Anonymous

My feedback

  1. 389 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    started  ·  45 comments  ·  Azure Key Vault » Managing application secrets  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
    An error occurred while saving the comment
    Anonymous commented  · 

    +1 !!

  2. 11 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    We are designing a feature that will allow Management groups to connect to subscriptions and management groups in different tenants. There is no timeline yet other than it is being planned for the 2nd half of 2019 to be worked on.

    One question we do have is what services in Azure would you like to see supported in the cross tenant scenario? Azure Policy, Blueprints, RBAC Accesses, Security Monitoring, Deployments, etc…

    An error occurred while saving the comment
    Anonymous commented  · 

    Can I ask, has this progressed at all, or was it completely dependant on feedback? As a CSP Partner, with multiple customers, and thus tenants, which my company manages, I'm crying out for cross-tenant management groups. I would see huge value particularly in RBAC, Blueprint, and Policies. Security monitoring would be great as well. As for Deployments, how would that work exactly - does that mean we could perform, say, an ARM template deployment at the management group level? If so, then **** yeah, im all in for that too! Please let me know if progress is being made, and where i might be able to keep track of further developments? Thanks

    Anonymous supported this idea  · 
  3. 149 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  2 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →
  4. 206 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Networking » Azure Front Door Service  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature

  5. 458 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    unplanned  ·  11 comments  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  6. 10 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  Azure Lighthouse  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  7. 579 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Folks,
    Assigning cloud groups to built-in roles is in public preview starting today. Thanks a ton for all the great feedback that you shared with us. Here’s the published documentation -

    https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/roles-groups-concept

    https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/groups-features

    Next steps —> Support for custom roles and on-prem groups. Stay tuned!

    Regards,
    Abhijeet Kumar Sinha
    Azure Active Directory Team

    Anonymous supported this idea  · 
  8. 7 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  9. 127 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    We recently added deny capability to Azure’s RBAC system, in the form of deny assignments that can be set by the system only. The first Azure feature to use deny is BluePrint. We intend to add a configurable deny capability in the future, but have not yet announced any details.

    Cheers,
    /Stuart and Balaji

    Anonymous supported this idea  · 
  10. 52 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Automation » Source control integration  ·  Flag idea as inappropriate…  ·  Admin →
  11. 121 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Signup and Billing  ·  Flag idea as inappropriate…  ·  Admin →
  12. 27 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Storage » Azure PowerShell  ·  Flag idea as inappropriate…  ·  Admin →
  13. 776 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    16 comments  ·  Logic Apps  ·  Flag idea as inappropriate…  ·  Admin →
  14. 379 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    62 comments  ·  Azure Active Directory » Azure AD Join  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  15. 265 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    28 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →

    The work to start showing creation metadata for new resources and modification metadata for existing resources is currently ongoing, but work is required by each resource provider. As a result, we will be pushing resource types out steadily over the next year or so based on each team’s availability. If you have certain resource types that you wish to be prioritized, please create requests on the feedback pages for those services.

    Anonymous supported this idea  · 
  16. 33 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Governance » Azure Blueprints  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  17. 25 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  18. 317 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    39 comments  ·  Azure Active Directory » Domain Join  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    +1!!

    Anonymous supported this idea  · 
  19. 945 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    83 comments  ·  Azure Active Directory » Authentication  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the feedback, we’re currently reviewing this capability to see how we can support RADIUS auth on NPS specifically, for AAD Joined Windows 10 devices to authenticate to WiFi access points

    If there are scenarios beyond the above, please provide the details in the comments


    Ravi

    An error occurred while saving the comment
    Anonymous commented  · 

    +1

    Anonymous supported this idea  · 
  20. 59 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    9 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
← Previous 1

Feedback and Knowledge Base