Rob Nicholson (Malt) on Thu, 06 Oct 2016 15:49:06
With the introduction of this rather unexpected change, my client has to switch to joining computers to Azure AD so they can logon with the Office 365/Azure AD email address and password. Okay, the change is welcome because having a Microsoft and Office 365 account with the same email address but possibly different passwords is confusing.
Azure AD isn't my speciality really but I am very familiar with traditional AD.
I've joined a test laptop to the Azure AD and that works okay. The laptop then needs encrypting with BitLocker. When you run BitLocker, the option here is different from when using a Microsoft account (which I'm familiar with), it gives you the option to "Save to your cloud account":
However, being a cautious kind of guy, I wanted to check I could find these recovery keys in the cloud domain account. This is where I'm hitting a dead end. According to many blogs, it's recorded in the devices tab for the domain user account I was logged in with when I ran the above. In the old portal, I've found the devices tab. The DESKTOP machines were a handful of VM devices I was testing Azure AD with. LAPTOP014 is the one that's been encrypted:
But the articles say "Click VIEW DETAILS" to display the BitLocker keys but that option is grayed out.
What am I doing wrong?
Rob Nicholson (Malt) on Thu, 06 Oct 2016 15:51:39
Also, where is the "Devices" tab in the new Azure portal?
vijisankar on Fri, 07 Oct 2016 13:25:54