Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #Gets a user from Azure AD, including the associated FIDO and NGC keys.
- Get-AzureADUserEx [-All] -AccessToken <String> [-TenantId <Guid>] [<CommonParameters>]
- Get-AzureADUserEx -AccessToken <String> -ObjectId <Guid> [-TenantId <Guid>] [<CommonParameters>]
- Get-AzureADUserEx -AccessToken <String> -UserPrincipalName <String> [-TenantId <Guid>] [<CommonParameters>]
- #Displays info about Azure AD users with key credentials. Authentication is handled by the AzureAD module.
- #Example 1
- Install-Module -Name AzureAD,DSInternals -Force
- Connect-AzureAD
- $token = [Microsoft.Open.Azure.AD.CommonLibrary.AzureSession]::AccessTokens['AccessToken'].AccessToken
- Get-AzureADUserEx -All -Token $token | Where-Object KeyCredentials -ne $null
- <# Sample Output:
- ObjectId: af4cf208-16e0-429d-b574-2a09c5f30dea
- UserPrincipalName: john@contoso.com
- Enabled: True
- DisplayName: John Doe
- Key Credentials:
- Usage=FIDO, Source=AzureAD, Device=00000000-0000-0000-0000-000000000000, Created=12/12/2019 9:42:21 AM
- Usage=NGC, Source=AzureAD, Device=cbad3c94-b480-4fa6-9187-ff1ed42c4479, Created=11/17/2015 8:17:13 AM
- ObjectId: 5dd9c7f0-9441-4c5a-b2df-ca7b889d8c4c
- UserPrincipalName: peter@contoso.com
- Enabled: True
- DisplayName: Peter Smith
- Key Credentials:
- Usage=NGC, Source=AzureAD, Device=21c915a8-0326-47c4-8985-2aceda00eaee, Created=12/26/2019 1:22:17 PM
- Usage=NGC, Source=AzureAD, Device=ec45d71b-b5dd-45dc-beaf-e248cbcb2bd3, Created=12/24/2019 9:44:56 AM
- #>
- #Lists all FIDO2 tokens registered in an Azure AD tenant, but only on accounts that are enabled.
- Install-Module -Name AzureAD,DSInternals -Force
- Connect-AzureAD
- $token = [Microsoft.Open.Azure.AD.CommonLibrary.AzureSession]::AccessTokens['AccessToken'].AccessToken
- Get-AzureADUserEx -All -Token $token | Where-Object Enabled -eq $true | Select-Object -ExpandProperty KeyCredentials | Where-Object Usage -eq FIDO | Format-Table -View FIDO
- <# Sample Output:
- DisplayName AAGUID Alg Counter Created Owner
- ----------- ------ --- ------- ------- -----
- SoloKeys Tap 8876631b-d4a0-427f-5773-0ec71c9e0279 ES256 274 2019-08-29 james@contoso.com
- SoloKeys Solo 8876631b-d4a0-427f-5773-0ec71c9e0279 ES256 281 2019-08-29 thomas@contoso.com
- eWBM Goldengate G320 87dbc5a1-4c94-4dc8-8a47-97d800fd1f3c ES256 83 2019-08-29 jane@contoso.com
- eWBM Goldengate G310 95442b2e-f15e-4def-b270-efb106facb4e ES256 4 2019-08-29 mary@contoso.com
- Feitian BioPass FIDO2 77010bd7-212a-4fc9-b236-d2ca5e9d4084 ES256 261 2019-08-26 george@contoso.com
- Yubico Security Key FIDO2 f8a011f3-8c0a-4d15-8006-17111f9edc7d ES256 257 2019-08-26 matt@contoso.com
- Feitian AllinPass FIDO2 12ded745-4bed-47d4-abaa-e713f51d6393 ES256 231 2019-08-26 jenny@contoso.com
- YubiKey 5 fa2b99dc-9e39-4257-8f92-4a30d23c4118 ES256 229 2019-08-26 jill@contoso.com
- YubiKey 5 cb69481e-8ff7-4039-93ec-0a2729a154a8 ES256 25 2019-12-12 john@contoso.com
- Feitian All-In-Pass 12ded745-4bed-47d4-abaa-e713f51d6393 ES256 1398 2020-03-31 peter@contoso.com
- eWBM Goldengate G320 87dbc5a1-4c94-4dc8-8a47-97d800fd1f3c ES256 37 2019-08-29 joe@contoso.com
- eWBM Goldengate G310 95442b2e-f15e-4def-b270-efb106facb4e ES256 48 2019-08-29 joe@contoso.com
- #>
- Lists weak public keys registered in Azure Active Directory that were generated on ROCA-vulnerable TPMs.
- Get-AzureADUserEx -All -Token $token | Where-Object Enabled -eq $true | Select-Object -ExpandProperty KeyCredentials | Where-Object Usage -eq NGC | Format-Table -View ROCA
- <# Sample Output:
- Usage IsWeak Source DeviceId Created Owner
- ----- ------ ------ -------- ------- -----
- NGC True AzureAD fd591087-245c-4ff5-a5ea-c14de5e2b32d 2017-07-19 joe@contoso.com
- NGC False AzureAD 1966d4da-14da-4581-a7a7-5e8e07e93ad9 2019-08-01 peter@contoso.com
- #>
- #Gets information about a single Azure Active Directory user. If necessary, the access token is automatically refreshed by the standard #Get-AzureADTenantDetail cmdlet.
- Get-AzureADTenantDetail | Out-Null
- $token = [Microsoft.Open.Azure.AD.CommonLibrary.AzureSession]::AccessTokens['AccessToken'].AccessToken
- Get-AzureADUserEx -UserPrincipalName 'john@contoso.com' -Token $token
- <# Sample Output:
- ObjectId: af4cf208-16e0-429d-b574-2a09c5f30dea
- UserPrincipalName: john@contoso.com
- Enabled: True
- DisplayName: John Doe
- Key Credentials:
- Usage=FIDO, Source=AzureAD, Device=00000000-0000-0000-0000-000000000000, Created=12/12/2019 9:42:21 AM
- Usage=NGC, Source=AzureAD, Device=cbad3c94-b480-4fa6-9187-ff1ed42c4479, Created=11/17/2015 8:17:13 AM
- #>
- #Displays details about FIDO2 keys registered in Azure Active Directory by a specific user.
- Get-AzureADUserEx -UserPrincipalName 'john@contoso.com' -AccessToken $token | ForEach-Object { $PSItem.KeyCredentials.FidoKeyMaterial }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement