app registration required for windows apps in azure ad - azure

I am trying to access a azure hosted service using the windows client. It is required to register the windows client with Azure AD and the get the application id for requesting the authentication token/sign-in.
For web apps this is not needed. The browser itself will automatically re-direct to the login page for authentication and the token is getting cached in the cookie.
Is it possible for the windows client to sign-in to the azure ad similar to web apps without needing to register itself?

Related

Flutter mobile app login via azure Active directory from web app that already implemented Azure Ad

I have a web app that already configured with Azure Ad, once user login the web app via azure ad, they web app will redirect it to identity server and then successfully logged in to the website. However, currently we have to implement the azure ad login in our flutter mobile app also. For calling the web app API, we have to get access token generated from the web app identity server. So the problem is that is there a solution to directly allow my mobile app to login through the azure ad page configured for my web app and get access token directly in my flutter app? Or is there other suggestions?
Retrieving access token directly from the web api through AAD identity authentication and passing it to the flutter app for authentication purposes isn't possible. Though, you can add/show a redirect URL or callback url link to the flutter app in your web app display api which is registered in azure app registration portal such that when a user tries to log in to flutter app, it will be redirected to the flutter app site and in the flutter app backend, you can configure it to federate with AAD for authentication and authorization purpose.
References:
flutter_aad_oauth
How to integrate Azure AD SSO in flutter app
You can also raise a support request if needed via overview page in portal> support + troubleshooting >new support request

SSO using OIDC not working for electron apps for Azure AD joined devices

I am trying to achieve SSO for my electron based app with pure Azure AD cloud only user. The device is joined to Azure AD and logged in user is an AAD user. SSO is working seamlessly with Edge and IE and also with Google chrome(with Windows 10 Accounts extension added). But, whenever I try to launch the URL with Electron it always takes me to the auth page rather than retrieving the auth code.
PS: I have already tried the below
Adding "https://autologon.microsoftazuread-sso.com" and AAD server to auth-server-whitelist and auth-negotiate-delegatewhitelist.
Add the urls to session.defaultSession.allowNTLMCredentialsForDomains('*')
Changing the UsrAgentFallback to Edg/version from Electron/version
Same setup works if the user is federated via Azure AD connect with both on prem and AAD server but is not working in pure Azure AD environment. Any help will be greatly appreciated!!

How to configure Azure Web App to Web App authentication?

I have two Azure Web Apps, one is a website and acting as the front-end, the other one is an API and acting as the backend. I would like to add authentication to this solution so only the front-end can access the backend. To do this, I've configured AAD authentication on the backend Web App with the express option that creates a new Azure AD application configured with the correct reply URL, API permissions (User.Read), etc. When I then navigate to the backend Web App URL, I need to sign-in with my Azure AD credentials.
Which steps do I need to take to restrict that so I as an user cannot login and only the front-end Web App can authenticate to the backend API?
For example, I can set the "Authorized client applications" on the Azure AD application of the backend API. However, I need to have an application ID to add an authorized client and I would like to use the Managed Identity of the front-end Web App for this, not a new and additional Azure AD application.
Any idea how to do this?
This is weird, if the login screen still appears, there is a problem with your code configuration, because the client credential flow does not involve user interaction.
I found a useful sample for your reference, this sample application shows how to use the Microsoft identity platform to access the data from a protected Web API, in a non-interactive process. It uses the OAuth 2 client credentials grant to acquire an access token, which is then used to call the Web API.

Angular 2 - Windows Authentication - without .NET - Node JS API

My application is an Angular 2+ SPA, which uses Azure Active Directory and the back end API is implemented in Node JS. Currently, when an user tries to login, an Azure pop-up appears, User enter login/password which will get authenticated in AD, AD returns a bearer token which I use to authenticate Node JS API.
My requirement is, to use Integrated Windows Authentication (IWA). The Front End should use Windows authentication to get the bearer token from AD instead of asking user to enter login/password. How Can I do that? Whatever articles I see about this, all talk about IIS and .Net based application. Should I always use .NET based API to use Windows Authentication? Any hints would be greatly appreciated.
Just a note, the API is an enterprise application hosted in the cloud. All the users are internal company employees and are registered with AD.
Given you already have Azure AD sync setup, the following may be useful. AAD Connect allows you to seamlessly login with SSO:
https://learn.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-sso
Azure services doesn't support Windows Authentication, unless you setup a VM with IIS. I assume by your requirements "...Get the bearer token instead of asking user to enter login/password" mean single signon. That is, when a user is logged into the domain on their PC, they don't have to login again to your application.
There are a few ways to approach this depending on your AD configuration, but usually you have to configure ADFS for your organisation AD to allow your cloud app to authenticate you. If you are already logged in, it will simply redirect you and your app will receive the bearer token.
https://azure.microsoft.com/en-au/resources/videos/configuring-ad-fs-for-user-sign-in-with-azure-ad-connect/
Another option is to connect your organisation AD with Azure AD, using Azure AD sync. The following link helps with this. You would then configure your app to authenticate against Azure AD (as it currently does).
https://learn.microsoft.com/en-us/azure/architecture/reference-architectures/identity/azure-ad
AD configuration is not a simple configuration,

Using AD Token for access to multiple applications registered in Azure AD

We have chosen Azure AD for authenticating users for the Enterprise Web applications developed using MVC and hosted on Azure Cloud Platform.
We are trying to plan & develop a common portal for the users to which they can login using Azure AD login screen. This Portal will display the links to the cloud applications to which the user has access and they could access the cloud application from this portal.
Please let me know whether this is feasible since I have read in many places that the Azure AD token assigned to the user from Azure AD is valid only for one resource or registered application. Does that mean that when they try to login into another Cloud application registered to the same Azure AD from the portal, they will need to login again or re-use the Azure AD token for the portal in the browser session cookie for logging into the other applications?
It's true that your users authenticate against an application registered in Azure AD and that the issued token is only valid for that application.
However, the user establishes a session with the authorization server (Azure AD) and will not be prompted for credentials when redirected there to authenticate against another registered application.
So your portal page can just contain links to the URLs for the applications. Each application redirects the user to Azure AD for authentication and the user is only prompted for credentials for the first application he/she logs in to.

Resources