PowerShell 💖s Microsoft Authentication: Everything you need to know about Azure authenticati…
Автор: PowerShell Conference EU
Загружено: 2023-07-15
Просмотров: 1044
Ben Reader discusses the topic of authentication in the context of PowerShell and Azure. They begin by acknowledging that authentication may not be the most exciting subject but emphasize its importance in day-to-day work as an IT admin or consultant. The main speaker introduces themselves as Ben, a code monkey at PatchMyPC, and mentions their involvement in automation tasks with Intune and Config Manager.
The main speaker highlights the increasing adoption of PowerShell and Azure apps and proceeds to give a shout-out to the show's sponsors. They then delve into the concept of authentication and acknowledge that it can be a complex topic, often becoming a barrier for individuals wanting to explore PowerShell. Their goal is to collectively bring the audience to a common understanding of authentication, enabling them to move on to more exciting tasks in the automation process.
The main speaker announces that the session will primarily focus on practical aspects of authentication and promises to provide demonstrations rather than relying on extensive slides. They mention a silly script they wrote to prove someone wrong and emphasize the need for certain tools on the audience's machines to simplify authentication tasks. In particular, they recommend the mcell.ps module for easier authentication.
The speaker expresses their intention to discuss various authentication scenarios, including device code authentication, authentication using client secrets and certificates, and managed identities in Azure. They also mention the MSAL PS module, which they describe as a love letter to Microsoft Graph.
The main speaker moves on to discuss the process of authentication using password authentication and the risks involved in this method, such as storing passwords in plain text and the potential for unauthorized access. They highlight the importance of multi-factor authentication (MFA) and the need to implement it for enhanced security.
Next, the main speaker explores authentication using client secrets and certificates as an alternative approach. They emphasize the importance of using the recommended methods and caution against following incorrect approaches. They introduce the mcell.ps module as a tool for decoding JWT tokens and simplifying the authentication process.
The speaker then transitions to discussing the differences between delegate and application-based authentication and demonstrates how to add permissions and grant consent in the Azure portal. They also touch on non-interactive authentication, which is useful for background services. Additionally, they explain the concept of device code authentication and its relevance in scenarios where interactive authentication is not possible.
Moving on, the main speaker signals their intention to demonstrate the use of certificates for authentication, emphasizing their importance and dispelling outdated fears surrounding their use. They touch on the concept of managed identities in Azure and stress the necessity of using them for increased security. They also mention that they will be covering the topic of managed identities in tomorrow's session, where they will build a basic to-do app using managed identities for authentication.
During the session, the main speaker addresses questions from the audience. They clarify that service principal accounts, which do not have delegated permissions, cannot bypass MFA. They also answer a question regarding scoping, affirming that it can effectively restrict access to certain resources in applications like SharePoint, Intune, and Outlook.
Before concluding, the main speaker recommends an article written by Emmanuel and announces that limited-edition t-shirts will be available for giveaway at the PatchMyPC booth. Lastly, they express gratitude for the audience's attention and participation.
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: