update to use new PowerShell module

This commit is contained in:
Paolo Matarazzo
2023-04-04 16:00:16 -04:00
parent d3d5b8faff
commit 101175c5d5

View File

@ -86,15 +86,15 @@ $LogOffUri = "https://accounts.google.com/logout"
$brand = "Google Workspace Identity" $brand = "Google Workspace Identity"
Connect-MsolService Connect-MsolService
$DomainAuthParams = @{ $DomainAuthParams = @{
DomainName = $DomainName DomainName = $DomainName
Authentication = "Federated" Authentication = "Federated"
IssuerUri = $issuerUri IssuerUri = $issuerUri
FederationBrandName = $brand FederationBrandName = $brand
ActiveLogOnUri = $logOnUri ActiveLogOnUri = $logOnUri
PassiveLogOnUri = $logOnUri PassiveLogOnUri = $logOnUri
LogOffUri = $LogOffUri LogOffUri = $LogOffUri
SigningCertificate = $cert SigningCertificate = $cert
PreferredAuthenticationProtocol = "SAMLP" PreferredAuthenticationProtocol = "SAMLP"
} }
Set-MsolDomainAuthentication @DomainAuthParams Set-MsolDomainAuthentication @DomainAuthParams
``` ```
@ -119,6 +119,59 @@ SigningCertificate : <BASE64 encoded certificate>
SupportsMfa : SupportsMfa :
``` ```
```powershell
Install-Module Microsoft.Graph
Import-Module Microsoft.Graph
$domainId = "<your domain name>"
$xml = [Xml](Get-Content GoogleIDPMetadata.xml)
$cert = -join $xml.EntityDescriptor.IDPSSODescriptor.KeyDescriptor.KeyInfo.X509Data.X509Certificate.Split()
$issuerUri = $xml.EntityDescriptor.entityID
$signinUri = $xml.EntityDescriptor.IDPSSODescriptor.SingleSignOnService | ? { $_.Binding.Contains('Redirect') } | % { $_.Location }
$signoutUri = "https://accounts.google.com/logout"
$displayName = "Google Workspace Identity"
Connect-MGGraph -Scopes "Domain.ReadWrite.All", "Directory.AccessAsUser.All"
$domainAuthParams = @{
DomainId = $domainId
IssuerUri = $issuerUri
DisplayName = $displayName
ActiveSignInUri = $signinUri
PassiveSignInUri = $signinUri
SignOutUri = $signoutUri
SigningCertificate = $cert
PreferredAuthenticationProtocol = "saml"
federatedIdpMfaBehavior = "acceptIfMfaDoneByFederatedIdp"
}
New-MgDomainFederationConfiguration @domainAuthParams
```
To verify that the configuration is correct, you can use the following PowerShell command:
```powershell
Get-MgDomainFederationConfiguration -DomainId $domainId |fl
```
```output
ActiveSignInUri : https://accounts.google.com/o/saml2/idp?idpid=<GUID>
DisplayName : Google Workspace Identity
FederatedIdpMfaBehavior : acceptIfMfaDoneByFederatedIdp
Id : 3f600dce-ab37-4798-9341-ffd34b147f70
IsSignedAuthenticationRequestRequired :
IssuerUri : https://accounts.google.com/o/saml2?idpid=<GUID>
MetadataExchangeUri :
NextSigningCertificate :
PassiveSignInUri : https://accounts.google.com/o/saml2/idp?idpid=<GUID>
PreferredAuthenticationProtocol : saml
PromptLoginBehavior :
SignOutUri : https://accounts.google.com/logout
SigningCertificate : <BASE64 encoded certificate>
AdditionalProperties : {}
```
## Verify federated authentication between Google Workspace and Azure AD ## Verify federated authentication between Google Workspace and Azure AD
From a private browser session, navigate to https://portal.azure.com and sign in with a Google Workspace account: From a private browser session, navigate to https://portal.azure.com and sign in with a Google Workspace account: