Anonymous
My feedback
-
350 votes44 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
The MFA team is currently working on adding get/set/read/delete abilities for StrongAuthentication data to the Graph API.
Richard
Anonymous supported this idea ·
-
88 votesplanned · 10 comments · Azure Active Directory » Conditional Access · Flag idea as inappropriate… · Admin →
Anonymous supported this idea ·
-
493 votes42 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
For requiring additional factors with Windows Hello for Business, please see – https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock
For why PIN is better than a password, please see https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password
For Authenticator app sign in to Azure AD, please see https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-phone-sign-in
As always, other feedback is welcome
/Ravi
Anonymous supported this idea ·
-
466 votes
We’re working on a solution and will update you when we know more.
Anonymous supported this idea ·
-
16 votes
Anonymous supported this idea ·
-
110 votes17 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
Anonymous supported this idea ·
-
335 votes46 comments · Azure Active Directory » Role-based Access Control · Flag idea as inappropriate… · Admin →
Just wanted to post another update that this is a high priority, but we do not have any details to announce yet.
Cheers,
/Stuart and VinceAnonymous supported this idea ·
-
84 votes
Anonymous supported this idea ·
-
7 votes
We are hoping to do this! Please upvote it!
Anonymous supported this idea ·
-
51 votes
We definitely want to support AAD! Please vote this request up if you’d like to see it in the app.
Thank you for your feedback!
Anonymous supported this idea ·
-
624 votes36 comments · Azure Active Directory » Groups/Dynamic groups · Flag idea as inappropriate… · Admin →
Thank you for your feedback! The feature team is aware of this suggestion and will keep it under consideration. There are technical challenges to overcome in order to make this happen. Please keep the votes coming if this feature matters to you.
Chen
Anonymous supported this idea ·
-
932 votes180 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
This feature is now on the roadmap. The MFA team is planning to adjust admin roles or create a new role that will allow delegation of MFA registration and credentials to an admin role.
Anonymous supported this idea ·
-
1,371 votes
We’re continuing to investigate options for adding this support. There are technical challenges to overcome in order to make this happen. We thank you for all your valuable comments so far, and welcome any additional feedback you have on what are the most important use cases involved with these scenarios.
Anonymous supported this idea ·
-
226 votes34 comments · Azure Active Directory » Groups/Dynamic groups · Flag idea as inappropriate… · Admin →
Our feature team is looking into options for addressing this scenario, but we do not yet have any timelines to share. For now as a workaround, you can manually trigger the reprocessing by updating the membership rule to add a whitespace at the end. We’ve also added the ability to check the membership processing status, to keep track of the status and know if processing is complete.
Anonymous supported this idea ·
-
1,233 votes239 comments · Azure Active Directory » End user experiences · Flag idea as inappropriate… · Admin →
Folks,
Thanks for the questions and suggestions. And apologies for not sharing any update on this thread for so long. We’ve been working on this problem and have announced changes on our official team blog (see here: https://cloudblogs.microsoft.com/enterprisemobility/2016/09/15/cleaning-up-the-azure-ad-and-microsoft-account-overlap/).
First, we are acutely aware of the UX pain this is causing and we are sorry for this. We are trying to undo a decade and a half of systems divergence. There are literally hundreds of different engineering teams across Microsoft involved in this effort. So this is taking time.
Second, we can’t easily “merge” two accounts, or allow IT to “take over” personal Microsoft accounts. There are two main hurdles: (1) The terms of service are fundamentally different for the two account types and (2) they are based on different technologies with different stacks (different identifiers, SDKs, token formats, etc.). We’re working to converge the two stacks but again this…
Anonymous supported this idea ·
-
610 votes
We’ll be wrapping up work soon, after making updates from feedback we’ve received so far. We should have a public date soon.
-Caleb
Anonymous supported this idea ·
-
461 votes51 comments · Azure Active Directory » User Creation, Deletion, and Profile Management · Flag idea as inappropriate… · Admin →
Anonymous supported this idea ·
-
24 votes
Anonymous supported this idea ·
Would like an update on this.