SME
My feedback
-
807 votes
Hi everyone,
Thanks for your interest on this feature. This capability is still in the pipeline. The initial estimate was obviously off and we are looking at a new timeline. We are aware of the benefit of having this rollover made automatic and the interest you have on the feature, and that’s how we are looking at it while prioritizing it against other capabilities requests.
Thanks for your patience!Jairo Cadena
Principal Program Manager
Microsoft IdentityAn error occurred while saving the comment SME supported this idea ·
-
33 votes
SME shared this idea ·
-
64 votes
Thanks for the feedback. This is something we are thinking about.
SME supported this idea ·
-
44 votes
We understand the gap, and are actively reviewing the scenario around password expiry notifications
SME supported this idea ·
-
46 votes
Hey folks, thanks for the interest in this, and we have some good news to share. Configurable lockout is in development now (mostly done, actually) and we’re aiming for June or July public preview.
For configurable password complexity, length, etc, we hear you. Longer passwords are in planning now, and we’re thinking about our approach to how we want to enable the other configurability features. I don’t have any more details to share on this for now, but we do have interest in building features.
SME supported this idea ·
-
137 votes12 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
SME supported this idea ·
-
60 votes
We are currently testing a solution for this and will likely be able to provide this in the coming months.
SME supported this idea ·
-
265 votes
We are currently investigating how to implement this. The expiration status is not a directory attribute so it is not straight forward how to sync it.
SME supported this idea ·
-
220 votes39 comments · Azure Active Directory » Groups/Dynamic groups · Flag idea as inappropriate… · Admin →
We are investigating what it would take to add support for multi-value attributes in Dynamic Groups to enable this and related scenarios.
Kristina Bain Smith
SME supported this idea ·
-
459 votes55 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hey folks! Thank you for your feedback. We are reviewing this ask and will keep you up to date on our findings. We have also added information about this limitation in our documentation. Thank you!
SME supported this idea ·
-
397 votes52 comments · Azure Active Directory » Developer Experiences · Flag idea as inappropriate… · Admin →
SME supported this idea ·
-
229 votes20 comments · Azure Active Directory » Developer Experiences · Flag idea as inappropriate… · Admin →
Thank you for the feedback! This is in the backlog and we are looking into this. We don’t have an ETA yet, but we will share once we have one. Please keep voting if this feature matters to you.
SME supported this idea ·
-
281 votes33 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hi folks! I apologies for the delay in response and I deeply appreciate your feedback. I understand how important this feature is for your and your users. We do not yet have plans to implement this feature, but please keep voting if this is important to you to help us prioritize appropriately.
SME supported this idea ·
-
179 votes21 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
We are planning to re-design the self-service password reset experience. The new experience will be mobile-friendly! We’ll keep you up to date as we make progress.
SME supported this idea ·
-
315 votes36 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hi folks – apologies for the lack of updates here. This work is still in progress but unfortunately we don’t have an ETA that we can share yet. We will update as soon as we do. Thanks!
SME supported this idea ·
-
217 votes
We hear you loud and clear! We know this is a frequent ask and we do have this on our backlog. Unfortunately, I don’t have a timeline to share right now.
SME supported this idea ·
-
661 votes
We are aware of the requirement to be able to convert a synced user to cloud only and are designing that feature, but we have no timelines to share right now.
We reverted the change that would block the “hack” to delete and restore a user to change a user to “Cloud Only”.SME supported this idea ·
-
351 votes
Currently, we are not aware of any plans from Windows Server for this capability. We’ll continue to work with Windows Server to revisit this in the near future
SME supported this idea ·
-
1,013 votes132 comments · Azure Active Directory » User Creation, Deletion, and Profile Management · Flag idea as inappropriate… · Admin →
Thank for letting us know this is important to you. This is something we are considering, but there is no timeline yet. We would love to hear more about the specific scenarios that this is needed for, so keep providing info.
SME supported this idea ·
-
584 votes65 comments · Azure Active Directory » Groups/Dynamic groups · Flag idea as inappropriate… · Admin →
Our feature team is looking into options for addressing this scenario, but we do not yet have any timelines to share. For now as a workaround, you can manually trigger the reprocessing by updating the membership rule to add a whitespace at the end. We’ve also added the ability to check the membership processing status, to keep track of the status and know if processing is complete.
SME supported this idea ·
Please implement modern authentication (like login with certificate) to logon on AzureAD as soon as possible.