David S.

My feedback

  1. 8 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  (General Feedback) » azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
    David S. supported this idea  · 
  2. 228 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    47 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    David S. supported this idea  · 
    An error occurred while saving the comment
    David S. commented  · 

    Any update with blocking anonymous IP addresses this is a large security concern, and has been over 19 months since the last update

  3. 601 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    65 comments  ·  Azure Active Directory » Azure AD Connect  ·  Flag idea as inappropriate…  ·  Admin →
    started  ·  Azure AD Team responded

    We’re working on a solution and will update you when we know more.

    David S. supported this idea  · 
  4. 321 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Hi folks,
    Just a quick update here. We’re still actively working on support for custom roles (RBAC) across Azure AD. Stay tuned for more announcements in the next couple of months.

    You can have a look at what we’ve shipped thus far (custom roles for application registration management) here – https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/roles-custom-overview.

    Regards,
    Vince Smith
    Azure Active Directory Team

    David S. supported this idea  · 
  5. 97 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    An error occurred while saving the comment
    David S. commented  · 

    Any update MS? Anyone that planning to use OATH tokens with large bulk deployment can not activate each token one at a time since it would consume a huge amount of time for the global admins. Why can't global admin's upload the all the required info as with the csv and let the user activate the assigned token like another MFA method. Maybe it's not an issue after you done deploying your tokens to make changes to one or two tokens, but if your deploying 2000+ tokens I could not think about the amount of time it would take to activate each token one at at time.

    David S. supported this idea  · 
  6. 92 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    David S. supported this idea  · 

Feedback and Knowledge Base