Maybe you already read my last blog post about using PowerApps for Microsoft Identity Manager where you find a definitions file for the Lithnet RestAPI for MIM to create a custom API for PowerApps. If not, please do so for some basic information’s.
I also will present the MIM and PAM PowerApps solution with some detailed information on the next MIM Team User Group meeting on June 15.
This time I give to all of you the swagger JSON definition file for the Privileged Access Management (PAM) RestAPI around with a demo PowerApp.
The swagger JSON and YAML files contains all the API calls that PAM provides, so you can do the following:
- Get a list of all PAM roles you are a candidate for
- Get the PAM role request history
- Request a PAM role and also Cancel your request before TTL exceeds
- Get a list of all PAM role requests you should approve
- Approve of Reject a PAM role request
Since PowerApps is still a preview feature you might have some issues like I have, but I was able to test all scenarios mentioned above.
Continue reading “Create PAM (Privileged Access Management) Mobile Apps with PowerApps”
This is a follow-up post to my article regarding Azure MFA used in an authorization workflow for MIM 2016. You can get some details on the scenario from that post.
As a limitation the Azure MFA SDK can only be used for Phone or SMS (one-way, two-way) authentication but not with the mobile app method. That’s because of mobile app uses a Web Service to get messages pushed and this one needs to be implemented with MFA-Server.
But I find it a neat solution to have an authorization task for an approval of group membership with using the mobile app. There are a couple of things needed to get this working:
- Azure MFA Server
- Installation of Web Service SDK
- Installation of Web Service for Mobile App
- Public Trusted Certificate (or Self Signed for demo lab like I did)
- Optionally: Azure MFA User Portal (For user registering mobile app with QR-Code)
I do not explain how to install these components because there is a lot of very good documentation out there. I used the following one which worked like charm:
Continue reading “MIM2016: Using Azure MFA Mobile App Auth in authorization workflows”
Yesterday I wrote a blog post on how to setup PAM role with approvals in Privileged Access Management of Microsoft Identity Manager 2016.
Here is part 2 where I will be covering the following features:
- PAM role with time span limits (e.g. 08:00 to 17:00)
- PAM role with a specific request time (requests in future)
First make sure that the server running PAM components and the MIM service/portal have the correct time zone setting. You can check that in MIM portal under: Administration -> Portal Configuration -> Timezone
Currently the time restrictions are only working on time values not dates, so you cannot exclude weekend days for example. Only restrictions like 8:00 to 17:00 (or 8:00 am to 5:00 pm) are possible.
The supported way to set a time span rule on a PAM role is through PowerShell:
$pamrole = Get-PAMRole "SQLAdmins"
Set-PAMRole -Role $pamrole -AvailabilityWindowEnabled $true -AvailableFrom "08:00" -AvailableTo "17:00"
Continue reading “Privileged Access Management: PAM roles with time span and future requests (Part 2)”
Well, here is some more information from playing with my Privileged Access Management (PAM) demo lab of MIM 2016
Looking a little bit under the surface you will see there are some more options you can set on PAM roles, like the following:
- RAM roles with approvals
- PAM roles with a valid time span (e.g. 8:00 to 17:00)
- PAM roles with Azure MFA authentication
- PAM roles requesting in the future (e.g. Role request for tomorrow)
This part is regarding PAM roles with approvals, there will be more posts regarding the other options in the near future.
Continue reading “Privileged Access Management: PAM roles with approvals (Part 1)”
I’ve recently worked in my demo lab with Microsoft Identity Manager 2016 (MIM) feature called Privileged Access Management (PAM) to prepare for workshops and a first implementation at a customer.
One thing that came to my mind was, how I can enable PAM Admins to see a list of all currently active PAM requests on the system.
Option 1 is to use PowerShell from the MIMPAM Module to get an overview:
Get-PAMUser | Get-PAMRequest –Active
Quite simple, right?
But I want some graphical version and since the good “old” MIM portal is also present in that scenario I tried to figure out on how to search only “Active” roles/requests.
Continue reading “Privileged Access Management: List all active pam requests”
Seems that the new MIM 2016 feature called PAM (Privileged Access Management) found its way into Azure AD Premium also.
In Azure AD Premium this is called PIM (Privileged Identity Management).
See the following accouncment on the Alex Technet AD Blog:
You can also have a quick look into this with whis video on Channel 9:
Continue reading “Just in Time Administration (JIT) in Azure AD Premium for Preview”