Mike

My feedback

  1. 15 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Mike commented  · 

    Please add this functionality as I am trying to do more or less the same thing; exclude users from accessing O365 / Azure via unmanaged devices if they've not registered for MFA.

    My current solution is proper-nasty involving PS searching AAD, csv exports and adding a string to an extension attribute in on-prem AD for an AAD dynamic group to look for after AAD Connect has replicated it up.

    It would be sooo much slicker if it could all be done in AAD.

    Mike supported this idea  · 
  2. 6 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  3 comments  ·  Azure Active Directory » Role-based Access Control  ·  Flag idea as inappropriate…  ·  Admin →
    Mike shared this idea  · 
  3. 14 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Mike commented  · 

    User admin team is resourced with junior support staff and apprentices, we can't give Global Admin to this team, desperately need to delegate the task of user MFA management to non-global admins.

    Mike supported this idea  · 
  4. 965 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Mike supported this idea  · 

Feedback and Knowledge Base