Chad

My feedback

  1. 365 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    planned  ·  9 comments  ·  API Management » API management experience  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  2. 38 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Chad commented  · 

    only workaround is to plead with the IDP to remove the EC key type and only list the RSA key type in the JWKS metadata endpoint - or fallback to SAML, etc

    Chad supported this idea  · 
  3. 20 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Chad shared this idea  · 
  4. 23 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Networking  ·  Flag idea as inappropriate…  ·  Admin →
    Chad shared this idea  · 
  5. 175 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    25 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  6. 264 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    44 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →

    Thank you. We will examine the experience of duplicate sign ups across Identity providers. Would performing this check by using the email address be sufficient?

    BTW, Linking multiple provider accounts to one user is in our roadmap and we’ve already achieved it in preview…

    We look forward to your feedback

    /Jose Rojas

    Chad supported this idea  · 
  7. 231 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    24 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  8. 623 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    12 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  9. 603 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    26 comments  ·  Networking » Content Delivery Network  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  10. 1,072 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    triaged  ·  29 comments  ·  Networking » Bastion  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  11. 745 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  12. 1,602 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    45 comments  ·  Networking » Azure Front Door Service  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  13. 1,609 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    43 comments  ·  Networking » Bastion  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  14. 530 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    9 comments  ·  Networking » IP addresses  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature

    Chad supported this idea  · 
  15. 882 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  49 comments  ·  API Management » Pricing  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  16. 110 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    7 comments  ·  API Management » Policies  ·  Flag idea as inappropriate…  ·  Admin →

    Hi Carlos – thanks for your feedback. We need more feedback from users on this feature due to the many complexities of how WS-security is implemented. Would what Carlos describes be helpful for you? Is this preferable to a mutual TLS connection secure the communication?

    An error occurred while saving the comment
    Chad commented  · 

    Integrating with 3rd parties that STILL require WS Security is not possible with native Azure API Management policies. A secure Azure based solution that works with APIM boundaries requires a complex mix of function apps, app service environments, storage accounts to hold custom dlls, keyvaults, and private VNET integrations. Also ironic, Microsoft developed the WS-SEC protocol!

    Chad supported this idea  · 
  17. 690 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    42 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  18. 135 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    triaged  ·  5 comments  ·  API Management » Security  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Chad commented  · 

    More security rules? Country block - now in preview for app gateway: https://docs.microsoft.com/en-us/azure/web-application-firewall/ag/geomatch-custom-rules

    Chad supported this idea  · 
  19. 16 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 
  20. 73 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    8 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Chad supported this idea  · 

Feedback and Knowledge Base