azure-authentication

Azure AD authentication without app registration

一笑奈何 提交于 2019-12-01 01:57:18
I want to access Azure Directories and Subscriptions using my web app hosted on my server but i do not want to register my app in active directory because i do not have permissions to register my app in active directory I want to authenticate users from out of my active directory too. for example following sites let you authenticate any Azure AD user. https://resources.azure.com/ https://azureiotsuite.com Please help me to where to start. i have tried Azure AD authentication but it asks you to register your app in Azure AD Apps. One option is to register your app at https://apps.dev.microsoft

Azure AD authentication without app registration

那年仲夏 提交于 2019-11-30 21:15:29
问题 I want to access Azure Directories and Subscriptions using my web app hosted on my server but i do not want to register my app in active directory because i do not have permissions to register my app in active directory I want to authenticate users from out of my active directory too. for example following sites let you authenticate any Azure AD user. https://resources.azure.com/ https://azureiotsuite.com Please help me to where to start. i have tried Azure AD authentication but it asks you

Azure: Service Principal ID vs Application ID

夙愿已清 提交于 2019-11-30 15:57:11
问题 According to this documentation: Application and Service principal are clearly two different things. Application is the global identity and Service principal is per Tenant/AAD But This Documentation and This Stack Overflow Question suggest they are the same. To make it more confusing, When I used the Graph API (from the first reference) and queried by my application name: https://graph.windows.net/<tenantName>/applications?api-version=1.6&$filter=displayName eq '<Apllication Name>' I see a

Azure: Service Principal ID vs Application ID

≯℡__Kan透↙ 提交于 2019-11-30 14:41:51
According to this documentation : Application and Service principal are clearly two different things. Application is the global identity and Service principal is per Tenant/AAD But This Documentation and This Stack Overflow Question suggest they are the same. To make it more confusing, When I used the Graph API (from the first reference) and queried by my application name: https://graph.windows.net/<tenantName>/applications?api-version=1.6&$filter=displayName eq '<Apllication Name>' I see a object Id, an Application ID (which I thought were the same), but no service principal ID in the Json

How to get current user identity in Azure Function with Azure Authentication?

一曲冷凌霜 提交于 2019-11-30 12:44:56
I have created a new Function App, enabled App Service Authentication / Authorization for it (" Use Authentication / Authorization to protect your application and work with per-user data ") and disabled non-authenticated requests. Everything seems to be working correctly so far. If I try to request my HttpTrigger ed function, it requires me to log in first; once I'm logged in, all requests are processed as they should be. So there is no problem with "protect your application" part. However, I'm totally stuck with the "work with per-user data" part. My Azure Function is invoked as public static

Azure automation - credentials delivered by Get-PSAutomationCredential don't work with Add-AzureAccount?

∥☆過路亽.° 提交于 2019-11-30 10:01:47
问题 I'm modifying a gallery runbook that copies a live database to a test database on a schedule. It's failing at the first hurdle; authenticating and selecting the relevatn azure subscription The runbook looks like this: $Cred = Get-AutomationPSCredential -Name 'automationCredential' Write-Output "UN: $($Cred.Username)" Add-AzureAccount -Credential $Cred I've used the portal credentials blade to create a credential named "automationCredential". For the username and password I supplied the

How to get current user identity in Azure Function with Azure Authentication?

不问归期 提交于 2019-11-29 18:27:03
问题 I have created a new Function App, enabled App Service Authentication / Authorization for it (" Use Authentication / Authorization to protect your application and work with per-user data ") and disabled non-authenticated requests. Everything seems to be working correctly so far. If I try to request my HttpTrigger ed function, it requires me to log in first; once I'm logged in, all requests are processed as they should be. So there is no problem with "protect your application" part. However, I

Azure automation - credentials delivered by Get-PSAutomationCredential don't work with Add-AzureAccount?

我是研究僧i 提交于 2019-11-29 18:14:06
I'm modifying a gallery runbook that copies a live database to a test database on a schedule. It's failing at the first hurdle; authenticating and selecting the relevatn azure subscription The runbook looks like this: $Cred = Get-AutomationPSCredential -Name 'automationCredential' Write-Output "UN: $($Cred.Username)" Add-AzureAccount -Credential $Cred I've used the portal credentials blade to create a credential named "automationCredential". For the username and password I supplied the username/pw that I log into the azure portal with. Note: this is NOT a school/work microsoft account, but a

How to log in to Azure service principal

一笑奈何 提交于 2019-11-29 12:53:27
Connect-AzureRMAccount doesn't work. I don't care. I don't want to run through the process of needing a PhD to understand why PowerShell never wants to work. So I'm going to use Login-AzureRMAccount I've followed the docs. Of course it's inadequate so here I am. https://docs.microsoft.com/en-us/powershell/azure/authenticate-azureps?view=azurermps-6.6.0 "In order to get the service principal's credentials as the appropriate object, use the Get-Credential cmdlet. This cmdlet will display a dialog box to enter the service principal user ID and password into." Where do I even find my userID? I

How to log in to Azure service principal

你说的曾经没有我的故事 提交于 2019-11-28 06:51:29
问题 Connect-AzureRMAccount doesn't work. I don't care. I don't want to run through the process of needing a PhD to understand why PowerShell never wants to work. So I'm going to use Login-AzureRMAccount I've followed the docs. Of course it's inadequate so here I am. https://docs.microsoft.com/en-us/powershell/azure/authenticate-azureps?view=azurermps-6.6.0 "In order to get the service principal's credentials as the appropriate object, use the Get-Credential cmdlet. This cmdlet will display a