Windows 365. User-assigned Managed Identity - azure-identity

We would like to run some PowerShell scripts inside Windows 365 workstations that authenticate to Azure in a secure way. I'm not able to find how to apply user-assigned managed identity to Windows 365 VMs like we do to our Azure VMs. Is that not possible?

Related

Does Azure Managed Identities only work with Azure VM's?

I am trying to use a managed identity from Azure in a non-Azure VM to access my Azure resources. Is this possible?
You can use managed identities with App Service too
In the below link you can see all azure resources supported managed identities.
https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/services-support-managed-identities

Find Strong Authentication in Azure Powershell / Azure Cli

I am looking for Get-MsolUserByStrongAuthentication equivalent for Azure Powershell / Azure Cli
The Windows Azure Active Directory Module for Windows PowerShell cmdlets can be used to accomplish many Windows Azure AD tenant-based administrative tasks such as user management, domain management and for configuring single sign-on
Install the Windows Azure Active Directory Module for Windows PowerShell
Connect to Windows Azure AD by running the PowerShell command import-module MSOnline
then you are good to proceed.
Hope it helps.

Windows Azure Active Directory and Office 365 integration

In my company, we are using Office365 for our emails.
In addition to this, we are using Windows Azure Active Directory to secure some applications.
Now I've been asked to create some kind of link between our users in Office 365 and Windows Azure Active Directory.
The point would be to have some admin applications deployed and secured with WAAD but for which the users are the ones from Office365.
I've found lots of documentation on the web on how to sync directories but not really anything stating clearly that this is possible.
I'd like to insist on the fact that it is our own application that we'd like to secure like this.
Thanks
(Edit 2018-03-23: This answer was updated to reflect changes in the new Azure portal.)
The underlying directory for Office 365 is Azure Active Directory (Azure AD). This means that if you have an Office 365 account, you already have a directory -or "tenant"- in Azure AD.
In your case, I think what you want to do is move from securing your application with a different Azure AD tenant (under a different domain), to securing your applications with the tenant you got when you started using Office 365. The key here is to be able to get access to your Office 365 tenant from the Azure portal.
All you need to do is sign in to the Azure portal (https://portal.azure.com) with you Office 365 account (which, remember, is an Azure AD account), and head over to the "Azure Active Directory" blade. (Note: You do not need an Azure subscription in order to manage your Azure AD tenant in the Azure portal.)
Now you can go about adding and configuring apps to the Office 365 tenant so that you can use that tenant to secure your apps.
Extra: Since you've already started doing things with another Azure subscription (presumably your Microsoft Account, MSA --formerly LiveID--), you might be interested in transferring that Azure subscription to be owned by an account in your primary Azure AD tenant: https://learn.microsoft.com/en-us/azure/billing/billing-subscription-transfer
If the aim is to make the Office 365 directory available inside the Azure portal, this currently works:
In the Azure portal, under Active Directory, click the New button, then Directory, then Custom Create. In the Directory pull-down, select 'Use existing directory' and follow the instructions to sign out and sign in using your Office 365 admin user. This will make your Office 365 directory available inside your Azure portal (in addition to any other Azure directories you have access to.)
When you setup your Azure Subcription did you use the same account you used when you setup your Office 365 Subscription? If so you should be able to see an existing WAAD instance when you log into Azure that has your #*.onmicrosoft.com domain registered against it. If you don't see that you may be able to add the domain to Azure subscription assuming of you are the domain admin. See here: http://blogs.msdn.com/b/bspann/archive/2013/10/20/adding-existing-o365-directory-to-azure-msdn-subscription.aspx
For the sake of completion, I hope the OP would come back and accept the answer provided by Philippe.
I found this that was quite helpful: http://blogs.technet.com/b/ad/archive/2013/04/29/using-a-existing-windows-azure-ad-tenant-with-windows-azure.aspx

Add Office 365 users to AD in VM in Azure

we have a vm in azure with AD + a SharePoint 2013 that joined that domain.
We have also an Office 365 account with a domain. This domain is added to the Active Directory in Azure.
Now we can see all of our 30 office 365 users in Azure.
Now we need to sync this office 365 users to the VM in azure that runs the AD.
We need a single sign on solution that our office 365 users can log on with there office 365 credentials to the SharePoint 2013 Server.
Is this possible? When Yes, how?
Regards!
You can accomplish this using the Directory Integration feature of Windows Azure AD. From the Azure Portal, enable Directory Integration for your directory and then download the Directory Sync tool. This will enable you to sync between your Azure AD Tenant and your Server AD running in your Virtual Machine.
It's recommended you configure a separate Directory Sync Server to install the tool on. But, it's also possible to just run it on your Server AD Virtual Machine. I've done it both ways successfully.
When you're installing the tool, select the option for Hybrid Deployment. This will enable Azure AD to write objects back to your Server AD.

How to add Office365 custom domain to Windows Azure Active Directory?

I have an Windows Azure Subscription when the administrator has a Microsoft Account.
This account has a Default active directory and I need to configure my Office365 domain to authenticate my applications with corporate accounts.
I cant remove the default directory.
Thank you
The management portal will not let you do what you are asking. It will not let you associate your Azure account with an existing Windows Azure Active Directory (WAAD) instance, and manage it through the Azure portal. You can, however, still use your Office365 instance of WAAD to as an identity provider through Azure Access Control Service (ACS). For a good starting place on using ACS for adding claims based authentication to your web application look here. For instructions on how to provision a WAAD tenant as an IdP for ACS look here.

Resources