Application Registration

Automated application creation and registration in AdminAgents group

Powershell script create an app registration in your tenancy with the following Graph API permissions. These permissions are required to access tenancies and read read licence information.

  • Organization.Read.All

  • Directory.Read.All

 

To run:

  • open powershell - Windows + R powershell

  • Navigate to script location

  • .\csp-portal-app-registration.ps1

If everything ran successfully you should see the following output.

NOTE: It is important that you save the ApplicationSecret somewhere safe such as a password manager as this is only visible for the period you have the powershell script open.

Common Errors

  • If the account used to add the Registered Application to the AdminAgents group is not an administrator (global admin) or does not have rights to add applications to AdminAgents group then you will receive the following error.

     

[CmdletBinding()] param( [PSCredential] $Credential, [Parameter(Mandatory = $False, HelpMessage = 'Tenant ID (This is a GUID which represents the "Directory ID" of the AzureAD tenant into which you want to create the apps')] [string] $tenantId ) <# This script creates the Azure AD applications needed for this sample and updates the configuration files for the visual Studio projects from the data in the Azure AD applications. Before running this script you need to install the AzureAD cmdlets as an administrator. For this: 1) Run Powershell as an administrator 2) in the PowerShell window, type: Install-Module AzureAD There are four ways to run this script. For more information, read the AppCreationScripts.md file in the same folder as this script. #> # Create a password that can be used as an application key Function ComputePassword { $aesManaged = New-Object "System.Security.Cryptography.AesManaged" $aesManaged.Mode = [System.Security.Cryptography.CipherMode]::CBC $aesManaged.Padding = [System.Security.Cryptography.PaddingMode]::Zeros $aesManaged.BlockSize = 128 $aesManaged.KeySize = 256 $aesManaged.GenerateKey() return [System.Convert]::ToBase64String($aesManaged.Key) } # Create an application key # See https://www.sabin.io/blog/adding-an-azure-active-directory-application-and-key-using-powershell/ Function CreateAppKey([DateTime] $fromDate, [double] $durationInYears, [string]$pw) { $endDate = $fromDate.AddYears($durationInYears) $keyId = (New-Guid).ToString(); $key = New-Object Microsoft.Open.AzureAD.Model.PasswordCredential $key.StartDate = $fromDate $key.EndDate = $endDate $key.Value = $pw $key.KeyId = $keyId return $key } # Adds the requiredAccesses (expressed as a pipe separated string) to the requiredAccess structure # The exposed permissions are in the $exposedPermissions collection, and the type of permission (Scope | Role) is # described in $permissionType Function AddResourcePermission($requiredAccess, ` $exposedPermissions, [string]$requiredAccesses, [string]$permissionType) { foreach ($permission in $requiredAccesses.Trim().Split("|")) { foreach ($exposedPermission in $exposedPermissions) { if ($exposedPermission.Value -eq $permission) { $resourceAccess = New-Object Microsoft.Open.AzureAD.Model.ResourceAccess $resourceAccess.Type = $permissionType # Scope = Delegated permissions | Role = Application permissions $resourceAccess.Id = $exposedPermission.Id # Read directory data $requiredAccess.ResourceAccess.Add($resourceAccess) } } } } # # Exemple: GetRequiredPermissions "Microsoft Graph" "Graph.Read|User.Read" # See also: http://stackoverflow.com/questions/42164581/how-to-configure-a-new-azure-ad-application-through-powershell Function GetRequiredPermissions([string] $applicationDisplayName, [string] $requiredDelegatedPermissions, [string]$requiredApplicationPermissions, $servicePrincipal) { # If we are passed the service principal we use it directly, otherwise we find it from the display name (which might not be unique) if ($servicePrincipal) { $sp = $servicePrincipal } else { $sp = Get-AzureADServicePrincipal -Filter "DisplayName eq '$applicationDisplayName'" } $appid = $sp.AppId $requiredAccess = New-Object Microsoft.Open.AzureAD.Model.RequiredResourceAccess $requiredAccess.ResourceAppId = $appid $requiredAccess.ResourceAccess = New-Object System.Collections.Generic.List[Microsoft.Open.AzureAD.Model.ResourceAccess] # $sp.Oauth2Permissions | Select Id,AdminConsentDisplayName,Value: To see the list of all the Delegated permissions for the application: if ($requiredDelegatedPermissions) { AddResourcePermission $requiredAccess -exposedPermissions $sp.Oauth2Permissions -requiredAccesses $requiredDelegatedPermissions -permissionType "Scope" } # $sp.AppRoles | Select Id,AdminConsentDisplayName,Value: To see the list of all the Application permissions for the application if ($requiredApplicationPermissions) { AddResourcePermission $requiredAccess -exposedPermissions $sp.AppRoles -requiredAccesses $requiredApplicationPermissions -permissionType "Role" } return $requiredAccess } Function UpdateLine([string] $line, [string] $value) { $index = $line.IndexOf('=') $delimiter = ';' if ($index -eq -1) { $index = $line.IndexOf(':') $delimiter = ',' } if ($index -ige 0) { $line = $line.Substring(0, $index + 1) + " " + '"' + $value + '"' + $delimiter } return $line } Function UpdateTextFile([string] $configFilePath, [System.Collections.HashTable] $dictionary) { $lines = Get-Content $configFilePath $index = 0 while ($index -lt $lines.Length) { $line = $lines[$index] foreach ($key in $dictionary.Keys) { if ($line.Contains($key)) { $lines[$index] = UpdateLine $line $dictionary[$key] } } $index++ } Set-Content -Path $configFilePath -Value $lines -Force } Set-Content -Value "<html><body><table border='1' >" -Path createdApps.html Add-Content -Value "<thead><tr><th>Application</th><th>Application Id</th><th>Application Secret</th><th>Url in the Azure portal</th></tr></thead><tbody>" -Path createdApps.html Function ConfigureApplications { <#.Description This function creates the Azure AD applications for the sample in the provided Azure AD tenant and updates the configuration files in the client and service project of the visual studio solution (App.Config and Web.Config) so that they are consistent with the Applications parameters #> # $tenantId is the Active Directory Tenant. This is a GUID which represents the "Directory ID" of the AzureAD tenant # into which you want to create the apps. Look it up in the Azure portal in the "Properties" of the Azure AD. # Login to Azure PowerShell (interactive if credentials are not already provided: # you'll need to sign-in with creds enabling your to create apps in the tenant) if (!$Credential -and $TenantId) { $creds = Connect-AzureAD -TenantId $tenantId } else { if (!$TenantId) { $creds = Connect-AzureAD -Credential $Credential } else { $creds = Connect-AzureAD -TenantId $tenantId -Credential $Credential } } if (!$tenantId) { $tenantId = $creds.Tenant.Id } $tenant = Get-AzureADTenantDetail $tenantName = ($tenant.VerifiedDomains | Where { $_._Default -eq $True }).Name # Get the user running the script $user = Get-AzureADUser -ObjectId $creds.Account.Id # Create the client AAD application Write-Host "Creating the AAD application (cspportal)" # Get a 2 years application key for the client Application $pw = ComputePassword $fromDate = [DateTime]::Now; $key = CreateAppKey -fromDate $fromDate -durationInYears 2 -pw $pw $secret = $key.Value $clientAppKey = $pw $clientAadApplication = New-AzureADApplication -AvailableToOtherTenants $True ` -DisplayName "CSP-Portal-Cloud" ` -ReplyUrls "https://app.cspportal.cloud" ` -IdentifierUris "https://$tenantName/cspportal" ` -PasswordCredentials $key ` -PublicClient $False $currentAppId = $clientAadApplication.AppId $clientServicePrincipal = New-AzureADServicePrincipal -AppId $currentAppId -Tags { WindowsAzureActiveDirectoryIntegratedApp } # add the user running the script as an app owner if needed $owner = Get-AzureADApplicationOwner -ObjectId $clientAadApplication.ObjectId if ($owner -eq $null) { Add-AzureADApplicationOwner -ObjectId $clientAadApplication.ObjectId -RefObjectId $user.ObjectId Write-Host "'$($user.UserPrincipalName)' added as an application owner to app '$($clientServicePrincipal.DisplayName)'" } Write-Host "Done creating the client application (cspportal)" # URL of the AAD application in the Azure portal # Future? $clientPortalUrl = "https://portal.azure.com/#@"+$tenantName+"/blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/Overview/appId/"+$clientAadApplication.AppId+"/objectId/"+$clientAadApplication.ObjectId+"/isMSAApp/" $clientPortalUrl = "https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/" + $clientAadApplication.AppId + "/objectId/" + $clientAadApplication.ObjectId + "/isMSAApp/" Add-Content -Value "<tr><td>client</td><td>$currentAppId</td><td>$secret</td><td><a href='$clientPortalUrl'>cspportal</a></td></tr>" -Path createdApps.html $requiredResourcesAccess = New-Object System.Collections.Generic.List[Microsoft.Open.AzureAD.Model.RequiredResourceAccess] # Add Required Resources Access (from 'client' to 'Microsoft Graph') Write-Host "Getting access from 'client' to 'Microsoft Graph'" $requiredPermissions = GetRequiredPermissions -applicationDisplayName "Microsoft Graph" ` -requiredApplicationPermissions "Directory.Read.All|Organization.Read.All" $requiredResourcesAccess.Add($requiredPermissions) Set-AzureADApplication -ObjectId $clientAadApplication.ObjectId -RequiredResourceAccess $requiredResourcesAccess Write-Host "Granted permissions." #$clientAadApplication | ConvertTo-Json # Update config file for 'client' try { $appId = $clientAadApplication.AppId $group = Get-AzureADGroup -Filter "displayName eq 'Adminagents'" $sp = Get-AzureADServicePrincipal -Filter "appId eq '$appId'" $returnValue = Add-AzureADGroupMember -ObjectId $group.ObjectId -RefObjectId $sp.ObjectId -ErrorAction Stop $returnValue | ConvertTo-Json Write-Host $_ } catch { Write-Error $_.Exception.Message Write-Host "" Write-Host "" Write-Host "Cleaning up failed application registration." Remove-AzureADApplication -ObjectId $clientAadApplication.ObjectId Write-Host "Finished cleaning up." return } $dictionary = @{ "Tenant" = $tenantName; "ApplicationId" = $clientAadApplication.AppId; "ApplicationSecret" = $secret; "ObjectId" = $clientAadApplication.ObjectId }; $key | ConvertTo-Json Write-Host "" Write-Host "IMPORTANT: Please follow the instructions below to complete a few manual step(s) in the Azure portal": Write-Host " - Run seccond powershell script 'adminagents.ps1' to add application to AdminAgents group" Write-Host " - Run seccond powershell script to add application to AdminAgents group" $dictionary | ConvertTo-Json #Write-Host " - For 'client'" #Write-Host " - Navigate to '$clientPortalUrl'" #Write-Host " - Navigate to the API permissions page and click on 'Grant admin consent for {tenant}'" Add-Content -Value "</tbody></table></body></html>" -Path createdApps.html start chrome createdApps.html } # Pre-requisites if ((Get-Module -ListAvailable -Name "AzureAD") -eq $null) { Install-Module "AzureAD" -Scope CurrentUser } Import-Module AzureAD # Run interactively (will ask you for the tenant ID) ConfigureApplications -Credential $Credential -tenantId $tenantId

 

(c) Copyright 2019 Lancom Technology Limited.