- Mastering Identity and Access Management with Microsoft Azure
- Jochen Nickel
- 362字
- 2021-07-02 12:57:21
Test and verify your new Azure AD Domain Services
To test the Domain Services, we complete the following tasks:
- Install a virtual Windows Server in your Azure IaaS environment by using a deployment template (https://docs.microsoft.com/en-us/azure/active-directory-domain-services/active-directory-ds-join-windows-vm-template):

VM deployment configuration
- Install the administrative tools for Active Directory and DNS on the newly joined server:
Install-WindowsFeature RSAT-ADDS,DNS-Server-Tools
- Connect to Active Directory Users and Computers (dsa.msc) and the Group Policy Management console to verify your configuration:

Azure AD Domain Services structure including synchronized objects
- Next, we need to create a DNS HOST (A) record for our test application:

- Now, we can install a basic IIS configuration, used to handle the Kerberos part. For this, you need to install the IIS components, choose the Kerberos authentication feature, and activate it on the default website. Only Windows Authentication needs to be activated:

IIS Authentication configuration for Kerberos example application
- Next, we will install and configure the Azure AD App Proxy connector to provide the application to your users. We use the following cmdlets to configure the needed, resource-based KCD feature:
# inovitcloudlabs represents the computer name
$ConnectorComputerAccount = Get-ADComputer -Identity inovitcloudlabs
Set-ADComputer inovitcloudlabs -PrincipalsAllowedToDelegateToAccount $ConnectorComputerAccount
setspn -S HTTP/kerb.inovitlabs.ch inovitlabs\inovitcloudlabs
- Next, we will activate and configure the Azure AD App Proxy. To make it simple, we disable the IE Enhanced Security Configuration so that we don't need to provide any IE Security Zone configurations, just for the lab:

Server Manager IE Enhanced Security Configuration
- Next, we need to download the connector and install it on the server:

Application Proxy agent download and configuration
To configure the connector on the server, you need to provide a user with global administrator rights.
- After installing and configuring the connector, we will add our example app:

Azure AD App Proxy Connector group configuration options
- Next, we configure our example app as shown:

Kerberos example configuration
- Next, we configure the Integrated Windows Authentication (IWA) option:

Application IWA configuration
Finally, we assign some users or groups and test the application at https://myapps.microsoft.com. As a result, you should see the IIS test page. We provided a sample Kerberos-based application to Azure AD Domain Services and used the Azure AD App Proxy functionality.
推薦閱讀
- Extending Symfony2 Web Application Framework
- 信息安全導(dǎo)論(在線實(shí)驗(yàn)+在線自測(cè))
- Learning Python for Forensics
- 特種木馬防御與檢測(cè)技術(shù)研究
- 白帽子講Web安全(紀(jì)念版)
- 計(jì)算機(jī)病毒原理與防范(第2版)
- Python Penetration Testing Cookbook
- 模糊測(cè)試:強(qiáng)制發(fā)掘安全漏洞的利器
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 局域網(wǎng)交換機(jī)安全
- 從0到1:CTFer成長(zhǎng)之路
- 先進(jìn)云安全研究與實(shí)踐
- Mastering Linux Security and Hardening
- Mastering Metasploit
- 交換機(jī)·路由器·防火墻(第2版)