Christian Barnes

My feedback

  1. 829 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Christian Barnes supported this idea  · 
    An error occurred while saving the comment
    Christian Barnes commented  · 

    Hi Microsoft- please build this in soon!

    It should allow me to schedule an internal user to be expired at a certain time (for example 17.30) on their leaving date.
    It should also allow me to expire guest accounts after X Days/Weeks/Months.

    Thanks in advance.

  2. 96 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    15 comments  ·  Azure Active Directory » End user experiences  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Christian Barnes commented  · 

    This is absolutely essential- especially for THE cloud identity provider.

    Like most comments on here- my organisation also has specific password requirements currently not being met by cloud only Azure AD.

    Microsoft- please see this and at least consider it!

    Microsoft- please see this

    Christian Barnes supported this idea  · 
  3. 12 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Authentication  ·  Flag idea as inappropriate…  ·  Admin →
    Christian Barnes supported this idea  · 
  4. 43 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    8 comments  ·  Azure Active Directory » End user experiences  ·  Flag idea as inappropriate…  ·  Admin →

    Hey folks, thanks for the interest in this, and we have some good news to share. Configurable lockout is in development now (mostly done, actually) and we’re aiming for June or July public preview.

    For configurable password complexity, length, etc, we hear you. Longer passwords are in planning now, and we’re thinking about our approach to how we want to enable the other configurability features. I don’t have any more details to share on this for now, but we do have interest in building features.

    Christian Barnes supported this idea  · 
    An error occurred while saving the comment
    Christian Barnes commented  · 

    This is an absolute must- especially for THE cloud identity provider!

    Microsoft- it's great you've listened and reviewed this but it's now 2 yrs later and still no update?
    Please expedite both admin configurable complexity requirements and configurable lockout options as requested above.

    Thanks.

  5. 2,230 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    458 comments  ·  Azure Active Directory » SaaS Applications  ·  Flag idea as inappropriate…  ·  Admin →

    We’re currently evaluating an option that will provide the functionality offered by nested groups, but removes the complexity nested groups adds. We appreciate your patience on this ask and want to ensure we deliver a solution that benefits all of our customers. Below are use cases that we’d like for you to stack rank, with #1 being priority for you. We thank you for the continued comments and feedback.

    Use case A: nested group in a cloud security group inherits apps assignment
    Use case B: nested group in a cloud security group inherits license assignment
    Use case C: nesting groups under Office 365 groups

    An error occurred while saving the comment
    Christian Barnes commented  · 

    A
    ...
    C
    B

    A is the most important- need the ability to assign enterprise applications to cloud security groups that are nested within other cloud security groups. C would also be useful but considerably less than A.

    Christian Barnes supported this idea  · 
    An error occurred while saving the comment
    Christian Barnes commented  · 

    This is a MUST!!!!

    Has anyone heard of an update from Microsoft on this?

  6. 184 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    30 comments  ·  Azure Active Directory » Devices  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for your feedback. We are looking into it and evaluating different options for solving the use cases mentioned in this thread. We will update this thread once we have more information to share.

    An error occurred while saving the comment
    Christian Barnes commented  · 

    Yes, please can we have this ASAP? An intune enrolled device was recently incorrectly deleted and we have no way to undo this.

    This is a must!

    Christian Barnes supported this idea  · 
  7. 34 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Storage » Blobs  ·  Flag idea as inappropriate…  ·  Admin →
    Christian Barnes supported this idea  · 
  8. 15 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  (General Feedback) » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Christian Barnes supported this idea  · 
  9. 998 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    89 comments  ·  Azure Active Directory » Authentication  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the feedback, we’re currently reviewing this capability to see how we can support RADIUS auth on NPS specifically, for AAD Joined Windows 10 devices to authenticate to WiFi access points

    If there are scenarios beyond the above, please provide the details in the comments


    Ravi

    Christian Barnes supported this idea  · 

Feedback and Knowledge Base