Impersonate on Azure AD Joined Device
See original GitHub issueI’m using your SimpleImpersonation library for a very small .NET application, however our IT department have recently moved our devices from an On Premises Active Directory to instead making them Azure AD joined. The on-premises domain is still there behind the scenes, however the laptops cannot “see” it directly.
In short, the significance is that in order to now login I need to provide a username in the format of:
AzureAD\firstname.lastname@mydomain.com
but I get an error of Username cannot contain more than one \ or @ character
Issue Analytics
- State:
- Created 2 years ago
- Comments:5 (2 by maintainers)
Top Results From Across the Web
Impersonate another user using the Web API
Impersonation is used to execute business logic (code) on behalf of another Microsoft Dataverse user to provide a desired feature or service ...
Read more >Azure User Impersonation Setup Between Two Applications
The idea is to propagate the delegated user identity and permissions through the request chain.For the middle-tier service to make ...
Read more >Moving laterally between Azure AD joined machines
However, Azure AD joined machine can still be challenged by adversaries who want to impersonate Azure AD users and move laterally between Azure...
Read more >Stealing and faking Azure AD device identities
In this blog, I'll show how to steal identities of existing Azure AD joined devices, and how to fake identies of non-AAD joined...
Read more >Azure AD authentication - How to impersonate any user?
No, it is not possible to impersonate a user in Azure AD without that user's credentials. ... How to select user in Task...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Hi Matt, From the limited testing I’ve been able to do, this does appear to work. Thanks very much.
Fixed in version 4.2.0. Note that the tests only test the syntax. I did not actually try to use this against an Azure Active Directory instance. Please give it a try and let me know how it goes. Thanks.