Inno Setup - IIS Application pool with Custom Account - iis

I have been trying to figure out how to install and register IIS using an Inno Setup Script using Custom Identity.
In identity option, I am using custom account but I don't know how to pass account info (username and password).

Related

python3-saml and Azure AD - missing a point

Good afternoon experts,
I have a Django web application (it is not internet-facing) and so far I used the django.contrib.auth.backends.ModelBackend to authenticate the users.
However I want to integrate this webapp to an existing SSO solution (like Azure AD) so I thought python3-saml would be a good library to be used (more specifically I use python3-saml-django but it is just a wrapper around python3-saml).
Probably I am missing some fundamental point as I don't really understand how this should work.
When I used ModelBackend then I had a login form where the user could type their username+password which was checked against Django database and the authentication was completed. Should the same work with SSO too? i.e. the login form appears, the user will type their credentials but they will be checked in Azure AD instead of Django auth tables? Or the custom login form of that specific auth solution (in this case Azure AD -> Microsoft login form) should be displayed...?
The LOGIN_URL setting is configured in my Django app so if no user is logged in then automatically my login form appears.
Also I set the AUTHENTICATION_BACKENDS setting and it points only to django_saml.backends.SamlUserBAckend.
I configured AZure AD (registered the app and added a user, I tested it in Azure AD console) hopefully correctly. I also populated python3-saml's settings.json with login/logout URL, etc.
Whenever I try to log in with the Azure AD user I got an auth error (the user and password did).
I am just wondering if somebody could shed some light please how this should work? Can I debug the SAML requests / responses?
auth is token based in azure ad and it will redirect the user to the microsoft login. You will receive an auth token which then you can use to for authorization and providing secure pages.
First register your app in azure portal in azure active directory and also create a user flow.
Then download MSAL for python (using pip) which is used for auth using azure ad for python.
The basic architecture is that when the user tries to login the Microsoft login page will be shown, after signing in your app will receive a token which then you should use to show the logged in pages.
References:
quickstart for auth in python
userflow
MSAL Library

Login to Azure CLI with MFA

Azure CLI installed on a Windows (and Linux?) OS apparently uses Device Code Authorization flow to login the user. Given that such a user may be required to use multifactor (MFA) authentication to perform administrative tasks, how can MFA be implemented for this use case (CLI login, enforce MFA), using Azure AD as the Identity Provider?
My understanding is that Azure's implementation of the login to a CLI uses the browser for the initial authentication - and this was done so that the user doesn't type in login secrets inside the CLI.
My understanding is that Azure's implementation of the login to a CLI
uses the browser for the initial authentication - and this was done so
that the user doesn't type in login secrets inside the CLI.
Yes, By default in Azure when you are trying to login through cli it will initiate a browser session to enter your credential & to procced further logging.
If you want to enable MFA while logging into the portal using CLI you have to enable the MFA per user in the active directory as shown below.
If you want to make sure that every user who is trying to logging through Azure CLI they have to use Multi factor authentication then you can achieve this by creating a conditional access policy.
We have tested this in our environment , by creating a user in the AAD & enabling the MFA-per user it is working fine.
You can refer the below sample output for reference:

How to prevent using "LocalSystem" application pool identity when connecting through certificate

The site I need to configure on our IIS server (on Win 2019) uses a certificate to communicate with an external service.
The certificate is present in the certificates plugin in category personal and trusted.
It also uses a intermediate certificate.
The correct application pool has full permission on the certificate in /personal. Also the "network service" user.
The private certificate isn't exportable.
The SSL connection works when the application pool is configured with identity "LocalSystem" but it doesn't work with "ApplicationPoolIdentity".
Changing the "Load user profile" of the application pool from false to true doesn't change anything.
The site uses libraries written for it and is only used within the company.
Is using "LocalSystem" the only solution when using libraries?
You can try different user account in Application pool identity.
Built-in user account
Select this option to use one of the predefined security accounts. Then select one of the following accounts:
LocalSystem - The Local System account has all user rights, and it is
part of the Administrators group on the Web server. Whenever
possible, avoid using the Local System account because it presents a
serious security risk for your Web server.
LocalService - The Local Service account is a member of the Users
group and has the same user rights as the Network Service account,
but limited to the local computer. Use this account when the worker
process in your application pool does not require access outside the
Web server on which it runs.
NetworkService - By default, the Network Service account is selected.
It is a member of the Users group and has user rights that are
required to run applications. It can interact throughout an Active
Directory-based network by using the computer account's credentials.
This account provides the most security against an attack that might
try to take over the Web server.
ApplicationPoolIdentity - Starting with IIS 7, application pools can
be ran as the "ApplicationPoolIdentity" account instead of the
"NetworkService" account. This is a dedicated pseudo user account for
the working process of an application pool and is the recommended
pool identity.
Custom user account
Select this option to configure a custom user account for the application pool identity.
Custom user account
Select this option to configure a custom user account for the application pool identity.
Installed user account
You can configure an installed User Account under which you want the worker process to run.
Property-based user
You can dynamically choose a username and a password under which you want the worker process to run, by using references to Windows Installer properties. By using this option you can choose the way the password is selected:
Password property
The password is stored inside a property.
Predefined password
By selecting this option you can define you own password.
Note: If you use a custom identity, make sure that the user account you specify is a member of the IIS_IUSRS group on the Web server so that the account has proper access to resources. Additionally, when you use Windows and Kerberos authentication in your environment, you might need to register a Service Principle Name (SPN) with the domain controller (DC).

Mixed Mode Authentication in kentico 11

I want use Mixed mode authentication in my application.
I want Windows AD Authentication for intranet users and Forms authentication for internet users.
How can I configure this.
Check out the Kentico documentation for Mixed Mode Authentication.
Essentially you will:
determine if you want to import AD roles or not (web.config key)
Add an LDAP connection string to your web.config
Modify the membership and roleManager elements under congfiguration/system.web section in your web.config to use the AD connection string and provider
map the username field
It's not a hard setup really and much easier if you don't have users already in the Kentico system. If the username already exists in Kentico, the user will NOT be imported into Kentico from AD.

Can Authentication Details be added to a Windows Azure Scheduler Job?

I'm going to be creating a Windows Azure Scheduler Job that will make a RESTful POST call to a resource on interval. This part is easy, except the fact that the URI is secured and requires Basic Authentication credentials.
Using the Azure Management Portal (or see via: http://msdn.microsoft.com/en-us/library/azure/dn495651.aspx) I don't see anywhere to add Basic Authentication credentials or even custom header values.
Is it possible to add credentials to a configured Azure Scheduled Job HTTP/HTTPS call, or will the scheduler not handle this ability?
It does support Basic Auth. After creation navigate to the "jobs", click on the job that you want add basic auth. There are 2 text boxes to enter username and password.

Resources