Anonymous

My feedback

  1. 111 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    8 comments  ·  Networking » VPN Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  2. 208 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    24 comments  ·  Azure Active Directory » Azure AD Connect  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  3. 62 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    10 comments  ·  Azure Active Directory » Admin Portal  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    I agree this would be immensely handy - find inactive accounts, etc.

    Can't be that hard to enable.

    Anonymous supported this idea  · 
  4. 37 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    An error occurred while saving the comment
    Anonymous commented  · 

    A smart attack approach would be to create app passwords where possible. Most users wouldn't even know they have one, and if you named it something like "HelpDesk - Do Not Delete" they would leave it alone even if they found it.

    Now you've got a login that bypasses MFA, and is not affected by password change.

    This is a crazy state to leave app passwords in!

    Anonymous supported this idea  · 
  5. 961 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  Azure AD Team responded

    Thank you for your feedback! The feature team is aware of this suggestion and will keep it under consideration. There are technical challenges to overcome in order to make this happen. Please keep the votes coming if this feature matters to you.

    Chen

    An error occurred while saving the comment
    Anonymous commented  · 

    Hi there,
    any word on this request?

    Thanks.

    Anonymous supported this idea  · 
  6. 209 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    46 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    Any word?

    Anonymous supported this idea  · 
    An error occurred while saving the comment
    Anonymous commented  · 

    An update on this would be nice.

    An error occurred while saving the comment
    Anonymous commented  · 

    yes please.

  7. 83 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Azure Active Directory » PowerShell  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    Any update on this?

    Anonymous supported this idea  · 
  8. 1,245 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    An error occurred while saving the comment
    Anonymous commented  · 

    Seems to work ok for me. I've assigned Authentication Administrator role via PIM and once user requests elevation the MFA options are visible via AAD.

    Looks like this may finally be sorted! :)

    Anonymous supported this idea  · 
  9. 26 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    An error occurred while saving the comment
    Anonymous commented  · 

    How are you supposed to report on PIM?

    Anonymous supported this idea  · 

Feedback and Knowledge Base