John Crim

My feedback

  1. 897 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    21 comments  ·  Service Fabric  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim supported this idea  · 
  2. 4 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature backlog and also gives us insight into the potential impact of implementing the suggested feature.

    John Crim supported this idea  · 
  3. 48 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    7 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →

    Thank you for taking the time to vote on this request. Work on this has commenced. We will email you once it is completed. Feel free to reach out if you have any additional feedback.

    If you are interested in participating in the preview of this feature please email back.

    John Crim supported this idea  · 
    John Crim commented  · 

    I don't know how to "email back" here, but I'd like to included in the preview.

    I would really like to see a "return the diff" API/Powershell Cmdlet for deploying ARM templates. Then we could implement logic to do nothing or deploy in different ways based on changes.

    For example, Azure Service Fabric resources can't be updated at all (even with a 0 change ARM template) if the cluster size is < 3. If we could detect that there are no changes, we could skip that deployment.

  4. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim commented  · 

    Isn't this supported by using ARM template complete mode:
    https://docs.microsoft.com/en-us/azure/azure-resource-manager/deployment-modes

  5. 4 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Service Fabric  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim shared this idea  · 
  6. 3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Key Vault » Certificates  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim commented  · 

    This is partly supported now (in C# lib and the APIs, apparently), and also partly covered by other feedback items (https://feedback.azure.com/forums/906355-azure-key-vault/suggestions/36101572-support-encryption-decryption-for-elliptic-curve-c).

    But the current support isn't enough:
    * Currently you can't import an EC cert via powershell
    * Currently you can't generate an EC cert via the Azure portal
    * There are limitations on the operations that can be listed on an EC cert

    John Crim supported this idea  · 
  7. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Key Vault » Certificates  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim supported this idea  · 
  8. 5 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Key Vault » Certificates  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim shared this idea  · 
  9. 3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Key Vault » Certificates  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim supported this idea  · 
  10. 28 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Key Vault » Other  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim supported this idea  · 
  11. 50 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Azure Key Vault  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim supported this idea  · 
  12. 11 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Key Vault » Other  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim supported this idea  · 
  13. 228 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    John Crim supported this idea  · 
  14. 112 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    10 comments  ·  Security and Compliance  ·  Flag idea as inappropriate…  ·  Admin →
    John Crim supported this idea  · 

Feedback and Knowledge Base