From 101175c5d58c699bf9886b4b1332cc80e5af693b Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Tue, 4 Apr 2023 16:00:16 -0400 Subject: [PATCH] update to use new PowerShell module --- .../windows/configure-aad-google-trust.md | 71 ++++++++++++++++--- 1 file changed, 62 insertions(+), 9 deletions(-) diff --git a/education/windows/configure-aad-google-trust.md b/education/windows/configure-aad-google-trust.md index b6d4229e8f..d0141944c1 100644 --- a/education/windows/configure-aad-google-trust.md +++ b/education/windows/configure-aad-google-trust.md @@ -86,15 +86,15 @@ $LogOffUri = "https://accounts.google.com/logout" $brand = "Google Workspace Identity" Connect-MsolService $DomainAuthParams = @{ - DomainName = $DomainName - Authentication = "Federated" - IssuerUri = $issuerUri - FederationBrandName = $brand - ActiveLogOnUri = $logOnUri - PassiveLogOnUri = $logOnUri - LogOffUri = $LogOffUri - SigningCertificate = $cert - PreferredAuthenticationProtocol = "SAMLP" + DomainName = $DomainName + Authentication = "Federated" + IssuerUri = $issuerUri + FederationBrandName = $brand + ActiveLogOnUri = $logOnUri + PassiveLogOnUri = $logOnUri + LogOffUri = $LogOffUri + SigningCertificate = $cert + PreferredAuthenticationProtocol = "SAMLP" } Set-MsolDomainAuthentication @DomainAuthParams ``` @@ -119,6 +119,59 @@ SigningCertificate : SupportsMfa : ``` +```powershell +Install-Module Microsoft.Graph +Import-Module Microsoft.Graph + +$domainId = "" + +$xml = [Xml](Get-Content GoogleIDPMetadata.xml) + +$cert = -join $xml.EntityDescriptor.IDPSSODescriptor.KeyDescriptor.KeyInfo.X509Data.X509Certificate.Split() +$issuerUri = $xml.EntityDescriptor.entityID +$signinUri = $xml.EntityDescriptor.IDPSSODescriptor.SingleSignOnService | ? { $_.Binding.Contains('Redirect') } | % { $_.Location } +$signoutUri = "https://accounts.google.com/logout" +$displayName = "Google Workspace Identity" +Connect-MGGraph -Scopes "Domain.ReadWrite.All", "Directory.AccessAsUser.All" + +$domainAuthParams = @{ + DomainId = $domainId + IssuerUri = $issuerUri + DisplayName = $displayName + ActiveSignInUri = $signinUri + PassiveSignInUri = $signinUri + SignOutUri = $signoutUri + SigningCertificate = $cert + PreferredAuthenticationProtocol = "saml" + federatedIdpMfaBehavior = "acceptIfMfaDoneByFederatedIdp" +} + +New-MgDomainFederationConfiguration @domainAuthParams +``` + +To verify that the configuration is correct, you can use the following PowerShell command: + +```powershell +Get-MgDomainFederationConfiguration -DomainId $domainId |fl +``` + +```output +ActiveSignInUri : https://accounts.google.com/o/saml2/idp?idpid= +DisplayName : Google Workspace Identity +FederatedIdpMfaBehavior : acceptIfMfaDoneByFederatedIdp +Id : 3f600dce-ab37-4798-9341-ffd34b147f70 +IsSignedAuthenticationRequestRequired : +IssuerUri : https://accounts.google.com/o/saml2?idpid= +MetadataExchangeUri : +NextSigningCertificate : +PassiveSignInUri : https://accounts.google.com/o/saml2/idp?idpid= +PreferredAuthenticationProtocol : saml +PromptLoginBehavior : +SignOutUri : https://accounts.google.com/logout +SigningCertificate : +AdditionalProperties : {} +``` + ## Verify federated authentication between Google Workspace and Azure AD From a private browser session, navigate to https://portal.azure.com and sign in with a Google Workspace account: