Thank you for the feedback! Please upvote this feature if you’d like us to add it.Clint Mann shared this idea ·
You can now use the Azure CDN to access blobs with custom domains over HTTPS. See the following article for instructions on how to do so: https://docs.microsoft.com/en-us/azure/storage/storage-https-custom-domain-cdn. Having talked to a number of customers, we concluded that this solution addresses many scenarios where the need for HTTPS access to blobs with custom domains exists.
Native Azure Storage support for using SSL to access blobs at custom domains is still on our backlog. We would love to hear about your scenarios where using the Azure CDN is not an acceptable solution, either by posting on this thread or sending us an email at firstname.lastname@example.org.Clint Mann commented
This is mind blowing that Microsoft has not implemented this! And the status as of May 2017 is "Under Review" and not "Completed" or even "Started". What an epic fail. Azure could dominate the internet if only Microsoft really really wanted it to. We will see.
We’re currently scoping out this feature and the possibility of getting this in the backlog.
We hope to have an update on this by summer 2017.
UPDATE: Just wanted to clarify, this would only work for local accounts as social identity providers (Facebook, Google, etc) don’t support this. We’d appreciate to comments from you guys on whether you are aware and ok with this limitation or get feedback on what you’d expect to see otherwise.
Development is underway for a new “Custom Domains” blade in Azure AD B2C which will allow you to add a domain, verify it and upload an SSL certificate that will be used to serve up the login page from the custom domain.
We’re currently hoping to have this available by summer 2017.
If there are specific requirements or scenarios that you’re interested in, please make sure to call them out in the comments section so that we can keep those in mind.
Thank you for your feedback!
We would like to add API Key support to App Service authentication/authorization. I am placing this item in “unplanned” to be used in future planning sessions.
Azure App Service Team
Thanks for the feedback. We’re working on this. We started with the top bar, then added favorites, and continued by shrinking the list of resources after opening the resource blade. Much more is in the works — all based on your feedback. Keep it coming and, in the meantime, we’ll keep working on this to streamline the experience for you.
We’ll definitely do this