tmacocx

My feedback

  1. 101 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  (General Feedback) » Other  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  2. 136 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    6 comments  ·  (General Feedback) » azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  3. 123 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  (General Feedback)  ·  Flag idea as inappropriate…  ·  Admin →

    Hi there,

    This is one of the many improvements our development team is hoping to include in future iterations of our product. I can’t guarantee that we have the resources to get this done any time soon, but it definitely should be in the pipeline.

    -Adam (Azure Billing Team)

    tmacocx supported this idea  · 
  4. 1,495 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    50 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    tmacocx commented  · 

    Would be interested in having Azure be a proper registrar with the ability to purchase and/or transfer domains into our tenant, or subscription, to manage.

    tmacocx supported this idea  · 
  5. 303 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  0 comments  ·  SQL Server » Suggestions  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  6. 369 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  SQL Server » Suggestions  ·  Flag idea as inappropriate…  ·  Admin →

    Upvotes: 249

    <=-=Oct 4 2016 2:15PM=-=>

    This is similar to my feedback located here: https://connect.microsoft.com/SQLServer/feedback/details/2769130/sql-2016-temporal-tables-with-triggers. The solution I suggest is similar to this, and could be used in many different cases developing using SQL server.

    <=-=Jan 10 2017 9:43AM=-=>

    I would love this too. The issue is that many/most applications don’t use Windows Auth in the connection to SQL Server (connection pooling issues, etc), so SQL can’t get the User information

    <=-=Jan 10 2017 9:51AM=-=>

    @Sanford

    Just to clarify, I am not asking for an “automatically store user name” feature. I’m asking for “automatically store whatever I want, based on whatever expression I provide.” So the fact that the user name may or may not be available is not really relevant.

    That said, there are plenty of workarounds for various situations. I imagine that if you’re using a shared connection, you can get some notion of “user” some other…

    tmacocx supported this idea  · 
  7. 1,818 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    201 comments  ·  SQL Server » Suggestions  ·  Flag idea as inappropriate…  ·  Admin →

    Unfortunately the complexity to implement dark mode into SSMS v18 is prohibitive and this item remains unplanned. Regular updates and improvements to SQL Server Management Studio are continuing, but most of the net new innovations in the graphical tooling space can be expected to be seen in Azure Data Studio.

    -Drew

    tmacocx supported this idea  · 
  8. 49 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  0 comments  ·  Azure Cloud Shell » General  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  9. 62 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Azure Cloud Shell » General  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for this suggestion – we currently plan to continue requiring storage so users can get the best experience possible with persisted state across all the interfaces Cloud Shell is available. Please upvote this if you agree though as we’re always listening to the community!

    tmacocx supported this idea  · 
  10. 97 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    7 comments  ·  Azure Cloud Shell » General  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  11. 213 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    50 comments  ·  Azure Cloud Shell » General  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  12. 59 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Functions » Feature  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  13. 53 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Functions » Feature  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  14. 107 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Azure Functions  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  15. 32 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Active Directory » Admin Portal  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  16. 44 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Azure Active Directory » Admin Portal  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
  17. 174 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    21 comments  ·  Azure Active Directory » Domain Join  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the feedback on this. There are several ways to do Azure AD join (OOBE, bulk enrollment and Autopilot) which provide a richer experience to join devices to Azure AD. We’re continuously working to enhance those, so currently this is unplanned for the near future. Please continue to vote to help us prioritize


    Ravi

    tmacocx supported this idea  · 
  18. 146 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    We are planning to provide a migration path to customers from MFA server to cloud MFA.

    If you are using voice and SMS, you can already use the Authentication methods APIs to migrate the data: https://docs.microsoft.com/graph/api/resources/authenticationmethods-overview

    If you are using the Authenticator app, users can enable Phone Sign-in to authenticate without passwords in the cloud: https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-phone#azure-mfa-server

    tmacocx supported this idea  · 
  19. 143 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    We recently added deny capability to Azure’s RBAC system, in the form of deny assignments that can be set by the system only. The first Azure feature to use deny is BluePrint. We intend to add a configurable deny capability in the future, but have not yet announced any details.

    Cheers,
    /Stuart and Balaji

    tmacocx supported this idea  · 
  20. 252 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    32 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    tmacocx supported this idea  · 
← Previous 1 3 4 5

Feedback and Knowledge Base