    Hi Tony,

    We are working to provide more granular control for enforcing CA policies in general. Rather then applying a CA control like TOU or MFA at the app level, you would be able to apply it at some scoped permission with the app.

  3. 462 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    26 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    AdminAzure AD Team (Product Manager, Microsoft Azure) commented  · 

    We are working on this for conditional access policy and named locations now. API support for what if is something we've discussed but not on the near-term roadmap.

  4. 73 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Today, you can use conditional access to enforce MFA on a per-group basis. This is Microsoft’s recommended enforcement model.
    We will be updating the per-user enforcement of MFA to more closely match how conditional access works, but this is still in the design phase.

    Richard

    AdminAzure AD Team (Product Manager, Microsoft Azure) commented  · 

    Today, you can use conditional access to enforce MFA on a per-group basis. This is Microsoft's recommended enforcement model.
    We will be updating the per-user enforcement of MFA to more closely match how conditional access works, but this is still in the design phase.

  5. 37 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    AdminAzure AD Team (Product Manager, Microsoft Azure) commented  · 

    Our recommended approach to this situation is to not install MFA Server on premise. You can install the MFA adapter for NPS, which will proxy RADIUS request to Azure MFA in the cloud. This will support VPN or other RADIUS needs on-premise. https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-nps-extension

  6. 57 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    AdminAzure AD Team (Product Manager, Microsoft Azure) commented  · 

    We'll take this in consideration as we plan new features. In the short term, we are working on Graph API's that will allow you to change phone numbers in the StrongAuthentication fields.

  7. 293 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    AdminAzure AD Team (Product Manager, Microsoft Azure) commented  · 

    The MFA team is currently working on adding get/set/read/delete abilities for StrongAuthentication data to the Graph API.

  8. 133 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    AdminAzure AD Team (Product Manager, Microsoft Azure) commented  · 

    Azure MFA is currently designing the experience for FIDO 2.0. This is the next iteration of the FIDO U2F standard that the link references.

Feedback and Knowledge Base