25 votes3 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
We are currently working to address #2 – granular controls for which group of users can use which methods. We’ll keep you up to date as we make progress. Thanks!Anonymous commented
Is there any news here?
30 votes5 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hi folks! I apologize for the delay in response here. This work is still planned and will start soon. I will update this request as soon as work has started. Thank you for your patience!Anonymous commented
Is there any news here?
We’ll be wrapping up work soon, after making updates from feedback we’ve received so far. We should have a public date soon.
116 votes19 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hey folks! Thank you for your feedback. We are reviewing this ask and will keep you up to date on our findings. We have also added information about this limitation in our documentation. Thank you!
We’ve begun this work.
We are looking at enabling a feature that focuses on supporting CORS preflight requests between two applications. This works by allowing you to configure the response and have App Proxy handle it on behalf of the app.
A pre-requisite for this feature to work is that the user must be able to authenticate into the second application in order to avoid a CORS issue from the login flow into the second app.
To avoid this the user will have to make sure they have already accessed the 2nd application before the CORS request, and has valid credentials. This should work for wildcard apps and can also be achieved by adding a fake link / image to the 2nd application in the first application.
We would love to get your feedback on this requirement and if this is something that will fit your use case.
109 votesunder review · 12 comments · Azure Active Directory » Developer Experiences · Flag idea as inappropriate… · Admin →
Thanks so much for the feedback! Customizations of the My Apps portal for both end users and admins are on our roadmap. This includes providing the ability to re-arrange and group apps and as well as using a customizable domain.
We are also looking to see if we can enable embedding other components like widgets. We’re still in process of validating options for this.
Please keep sharing your feedback and ideas around this!
143 votes10 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
123 votes19 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
StrongAuthentication data can be read via PowerShell, but StrongAuthenticationUserDetails can’t be set via PowerShell. It is planned to expose the StrongAuthentication data via Graph, but no ETA to provide yet.
We are aware of this requirement but have no timelines to share at this moment.
Thank you for the feedback! This is in the backlog and we are looking into this. We don’t have an ETA yet, but we will share once we have one. Please keep voting if this feature matters to you.
451 votes51 comments · Azure Active Directory » User Creation, Deletion, and Profile Management · Flag idea as inappropriate… · Admin →
140 votesplanned · 39 comments · Azure Active Directory » End user experiences · Flag idea as inappropriate… · Admin →
189 votes25 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hi folks – apologies for the lack of updates here. This work is still in progress but unfortunately we don’t have an ETA that we can share yet. We will update as soon as we do. Thanks!
We hear you loud and clear! We know this is a frequent ask and we do have this on our backlog. Unfortunately, I don’t have a timeline to share right now.
219 votes34 comments · Azure Active Directory » Groups/Dynamic groups · Flag idea as inappropriate… · Admin →
Our feature team is looking into options for addressing this scenario, but we do not yet have any timelines to share. For now as a workaround, you can manually trigger the reprocessing by updating the membership rule to add a whitespace at the end. We’ve also added the ability to check the membership processing status, to keep track of the status and know if processing is complete.
We are aware of the requirement to be able to convert a synced user to cloud only and are designing that feature, but we have no timelines to share right now.
We reverted the change that would block the “hack” to delete and restore a user to change a user to “Cloud Only”.
We are starting investigation to make this integration happen. We will update you as we progress on the feature and when we have a release date. Thank you so much for your patience.
Send a note to firstname.lastname@example.org if you have questions!
Updating the status to indicate that this is a valid suggestion and in our backlog for the future. Please keep the comments/votes coming, knowing more about how you intend to use this helps us prioritize and design better features.