AccessToken_utils.ps1
# This script contains functions for handling access tokens # and some utility functions # VARIABLES # Unix epoch time (1.1.1970) $epoch = Get-Date -Day 1 -Month 1 -Year 1970 -Hour 0 -Minute 0 -Second 0 -Millisecond 0 # FOCI client ids # Ref: https://github.com/secureworks/family-of-client-ids-research/blob/main/known-foci-clients.csv $FOCIs = @{ "00b41c95-dab0-4487-9791-b9d2c32c80f2" = "Office 365 Management" "04b07795-8ddb-461a-bbee-02f9e1bf7b46" = "Microsoft Azure CLI" "1950a258-227b-4e31-a9cf-717495945fc2" = "Microsoft Azure PowerShell" "1fec8e78-bce4-4aaf-ab1b-5451cc387264" = "Microsoft Teams" "26a7ee05-5602-4d76-a7ba-eae8b7b67941" = "Windows Search" "27922004-5251-4030-b22d-91ecd9a37ea4" = "Outlook Mobile" "4813382a-8fa7-425e-ab75-3b753aab3abb" = "Microsoft Authenticator App" "ab9b8c07-8f02-4f72-87fa-80105867a763" = "OneDrive SyncEngine" "d3590ed6-52b3-4102-aeff-aad2292ab01c" = "Microsoft Office" "872cd9fa-d31f-45e0-9eab-6e460a02d1f1" = "Visual Studio" "af124e86-4e96-495a-b70a-90f90ab96707" = "OneDrive iOS App" "2d7f3606-b07d-41d1-b9d2-0d0c9296a6e8" = "Microsoft Bing Search for Microsoft Edge" "844cca35-0656-46ce-b636-13f48b0eecbd" = "Microsoft Stream Mobile Native" "87749df4-7ccf-48f8-aa87-704bad0e0e16" = "Microsoft Teams - Device Admin Agent" "cf36b471-5b44-428c-9ce7-313bf84528de" = "Microsoft Bing Search" "0ec893e0-5785-4de6-99da-4ed124e5296c" = "Office UWP PWA" "22098786-6e16-43cc-a27d-191a01a1e3b5" = "Microsoft To-Do client" "4e291c71-d680-4d0e-9640-0a3358e31177" = "PowerApps" "57336123-6e14-4acc-8dcf-287b6088aa28" = "Microsoft Whiteboard Client" "57fcbcfa-7cee-4eb1-8b25-12d2030b4ee0" = "Microsoft Flow" "66375f6b-983f-4c2c-9701-d680650f588f" = "Microsoft Planner" "9ba1a5c7-f17a-4de9-a1f1-6178c8d51223" = "Microsoft Intune Company Portal" "a40d7d7d-59aa-447e-a655-679a4107e548" = "Accounts Control UI" "a569458c-7f2b-45cb-bab9-b7dee514d112" = "Yammer iPhone" "b26aadf8-566f-4478-926f-589f601d9c74" = "OneDrive" "c0d2a505-13b8-4ae0-aa9e-cddd5eab0b12" = "Microsoft Power BI" "d326c1ce-6cc6-4de2-bebc-4591e5e13ef0" = "SharePoint" "e9c51622-460d-4d3d-952d-966a5b1da34c" = "Microsoft Edge" "eb539595-3fe1-474e-9c1d-feb3625d1be5" = "Microsoft Tunnel" "ecd6b820-32c2-49b6-98a6-444530e5a77a" = "Microsoft Edge" "f05ff7c9-f75a-4acd-a3b5-f4b6a870245d" = "SharePoint Android" "f44b1140-bc5e-48c6-8dc0-5cf5a53c0e34" = "Microsoft Edge" "be1918be-3fe3-4be9-b32b-b542fc27f02e" = "M365 Compliance Drive Client" "cab96880-db5b-4e15-90a7-f3f1d62ffe39" = "Microsoft Defender Platform" "d7b530a4-7680-4c23-a8bf-c52c121d2e87" = "Microsoft Edge Enterprise New Tab Page" "dd47d17a-3194-4d86-bfd5-c6ae6f5651e3" = "Microsoft Defender for Mobile" "e9b154d0-7658-433b-bb25-6b8e0a8a7c59" = "Outlook Lite" } # Resource ids $RESIDs = @{ "00000003-0000-0000-c000-000000000000" = "https://graph.windows.net" } # Stored tokens (access & refresh) $tokens=@{} $refresh_tokens=@{} ## UTILITY FUNCTIONS FOR API COMMUNICATIONS # Return user's login information function Get-LoginInformation { <# .SYNOPSIS Returns authentication information of the given user or domain .DESCRIPTION Returns authentication of the given user or domain .Example Get-AADIntLoginInformation -Domain outlook.com Tenant Banner Logo : Authentication Url : https://login.live.com/login.srf?username=nn%40outlook.com&wa=wsignin1.0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx= Pref Credential : 6 Federation Protocol : WSTrust Throttle Status : 0 Cloud Instance : microsoftonline.com Federation Brand Name : MSA Realms Domain Name : live.com Federation Metadata Url : https://nexus.passport.com/FederationMetadata/2007-06/FederationMetadata.xml Tenant Banner Illustration : Consumer Domain : True State : 3 Federation Active Authentication Url : https://login.live.com/rst2.srf User State : 2 Account Type : Federated Tenant Locale : Domain Type : 2 Exists : 5 Has Password : True Cloud Instance audience urn : urn:federation:MicrosoftOnline Federation Global Version : -1 .Example Get-AADIntLoginInformation -UserName someone@company.com Tenant Banner Logo : https://secure.aadcdn.microsoftonline-p.com/c1c6b6c8-okmfqodscgr7krbq5-p48zooi4b7m9g2zcpryoikta/logintenantbranding/0/bannerlogo?ts=635912486993671038 Authentication Url : Pref Credential : 1 Federation Protocol : Throttle Status : 1 Cloud Instance : microsoftonline.com Federation Brand Name : Company Ltd Domain Name : company.com Federation Metadata Url : Tenant Banner Illustration : Consumer Domain : State : 4 Federation Active Authentication Url : User State : 1 Account Type : Managed Tenant Locale : 0 Domain Type : 3 Exists : 0 Has Password : True Cloud Instance audience urn : urn:federation:MicrosoftOnline Desktop Sso Enabled : True Federation Global Version : #> [cmdletbinding()] Param( [Parameter(ParameterSetName='Domain',Mandatory=$True)] [String]$Domain, [Parameter(ParameterSetName='User',Mandatory=$True)] [String]$UserName ) Process { if([string]::IsNullOrEmpty($UserName)) { $isDomain = $true $UserName = "nn@$Domain" } $subScope = Get-TenantSubscope -Domain $UserName.Split("@")[1] # Gather login information using different APIs $realm1=Get-UserRealm -UserName $UserName -SubScope $subScope # common/userrealm API 1.0 $realm2=Get-UserRealmExtended -UserName $UserName -SubScope $subScope # common/userrealm API 2.0 $realm3=Get-UserRealmV2 -UserName $UserName -SubScope $subScope # GetUserRealm.srf (used in the old Office 365 login experience) $realm4=Get-CredentialType -UserName $UserName -SubScope $subScope # common/GetCredentialType (used in the "new" Office 365 login experience) # Create a return object $attributes = @{ "Account Type" = $realm1.account_type # Managed or federated "Domain Name" = $realm1.domain_name "Cloud Instance" = $realm1.cloud_instance_name "Cloud Instance audience urn" = $realm1.cloud_audience_urn "Federation Brand Name" = $realm2.FederationBrandName "Tenant Locale" = $realm2.TenantBrandingInfo.Locale "Tenant Banner Logo" = $realm2.TenantBrandingInfo.BannerLogo "Tenant Banner Illustration" = $realm2.TenantBrandingInfo.Illustration "State" = $realm3.State "User State" = $realm3.UserState "Exists" = $realm4.IfExistsResult "Throttle Status" = $realm4.ThrottleStatus "Pref Credential" = $realm4.Credentials.PrefCredential "Has Password" = $realm4.Credentials.HasPassword "Domain Type" = $realm4.EstsProperties.DomainType "Federation Protocol" = $realm1.federation_protocol "Federation Metadata Url" = $realm1.federation_metadata_url "Federation Active Authentication Url" = $realm1.federation_active_auth_url "Authentication Url" = $realm2.AuthUrl "Consumer Domain" = $realm2.ConsumerDomain "Federation Global Version" = $realm3.FederationGlobalVersion "Desktop Sso Enabled" = $realm4.EstsProperties.DesktopSsoEnabled } # Return return New-Object psobject -Property $attributes } } # Return user's authentication realm from common/userrealm using API 1.0 function Get-UserRealm { <# .SYNOPSIS Returns authentication realm of the given user .DESCRIPTION Returns authentication realm of the given user using common/userrealm API 1.0 .Example Get-AADIntUserRealm -UserName "user@company.com" ver : 1.0 account_type : Managed domain_name : company.com cloud_instance_name : microsoftonline.com cloud_audience_urn : urn:federation:MicrosoftOnline .Example Get-AADIntUserRealm -UserName "user@company.com" ver : 1.0 account_type : Federated domain_name : company.com federation_protocol : WSTrust federation_metadata_url : https://sts.company.com/adfs/services/trust/mex federation_active_auth_url : https://sts.company.com/adfs/services/trust/2005/usernamemixed cloud_instance_name : microsoftonline.com cloud_audience_urn : urn:federation:MicrosoftOnline #> [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$UserName, [Parameter(Mandatory=$False)] [Microsoft.PowerShell.Commands.WebRequestSession]$webSession, [Parameter(Mandatory=$False)] [String]$SubScope ) Process { # Call the API $userRealm=Invoke-RestMethod -UseBasicParsing -Uri ("$(Get-TenantLoginUrl -SubScope $SubScope)/common/userrealm/$UserName"+"?api-version=1.0") -WebSession $webSession -Headers @{"User-agent" = Get-UserAgent} # Verbose Write-Verbose "USER REALM $($userRealm | Out-String)" # Return $userRealm } } # Return user's authentication realm from common/userrealm using API 2.0 function Get-UserRealmExtended { <# .SYNOPSIS Returns authentication realm of the given user .DESCRIPTION Returns authentication realm of the given user using common/userrealm API 2.0 .Example Get-AADIntUserRealmExtended -UserName "user@company.com" NameSpaceType : Managed Login : user@company.com DomainName : company.com FederationBrandName : Company Ltd TenantBrandingInfo : {@{Locale=0; BannerLogo=https://secure.aadcdn.microsoftonline-p.com/xxx/logintenantbranding/0/bannerlogo? ts=111; TileLogo=https://secure.aadcdn.microsoftonline-p.com/xxx/logintenantbranding/0/til elogo?ts=112; BackgroundColor=#FFFFFF; BoilerPlateText=From here you can sign-in to Company Ltd services; UserIdLabel=firstname.lastname@company.com; KeepMeSignedInDisabled=False}} cloud_instance_name : microsoftonline.com .Example Get-AADIntUserRealmExtended -UserName "user@company.com" NameSpaceType : Federated federation_protocol : WSTrust Login : user@company.com AuthURL : https://sts.company.com/adfs/ls/?username=user%40company.com&wa=wsignin1. 0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx= DomainName : company.com FederationBrandName : Company Ltd TenantBrandingInfo : cloud_instance_name : microsoftonline.com #> [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$UserName, [Parameter(Mandatory=$False)] [String]$SubScope ) Process { # Call the API $userRealm=Invoke-RestMethod -UseBasicParsing -Uri ("$(Get-TenantLoginUrl -SubScope $SubScope)/common/userrealm/$UserName"+"?api-version=2.0") -Headers @{"User-agent" = Get-UserAgent} # Verbose Write-Verbose "USER REALM $($userRealm | Out-String)" # Return $userRealm } } # Return user's authentication realm from GetUserRealm.srf (used in the old Office 365 login experience) function Get-UserRealmV2 { <# .SYNOPSIS Returns authentication realm of the given user .DESCRIPTION Returns authentication realm of the given user using GetUserRealm.srf (used in the old Office 365 login experience) .Example Get-AADIntUserRealmV3 -UserName "user@company.com" State : 4 UserState : 1 Login : user@company.com NameSpaceType : Managed DomainName : company.com FederationBrandName : Company Ltd CloudInstanceName : microsoftonline.com .Example Get-AADIntUserRealmV2 -UserName "user@company.com" State : 3 UserState : 2 Login : user@company.com NameSpaceType : Federated DomainName : company.com FederationGlobalVersion : -1 AuthURL : https://sts.company.com/adfs/ls/?username=user%40company.com&wa=wsignin1. 0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx= FederationBrandName : Company Ltd CloudInstanceName : microsoftonline.com #> [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$UserName, [Parameter(Mandatory=$False)] [String]$SubScope ) Process { # Call the API $userRealm=Invoke-RestMethod -UseBasicParsing -Uri ("$(Get-TenantLoginUrl -SubScope $SubScope)/GetUserRealm.srf?login=$UserName") -Headers @{"User-agent" = Get-UserAgent} # Verbose Write-Verbose "USER REALM: $($userRealm | Out-String)" # Return $userRealm } } # Return user's authentication type information from common/GetCredentialType function Get-CredentialType { <# .SYNOPSIS Returns authentication information of the given user .DESCRIPTION Returns authentication of the given user using common/GetCredentialType (used in the "new" Office 365 login experience) .Example Get-AADIntUserRealmExtended -UserName "user@company.com" Username : user@company.com Display : user@company.com IfExistsResult : 0 ThrottleStatus : 1 Credentials : @{PrefCredential=1; HasPassword=True; RemoteNgcParams=; FidoParams=; SasParams=} EstsProperties : @{UserTenantBranding=System.Object[]; DomainType=3} FlowToken : apiCanary : AQABAAA..A NameSpaceType : Managed Login : user@company.com DomainName : company.com FederationBrandName : Company Ltd TenantBrandingInfo : {@{Locale=0; BannerLogo=https://secure.aadcdn.microsoftonline-p.com/xxx/logintenantbranding/0/bannerlogo? ts=111; TileLogo=https://secure.aadcdn.microsoftonline-p.com/xxx/logintenantbranding/0/til elogo?ts=112; BackgroundColor=#FFFFFF; BoilerPlateText=From here you can sign-in to Company Ltd services; UserIdLabel=firstname.lastname@company.com; KeepMeSignedInDisabled=False}} cloud_instance_name : microsoftonline.com .Example Get-AADIntUserRealmExtended -UserName "user@company.com" Username : user@company.com Display : user@company.com IfExistsResult : 0 ThrottleStatus : 1 Credentials : @{PrefCredential=4; HasPassword=True; RemoteNgcParams=; FidoParams=; SasParams=; FederationRed irectUrl=https://sts.company.com/adfs/ls/?username=user%40company.com&wa=wsignin1.0&wtreal m=urn%3afederation%3aMicrosoftOnline&wctx=} EstsProperties : @{UserTenantBranding=; DomainType=4} FlowToken : apiCanary : AQABAAA..A #> [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$UserName, [Parameter(Mandatory=$False)] [String]$FlowToken, [Parameter(Mandatory=$False)] [String]$OriginalRequest, [Parameter(Mandatory=$False)] [Microsoft.PowerShell.Commands.WebRequestSession]$webSession, [Parameter(Mandatory=$False)] [String]$SubScope ) Process { # Create a body for REST API request $body = @{ "username"=$UserName "isOtherIdpSupported" = $true "checkPhones" = $true "isRemoteNGCSupported" = $true "isCookieBannerShown" = $false "isFidoSupported" = $true "isAccessPassSupported" = $true "originalRequest" = $OriginalRequest "flowToken" = $FlowToken } # TAP support can only be requested if originalRequest is provided. Otherwise we'll get error code 6000. if(![string]::IsNullOrEmpty($OriginalRequest)) { $body["isAccessPassSupported"] = $true } # Call the API $userRealm=Invoke-RestMethod -UseBasicParsing -Uri ("$(Get-TenantLoginUrl -SubScope $SubScope)/common/GetCredentialType") -ContentType "application/json; charset=UTF-8" -Method POST -Body ($body|ConvertTo-Json) -WebSession $webSession -Headers @{"User-agent" = Get-UserAgent} # Verbose & Debug Write-Verbose "CREDENTIAL TYPE: Exist=$($userRealm.IfExistsResult), Federated=$(![string]::IsNullOrEmpty($userRealm.Credentials.FederationRedirectUrl))" Write-Debug "CREDENTIAL TYPE: $($userRealm | Out-String)" # Return $userRealm } } # Return OpenID configuration for the domain # Mar 21 2019 function Get-OpenIDConfiguration { <# .SYNOPSIS Returns OpenID configuration of the given domain or user .DESCRIPTION Returns OpenID configuration of the given domain or user .Example Get-AADIntOpenIDConfiguration -UserName "user@company.com" .Example Get-AADIntOpenIDConfiguration -Domain company.com authorization_endpoint : https://login.microsoftonline.com/5b62a25d-60c6-40e6-aace-8a43e8b8ba4a/oauth2/authorize token_endpoint : https://login.microsoftonline.com/5b62a25d-60c6-40e6-aace-8a43e8b8ba4a/oauth2/token token_endpoint_auth_methods_supported : {client_secret_post, private_key_jwt, client_secret_basic} jwks_uri : https://login.microsoftonline.com/common/discovery/keys response_modes_supported : {query, fragment, form_post} subject_types_supported : {pairwise} id_token_signing_alg_values_supported : {RS256} http_logout_supported : True frontchannel_logout_supported : True end_session_endpoint : https://login.microsoftonline.com/5b62a25d-60c6-40e6-aace-8a43e8b8ba4a/oauth2/logout response_types_supported : {code, id_token, code id_token, token id_token...} scopes_supported : {openid} issuer : https://sts.windows.net/5b62a25d-60c6-40e6-aace-8a43e8b8ba4a/ claims_supported : {sub, iss, cloud_instance_name, cloud_instance_host_name...} microsoft_multi_refresh_token : True check_session_iframe : https://login.microsoftonline.com/5b62a25d-60c6-40e6-aace-8a43e8b8ba4a/oauth2/checkses sion userinfo_endpoint : https://login.microsoftonline.com/5b62a25d-60c6-40e6-aace-8a43e8b8ba4a/openid/userinfo tenant_region_scope : EU cloud_instance_name : microsoftonline.com cloud_graph_host_name : graph.windows.net msgraph_host : graph.microsoft.com rbac_url : https://pas.windows.net #> [cmdletbinding()] Param( [Parameter(ParameterSetName='Domain',Mandatory=$True)] [String]$Domain, [Parameter(ParameterSetName='User',Mandatory=$True)] [String]$UserName ) Process { if([String]::IsNullOrEmpty($Domain)) { $Domain = $UserName.Split("@")[1] } # Call the API $openIdConfig=Invoke-RestMethod -UseBasicParsing -Uri "https://login.microsoftonline.com/$domain/.well-known/openid-configuration" -Headers @{"User-agent" = Get-UserAgent} # Return $openIdConfig } } # Get the tenant ID for the given user/domain/accesstoken function Get-TenantID { <# .SYNOPSIS Returns TenantID of the given domain, user, or AccessToken .DESCRIPTION Returns TenantID of the given domain, user, or AccessToken .Example Get-AADIntTenantID -UserName "user@company.com" .Example Get-AADIntTenantID -Domain company.com .Example Get-AADIntTenantID -AccessToken $at #> [cmdletbinding()] Param( [Parameter(ParameterSetName='Domain',Mandatory=$True)] [String]$Domain, [Parameter(ParameterSetName='User',Mandatory=$True)] [String]$UserName, [Parameter(ParameterSetName='AccessToken', Mandatory=$True)] [String]$AccessToken ) Process { if([String]::IsNullOrEmpty($AccessToken)) { if([String]::IsNullOrEmpty($Domain)) { $Domain = $UserName.Split("@")[1] } Try { $TenantId = (Invoke-RestMethod -UseBasicParsing -Uri "https://odc.officeapps.live.com/odc/v2.1/federationprovider?domain=$domain" -Headers @{"User-agent" = Get-UserAgent}).TenantId } catch { return $null } } else { $TenantId=(Read-Accesstoken($AccessToken)).tid } # Return $TenantId } } # Check if the access token has expired function Is-AccessTokenExpired { [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$AccessToken ) Process { # Read the token $token = Read-Accesstoken($AccessToken) $now=(Get-Date).ToUniversalTime() # Get the expiration time $exp=$epoch.Date.AddSeconds($token.exp) # Compare and return $retVal = $now -ge $exp return $retVal } } # Check if the access token signature is valid # May 20th 2020 function Is-AccessTokenValid { [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$AccessToken ) Process { # Token sections $sections = $AccessToken.Split(".") $header = $sections[0] $payload = $sections[1] $signature = $sections[2] $signatureValid = $false # Fill the header with padding for Base 64 decoding while ($header.Length % 4) { $header += "=" } # Convert the token to string and json $headerBytes=[System.Convert]::FromBase64String($header) $headerArray=[System.Text.Encoding]::ASCII.GetString($headerBytes) $headerObj=$headerArray | ConvertFrom-Json # Get the signing key $KeyId=$headerObj.kid Write-Debug "PARSED TOKEN HEADER: $($headerObj | Format-List | Out-String)" # The algorithm should be RSA with SHA-256, i.e. RS256 if($headerObj.alg -eq "RS256") { # Get the public certificate $publicCert = Get-APIKeys -KeyId $KeyId Write-Debug "TOKEN SIGNING CERT: $publicCert" $certBin=[convert]::FromBase64String($publicCert) # Construct the JWT data to be verified $dataToVerify="{0}.{1}" -f $header,$payload $dataBin = [text.encoding]::UTF8.GetBytes($dataToVerify) # Remove the Base64 URL encoding from the signature and add padding $signature=$signature.Replace("-","+").Replace("_","/") while ($signature.Length % 4) { $signature += "=" } $signBytes = [convert]::FromBase64String($signature) # Extract the modulus and exponent from the certificate for($a=0;$a -lt $certBin.Length ; $a++) { # Read the bytes $byte = $certBin[$a] $nByte = $certBin[$a+1] # We are only interested in 0x02 tag where our modulus is hidden.. if($byte -eq 0x02 -and $nByte -band 0x80) { $a++ if($nbyte -band 0x02) { $byteCount = [System.BitConverter]::ToInt16($certBin[$($a+2)..$($a+1)],0) $a+=3 } elseif($nbyte -band 0x01) { $byteCount = $certBin[$($a+1)] $a+=2 } # If the first byte is 0x00, skip it if($certBin[$a] -eq 0x00) { $a++ $byteCount-- } # Now we have the modulus! $modulus = $certBin[$a..$($a+$byteCount-1)] # Next byte value is the exponent $a+=$byteCount if($certBin[$a++] -eq 0x02) { $byteCount = $certBin[$a++] $exponent = $certBin[$a..$($a+$byteCount-1)] Write-Debug "MODULUS: $(Convert-ByteArrayToHex -Bytes $modulus)" Write-Debug "EXPONENT: $(Convert-ByteArrayToHex -Bytes $exponent)" break } else { Write-Debug "Error getting modulus and exponent" } } } if($exponent -and $modulus) { # Create the RSA and other required objects $rsa = New-Object -TypeName System.Security.Cryptography.RSACryptoServiceProvider $rsaParameters = New-Object -TypeName System.Security.Cryptography.RSAParameters # Set the verification parameters $rsaParameters.Exponent = $exponent $rsaparameters.Modulus = $modulus $rsa.ImportParameters($rsaParameters) $signatureValid = $rsa.VerifyData($dataBin, $signBytes,[System.Security.Cryptography.HashAlgorithmName]::SHA256, [System.Security.Cryptography.RSASignaturePadding]::Pkcs1) $rsa.Dispose() } } else { Write-Error "Access Token signature algorithm $($headerObj.alg) not supported!" } return $signatureValid } } # Gets OAuth information using SAML token function Get-OAuthInfoUsingSAML { [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$SAMLToken, [Parameter(Mandatory=$True)] [String]$Resource, [Parameter(Mandatory=$False)] [String]$ClientId="1b730954-1685-4b74-9bfd-dac224a7b894" ) Begin { # Create the headers. We like to be seen as Outlook. $headers = @{ "User-Agent" = "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; Tablet PC 2.0; Microsoft Outlook 16.0.4266)" } } Process { $encodedSamlToken= [Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($SAMLToken)) # Debug Write-Debug "SAML TOKEN: $samlToken" Write-Debug "ENCODED SAML TOKEN: $encodedSamlToken" # Create a body for API request $body = @{ "resource"=$Resource "client_id"=$ClientId "grant_type"="urn:ietf:params:oauth:grant-type:saml1_1-bearer" "assertion"=$encodedSamlToken "scope"="openid" } # Debug Write-Debug "FED AUTHENTICATION BODY: $($body | Out-String)" # Set the content type and call the Microsoft Online authentication API $contentType="application/x-www-form-urlencoded" try { $jsonResponse=Invoke-RestMethod -UseBasicParsing -Uri "https://login.microsoftonline.com/common/oauth2/token" -ContentType $contentType -Method POST -Body $body -Headers $headers } catch { Throw ($_.ErrorDetails.Message | convertfrom-json).error_description } return $jsonResponse } } # Parse access token and return it as PS object function Read-Accesstoken { <# .SYNOPSIS Extract details from the given Access Token .DESCRIPTION Extract details from the given Access Token and returns them as PS Object .Parameter AccessToken The Access Token. .Example PS C:\>$token=Get-AADIntReadAccessTokenForAADGraph PS C:\>Parse-AADIntAccessToken -AccessToken $token aud : https://graph.windows.net iss : https://sts.windows.net/f2b2ba53-ed2a-4f4c-a4c3-85c61e548975/ iat : 1589477501 nbf : 1589477501 exp : 1589481401 acr : 1 aio : ASQA2/8PAAAALe232Yyx9l= amr : {pwd} appid : 1b730954-1685-4b74-9bfd-dac224a7b894 appidacr : 0 family_name : company given_name : admin ipaddr : 107.210.220.129 name : admin company oid : 1713a7bf-47ba-4826-a2a7-bbda9fabe948 puid : 100354 rh : 0QfALA. scp : user_impersonation sub : BGwHjKPU tenant_region_scope : NA tid : f2b2ba53-ed2a-4f4c-a4c3-85c61e548975 unique_name : admin@company.onmicrosoft.com upn : admin@company.onmicrosoft.com uti : -EWK6jMDrEiAesWsiAA ver : 1.0 .Example PS C:\>Parse-AADIntAccessToken -AccessToken $token -Validate Read-Accesstoken : Access Token is expired At line:1 char:1 + Read-Accesstoken -AccessToken $at -Validate -verbose + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : NotSpecified: (:) [Write-Error], WriteErrorException + FullyQualifiedErrorId : Microsoft.PowerShell.Commands.WriteErrorException,Read-Accesstoken aud : https://graph.windows.net iss : https://sts.windows.net/f2b2ba53-ed2a-4f4c-a4c3-85c61e548975/ iat : 1589477501 nbf : 1589477501 exp : 1589481401 acr : 1 aio : ASQA2/8PAAAALe232Yyx9l= amr : {pwd} appid : 1b730954-1685-4b74-9bfd-dac224a7b894 appidacr : 0 family_name : company given_name : admin ipaddr : 107.210.220.129 name : admin company oid : 1713a7bf-47ba-4826-a2a7-bbda9fabe948 puid : 100354 rh : 0QfALA. scp : user_impersonation sub : BGwHjKPU tenant_region_scope : NA tid : f2b2ba53-ed2a-4f4c-a4c3-85c61e548975 unique_name : admin@company.onmicrosoft.com upn : admin@company.onmicrosoft.com uti : -EWK6jMDrEiAesWsiAA ver : 1.0 #> [cmdletbinding()] Param( [Parameter(Mandatory=$True,ValueFromPipeline)] [String]$AccessToken, [Parameter()] [Switch]$ShowDate, [Parameter()] [Switch]$Validate ) Process { # Token sections $sections = $AccessToken.Split(".") if($sections.Count -eq 5) { Write-Warning "JWE token, expected JWS. Unable to parse." return } $header = $sections[0] $payload = $sections[1] $signature = $sections[2] # Convert the token to string and json $payloadString = Convert-B64ToText -B64 $payload $payloadObj=$payloadString | ConvertFrom-Json if($ShowDate) { # Show dates $payloadObj.exp=($epoch.Date.AddSeconds($payloadObj.exp)).toString("yyyy-MM-ddTHH:mm:ssZ").Replace(".",":") $payloadObj.iat=($epoch.Date.AddSeconds($payloadObj.iat)).toString("yyyy-MM-ddTHH:mm:ssZ").Replace(".",":") $payloadObj.nbf=($epoch.Date.AddSeconds($payloadObj.nbf)).toString("yyyy-MM-ddTHH:mm:ssZ").Replace(".",":") } if($Validate) { # Check the signature if((Is-AccessTokenValid -AccessToken $AccessToken)) { Write-Verbose "Access Token signature successfully verified" } else { Write-Error "Access Token signature could not be verified" } # Check the timestamp if((Is-AccessTokenExpired -AccessToken $AccessToken)) { Write-Error "Access Token is expired" } else { Write-Verbose "Access Token is not expired" } } # Debug Write-Debug "PARSED ACCESS TOKEN: $($payloadObj | Out-String)" # Return $payloadObj } } # Prompts for credentials and gets the access token # Supports MFA. function Prompt-Credentials { [cmdletbinding()] Param( [Parameter(Mandatory=$False)] [String]$Resource, [Parameter(Mandatory=$False)] [String]$ClientId, [Parameter(Mandatory=$False)] [String]$Tenant, [Parameter(Mandatory=$False)] [bool]$ForceMFA=$false, [Parameter(Mandatory=$False)] [bool]$ForceNGCMFA=$false, [Parameter(Mandatory=$False)] [string]$RefreshTokenCredential, [Parameter(Mandatory=$False)] [System.Management.Automation.PSCredential]$Credentials, [Parameter(Mandatory=$False)] [string]$OTPSecretKey, [Parameter(Mandatory=$False)] [string]$TAP, [Parameter(Mandatory=$False)] [string]$RedirectURI ) Process { # Set AMR values as needed $amr = $null if($ForceMFA) { $amr = "mfa" } elseif($ForceNGCMFA) { $amr = "ngcmfa" } # If we have credentials, try first using ROPC flow $response = $null if($Credentials -and [string]::IsNullOrEmpty($amr) -and [string]::IsNullOrEmpty((Get-CredentialType -UserName $Credentials.UserName).Credentials.FederationRedirectUrl)) { Write-Verbose "Domain not federated, credentials provided, and no MFA enforced. Trying ROPC flow." # Create a body for REST API request $body = @{ "resource"=$Resource "client_id"=$ClientId "grant_type"="password" "username"=$Credentials.UserName "password"=$Credentials.GetNetworkCredential().Password "scope"="openid" } # Debug Write-Debug "AUTHENTICATION BODY: $($body | Out-String)" # Set the content type and call the Microsoft Online authentication API # Headers $headers = @{ "Content-Type" = "application/x-www-form-urlencoded" "User-Agent" = Get-UserAgent } try { $response=Invoke-RestMethod -UseBasicParsing -Uri "https://login.microsoftonline.com/common/oauth2/token" -Method POST -Body $body -Headers $headers } catch { Write-Verbose "ROPC failed, switching to interactive flow: $(($_.ErrorDetails.Message | convertfrom-json).error_description)" } } if($null -eq $response) { # Check the tenant if([string]::IsNullOrEmpty($Tenant)) { $Tenant = "common" } # Get the authorization code $authorizationCode = Get-AuthorizationCode -Resource $Resource -ClientId $ClientId -Tenant $Tenant -AMR $amr -RefreshTokenCredential $RefreshTokenCredential -Credentials $Credentials -OTPSecretKey $OTPSecretKey -TAP $TAP -RedirectURI $RedirectURI if($authorizationCode) { if([string]::IsNullOrEmpty($RedirectURI)) { $RedirectURI = Get-AuthRedirectUrl -ClientId $ClientId -Resource $Resource } # Construct the body for auth code grant $body = @{ client_id = $ClientId grant_type = "authorization_code" code = $authorizationCode redirect_uri = $RedirectURI } # Headers $headers = @{ "Content-Type" = "application/x-www-form-urlencoded" "User-Agent" = Get-UserAgent } $response = Invoke-RestMethod -UseBasicParsing -Uri "https://login.microsoftonline.com/$Tenant/oauth2/token" -Method POST -Body $body -Headers $headers } } # return return $response } } ## GENERAL ADMIN API FUNCTIONS # Gets Office 365 instance names (used when getting ip addresses) function Get-EndpointInstances { <# .SYNOPSIS Get Office 365 endpoint instances .DESCRIPTION Get Office 365 endpoint instances .Example PS C:\>Get-AADIntEndpointInstances instance latest -------- ------ Worldwide 2018100100 USGovDoD 2018100100 USGovGCCHigh 2018100100 China 2018100100 Germany 2018100100 #> [cmdletbinding()] Param() Process { $clientrequestid=(New-Guid).ToString(); Invoke-RestMethod -UseBasicParsing -Uri "https://endpoints.office.com/version?clientrequestid=$clientrequestid" } } # Gets Office 365 ip addresses for specific instance function Get-EndpointIps { <# .SYNOPSIS Get Office 365 endpoint ips and urls .DESCRIPTION Get Office 365 endpoint ips and urls .Parameter Instance The instance which ips and urls are returned. Defaults to WorldWide. .Example PS C:\>Get-AADIntEndpointIps id : 1 serviceArea : Exchange serviceAreaDisplayName : Exchange Online urls : {outlook.office.com, outlook.office365.com} ips : {13.107.6.152/31, 13.107.9.152/31, 13.107.18.10/31, 13.107.19.10/31...} tcpPorts : 80,443 expressRoute : True category : Optimize required : True id : 2 serviceArea : Exchange serviceAreaDisplayName : Exchange Online urls : {smtp.office365.com} ips : {13.107.6.152/31, 13.107.9.152/31, 13.107.18.10/31, 13.107.19.10/31...} tcpPorts : 587 expressRoute : True category : Allow required : True .Example PS C:\>Get-AADIntEndpointIps -Instance Germany id : 1 serviceArea : Exchange serviceAreaDisplayName : Exchange Online urls : {outlook.office.de} ips : {51.4.64.0/23, 51.5.64.0/23} tcpPorts : 80,443 expressRoute : False category : Optimize required : True id : 2 serviceArea : Exchange serviceAreaDisplayName : Exchange Online urls : {r1.res.office365.com} tcpPorts : 80,443 expressRoute : False category : Default required : True #> [cmdletbinding()] Param( [Parameter()] [ValidateSet('Worldwide','USGovDoD','USGovGCCHigh','China','Germany')] [String]$Instance="Worldwide" ) Process { $clientrequestid=(New-Guid).ToString(); Invoke-RestMethod -UseBasicParsing -Uri ("https://endpoints.office.com/endpoints/$Instance"+"?clientrequestid=$clientrequestid") } } # Gets username from authorization header # Apr 4th 2019 function Get-UserNameFromAuthHeader { Param( [Parameter(Mandatory=$True)] [String]$Auth ) Process { $type = $Auth.Split(" ")[0] $data = $Auth.Split(" ")[1] if($type -eq "Basic") { ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($data))).Split(":")[0] } else { (Read-Accesstoken -AccessToken $data).upn } } } # Creates authorization header from Credentials or AccessToken # Apr 4th 2019 function Create-AuthorizationHeader { Param( [Parameter()] [System.Management.Automation.PSCredential]$Credentials, [Parameter()] [String]$AccessToken, [Parameter()] [String]$Resource, [Parameter()] [String]$ClientId ) Process { if($Credentials -ne $null) { $userName = $Credentials.UserName $password = $Credentials.GetNetworkCredential().Password $auth = "Basic $([Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes("$($userName):$($password)")))" } else { # Get from cache if not provided $AccessToken = Get-AccessTokenFromCache -AccessToken $AccessToken -Resource $Resource -ClientId $ClientId $auth = "Bearer $AccessToken" } return $auth } } # Gets Microsoft online services' public keys # May 18th 2020 function Get-APIKeys { [cmdletbinding()] Param( [Parameter()] [String]$KeyId ) Process { $keys=Invoke-RestMethod -UseBasicParsing -Uri "https://login.microsoftonline.com/common/discovery/keys" if($KeyId) { $keys.keys | Where-Object -Property kid -eq $KeyId | Select-Object -ExpandProperty x5c } else { $keys.keys } } } # Gets the AADInt credentials cache # Jun 14th 2020 function Get-Cache { <# .SYNOPSIS Dumps AADInternals credentials cache .DESCRIPTION Dumps AADInternals credentials cache .EXAMPLE Get-AADIntCache | Format-Table Name ClientId Audience Tenant IsExpired HasRefreshToken ---- -------- -------- ------ --------- --------------- admin@company.com 1b730954-1685-4b74-9bfd-dac224a7b894 https://graph.windows.net 82205ae4-4c4e-4db5-890c-cb5e5a98d7a3 False True admin@company.com 1b730954-1685-4b74-9bfd-dac224a7b894 https://management.core.windows.net/ 82205ae4-4c4e-4db5-890c-cb5e5a98d7a3 False True #> [cmdletbinding()] Param() Process { $cacheKeys = $script:tokens.keys # Loop through the cache elements foreach($key in $cacheKeys) { $accessToken=$script:tokens[$key] if([string]::IsNullOrEmpty($accessToken)) { Write-Warning "Access token with key ""$key"" not found!" return } $parsedToken = Read-Accesstoken -AccessToken $accessToken if($parsedToken.xms_mirid) { # Managed identity $name = $parsedToken.xms_mirid.Substring($parsedToken.xms_mirid.LastIndexOf("/")+1) } else { $name = $parsedToken.unique_name } $attributes = [ordered]@{ "Name" = $name "ClientId" = $parsedToken.appid "Audience" = $parsedToken.aud "Tenant" = $parsedToken.tid "IsExpired" = Is-AccessTokenExpired -AccessToken $accessToken "HasRefreshToken" = $script:refresh_tokens.Contains($key) "AuthMethods" = $parsedToken.amr "Device" = $parsedToken.deviceid } New-Object psobject -Property $attributes } } } # Clears the AADInt credentials cache # Jun 14th 2020 function Clear-Cache { <# .SYNOPSIS Clears AADInternals credentials cache .DESCRIPTION Clears AADInternals credentials cache .EXAMPLE Clear-AADIntCache #> [cmdletbinding()] Param() Process { $script:tokens = @{} $script:refresh_tokens = @{} } } # Adds an access and refresh token to cache # Aug 30th 2022 function Add-AccessTokenToCache { <# .SYNOPSIS Adds the given access token to AADInternals credentials cache .DESCRIPTION Adds the given access token to AADInternals credentials cache .PARAMETER AccessToken The access token to add .PARAMETER RefreshToken The refresh token to add .EXAMPLE Add-AADIntAccessTokenToCache -AccessToken "eyJ0eXAiOiJKV..." Name ClientId Audience Tenant IsExpired HasRefreshToken ---- -------- -------- ------ --------- --------------- admin@company.com 1b730954-1685-4b74-9bfd-dac224a7b894 https://graph.windows.net 82205ae4-4c4e-4db5-890c-cb5e5a98d7a3 False False .EXAMPLE Add-AADIntAccessTokenToCache -AccessToken "eyJ0eXAiOiJKV..." -RefreshToken "0.AXkAnZT_xZYmaEueEwVfGe..." Name ClientId Audience Tenant IsExpired HasRefreshToken ---- -------- -------- ------ --------- --------------- admin@company.com 1b730954-1685-4b74-9bfd-dac224a7b894 https://graph.windows.net 82205ae4-4c4e-4db5-890c-cb5e5a98d7a3 False True #> [cmdletbinding()] Param( [Parameter(Mandatory=$True,ValueFromPipeline)] [String]$AccessToken, [Parameter(Mandatory=$False)] [String]$RefreshToken, [Parameter(Mandatory=$False)] [boolean]$ShowCache = $true ) Process { # Parse the token $parsedToken = Read-Accesstoken -AccessToken $accessToken $clientId = $parsedToken.appid $resource = $parsedToken.aud.TrimEnd("/") # Add to cache $Script:tokens["$clientId-$resource"] = $AccessToken if(![string]::IsNullOrEmpty($RefreshToken)) { Add-RefreshTokenToCache -ClientId $clientId -Resource $resource -RefreshToken $RefreshToken } # Dump the cache if($ShowCache) { Get-Cache } } } # Adds refresh token to cache # Apr 25th 2023 function Add-RefreshTokenToCache { [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$RefreshToken, [Parameter(Mandatory=$True)] [String]$ClientId, [Parameter(Mandatory=$True)] [String]$Resource ) Process { # Strip the trailing slash $Resource = $Resource.TrimEnd("/") $Script:refresh_tokens["$ClientId-$Resource"] = $RefreshToken } } # Gets other domains of the given tenant # Jun 15th 2020 function Get-TenantDomains { <# .SYNOPSIS Gets other domains from the tenant of the given domain .DESCRIPTION Uses Exchange Online autodiscover service to retrive other domains from the tenant of the given domain. The given domain SHOULD be Managed, federated domains are not always found for some reason. If nothing is found, try to use <domain>.onmicrosoft.com .Example Get-AADIntTenantDomains -Domain company.com company.com company.fi company.co.uk company.onmicrosoft.com company.mail.onmicrosoft.com #> [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$Domain, [Parameter(Mandatory=$False)] [String]$SubScope ) Process { # Get Tenant Region subscope from Open ID configuration if not provided if([string]::IsNullOrEmpty($SubScope)) { $SubScope = Get-TenantSubscope -Domain $Domain } # Use the correct url switch($SubScope) { "DOD" # DoD { $uri = "https://autodiscover-s-dod.office365.us/autodiscover/autodiscover.svc" } "DODCON" # GCC-High { $uri = "https://autodiscover-s.office365.us/autodiscover/autodiscover.svc" } default # Commercial/GCC { $uri = "https://autodiscover-s.outlook.com/autodiscover/autodiscover.svc" } } # Create the body $body=@" <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:exm="http://schemas.microsoft.com/exchange/services/2006/messages" xmlns:ext="http://schemas.microsoft.com/exchange/services/2006/types" xmlns:a="http://www.w3.org/2005/08/addressing" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <soap:Header> <a:Action soap:mustUnderstand="1">http://schemas.microsoft.com/exchange/2010/Autodiscover/Autodiscover/GetFederationInformation</a:Action> <a:To soap:mustUnderstand="1">$uri</a:To> <a:ReplyTo> <a:Address>http://www.w3.org/2005/08/addressing/anonymous</a:Address> </a:ReplyTo> </soap:Header> <soap:Body> <GetFederationInformationRequestMessage xmlns="http://schemas.microsoft.com/exchange/2010/Autodiscover"> <Request> <Domain>$Domain</Domain> </Request> </GetFederationInformationRequestMessage> </soap:Body> </soap:Envelope> "@ # Create the headers $headers=@{ "Content-Type" = "text/xml; charset=utf-8" "SOAPAction" = '"http://schemas.microsoft.com/exchange/2010/Autodiscover/Autodiscover/GetFederationInformation"' "User-Agent" = Get-UserAgent } # Invoke $response = Invoke-RestMethod -UseBasicParsing -Method Post -uri $uri -Body $body -Headers $headers # Return $domains = $response.Envelope.body.GetFederationInformationResponseMessage.response.Domains.Domain if($Domain -notin $domains) { $domains += $Domain } $domains | Sort-Object } } # Gets the auth_redirect url for the given client and resource # Aug 12th 2021 function Get-AuthRedirectUrl { [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$ClientId, [Parameter(Mandatory=$True)] [String]$Resource ) Begin { $oobClients = @( "d3590ed6-52b3-4102-aeff-aad2292ab01c" # Microsoft Office "29d9ed98-a469-4536-ade2-f981bc1d605e" # Microsoft Authentication Broker ) } Process { # default $redirect_uri = "https://login.microsoftonline.com/common/oauth2/nativeclient" if($ClientId -eq "1fec8e78-bce4-4aaf-ab1b-5451cc387264") # Teams { $redirect_uri = "https://login.microsoftonline.com/common/oauth2/nativeclient" } elseif($ClientId -eq "9bc3ab49-b65d-410a-85ad-de819febfddc") # SPO { $redirect_uri = "https://oauth.spops.microsoft.com/" } elseif($ClientId -eq "c44b4083-3bb0-49c1-b47d-974e53cbdf3c") # Azure admin interface { $redirect_uri = "https://portal.azure.com/signin/index/?feature.prefetchtokens=true&feature.showservicehealthalerts=true&feature.usemsallogin=true" } elseif($ClientId -eq "0000000c-0000-0000-c000-000000000000") # Azure AD Account { $redirect_uri = "https://account.activedirectory.windowsazure.com/" } elseif($ClientId -eq "19db86c3-b2b9-44cc-b339-36da233a3be2") # My sign-ins { $redirect_uri = "https://mysignins.microsoft.com" } elseif($ClientId -eq "29d9ed98-a469-4536-ade2-f981bc1d605e" -and $Resource -ne "https://enrollment.manage.microsoft.com/") # Azure AD Join { $redirect_uri = "ms-aadj-redir://auth/drs" } elseif($ClientId -eq "0c1307d4-29d6-4389-a11c-5cbe7f65d7fa") # Azure Android App { $redirect_uri = "https://azureapp" } elseif($ClientId -eq "33be1cef-03fb-444b-8fd3-08ca1b4d803f") # OneDrive Web { $redirect_uri = "https://admin.onedrive.com/" } elseif($ClientId -eq "ab9b8c07-8f02-4f72-87fa-80105867a763") # OneDrive native client { $redirect_uri = "https://login.windows.net/common/oauth2/nativeclient" } elseif($ClientId -eq "3d5cffa9-04da-4657-8cab-c7f074657cad") # MS Commerce { $redirect_uri = "http://localhost/m365/commerce" } elseif($ClientId -eq "4990cffe-04e8-4e8b-808a-1175604b879f") # MS Partner - this flow doesn't work as expected :( { $redirect_uri = "https://partner.microsoft.com/aad/authPostGateway" } elseif($ClientId -eq "fb78d390-0c51-40cd-8e17-fdbfab77341b" -or # Microsoft Exchange REST API Based Powershell $ClientId -eq "fdd7719f-d61e-4592-b501-793734eb8a0e" -or # SharePoint Migration Tool $ClientId -eq "a0c73c16-a7e3-4564-9a95-2bdf47383716") # EXO PS { $redirect_uri = "https://login.microsoftonline.com/common/oauth2/nativeclient" } elseif($ClientId -eq "3b511579-5e00-46e1-a89e-a6f0870e2f5a") { $redirect_uri = "https://windows365.microsoft.com/signin-oidc" } elseif($ClientId -eq "08e18876-6177-487e-b8b5-cf950c1e598c") # SharePoint Online Web Client Extensibility { $redirect_uri = "https://*-admin.sharepoint.com/_forms/spfxsinglesignon.aspx" } elseif($ClientId -eq "29d9ed98-a469-4536-ade2-f981bc1d605e" -and $Resource -ne "https://enrollment.manage.microsoft.com/") # AADJoin { $auth_redirect="ms-aadj-redir://auth/drs" } elseif($ClientId -eq "dd762716-544d-4aeb-a526-687b73838a22") # WHfB? { $redirect_uri = "ms-appx-web://microsoft.aad.brokerplugin/dd762716-544d-4aeb-a526-687b73838a22" } elseif($ClientId -eq "4765445b-32c6-49b0-83e6-1d93765276ca") # Office Web UI { $redirect_uri = "https://www.office.com/landingv2" } elseif($oobClients -contains $ClientId) { $redirect_uri = "urn:ietf:wg:oauth:2.0:oob" } return $redirect_uri } } # Exports Teams access tokens from the Teams cache # Sep 26th 2022 function Export-TeamsTokens { <# .SYNOPSIS Exports Teams tokens from the provided Cookie database, or from current user's local database. .DESCRIPTION Exports Teams tokens from the provided Cookie database, or from current user's local database. The Teams Cookies database is SQLite database. .PARAMETER CookieDatabase Full name of the Teams cookie database. If not provided, uses current user's database. .PARAMETER AddToCache Adds the tokens to AADInternals token cache .PARAMETER CopyToClipboard Copies the tokens to clipboard as JSON string .EXAMPLE PS\:>Export-AADIntTeamsTokens User: user@company.com Name Value ---- ----- office_access_token eyJ0eXAiOiJKV1QiLCJub25jZSI6InlsUjJWRmp4SWFqeVVqeklZa3R... skypetoken_asm eyJhbGciOiJSUzI1NiIsImtpZCI6IjEwNiIsIng1dCI6Im9QMWFxQnl... authtoken eyJ0eXAiOiJKV1QiLCJub25jZSI6InpsUFY2bnRCUDR5NTFLTkNQR2l... SSOAUTHCOOKIE eyJ0eXAiOiJKV1QiLCJub25jZSI6Ik5sbHJiaFlzYl9rVnU3VzVSa01... .EXAMPLE PS\:>Export-AADIntTeamsTokens -CookieDatabase C:\Cookies User: user@company.com Name Value ---- ----- office_access_token eyJ0eXAiOiJKV1QiLCJub25jZSI6InlsUjJWRmp4SWFqeVVqeklZa3R... skypetoken_asm eyJhbGciOiJSUzI1NiIsImtpZCI6IjEwNiIsIng1dCI6Im9QMWFxQnl... authtoken eyJ0eXAiOiJKV1QiLCJub25jZSI6InpsUFY2bnRCUDR5NTFLTkNQR2l... SSOAUTHCOOKIE eyJ0eXAiOiJKV1QiLCJub25jZSI6Ik5sbHJiaFlzYl9rVnU3VzVSa01... .EXAMPLE PS\:>Export-AADIntTeamsTokens -AddToCache User: user@company.com 3 access tokens added to cache .EXAMPLE PS\:>Export-AADIntTeamsTokens -AddToCache -CopyToClipboard User: user@company.com 3 access tokens added to cache 4 access tokens copied to clipboard .EXAMPLE PS\:>Export-AADIntTeamsTokens -CopyToClipboard User: user@company.com 4 access tokens copied to clipboard #> [cmdletbinding()] Param( [switch]$AddToCache, [switch]$CopyToClipboard, [String]$CookieDatabase ) Begin { } Process { # Set the path if database was not provided, depends on the OS we are running. if([string]::IsNullOrEmpty($CookieDatabase)) { switch([system.environment]::OSversion.Platform) { ("Linux") { $CookieDatabase="~/.config/Microsoft/Microsoft Teams/Cookies" break } ("Unix") { $CookieDatabase="~/Library/Application Support/Microsoft/Teams/Cookies" break } default # Defaults to Windows { $CookieDatabase="$env:APPDATA\Microsoft\Teams\Cookies" break } } } # Test whether the cookie database exists if(-not (Test-Path $CookieDatabase)) { Throw "The Cookie database does not exist: $CookieDatabase" } try { # Parse the database Write-Verbose "Loading and parsing database $CookieDataBase" $parsedDb = Parse-SQLiteDatabase -Data (Get-BinaryContent -Path $CookieDatabase) Write-Verbose "Looking for tokens" $access_tokens = [ordered]@{} foreach($page in $parsedDb.Pages) { # Cookies data is stored on Table Leaf if($page.PageType -eq "Table Leaf" -and $page.CellsOnPage -gt 0) { # Which has exactly 19 columns (the last is empty) if($page.Cells[0].Payload.Count -ge 19) { Write-Verbose "Found Table Leaf page with $($page.CellsOnPage) cells" <# Columns - updated Oct 20th 2022 0: creation_utc 1: top_frame_site_key 2: host_key 3: name 4: value 5: encrypted_value 6: path 7: expires_utc 8: is_secure 9: is_httponly 10: last_access_utc 12: has_expires 13: is_persistent 14: priority 15: encrypted_value 16: samesite 17: source_scheme 18: source_port 19: is_same_party #> foreach($cell in $page.Cells) { $name = $cell.Payload[3] $value = $cell.Payload[4] if($name -like "*token*" -or $name -eq "SSOAUTHCOOKIE") { # Strip the Bearer= and query parameters from the "authToken" if($name -eq "authToken") { $value = [System.Net.WebUtility]::UrlDecode($value).Split("=")[1].Split("&")[0] $userName = (Read-AccessToken -AccessToken $value).upn } # Add access tokens to cache as needed if($AddToCache -and $name -ne "skypetoken_asm") { Add-AccessTokenToCache -AccessToken $value | Out-Null $cached += 1 } $access_tokens[$name] = $value } } } } } # Print out the username Write-Host "User: $userName" # Print count cached tokens if($AddToCache) { Write-Host "$cached access tokens added to cache" } # Copy tokens to clipboard and print the count if($CopyToClipboard) { $access_tokens | ConvertTo-Json | Set-Clipboard Write-Host "$($access_tokens.Count) access tokens copied to clipboard" } # Return if(-not $AddToCache -and -not $CopyToClipboard) { return $access_tokens } } catch { Throw $_ } } } # Exports Azure CLI access tokens from the msal_token_cache.bin cache # Sep 29th 2022 function Export-AzureCliTokens { <# .SYNOPSIS Exports Azure CLI access tokens from the msal_token_cache.bin cache. .DESCRIPTION Exports Azure CLI access tokens from the msal_token_cache.bin cache. msal_token_cache.bin is a json file protected with DPAPI in LocalUser context. .PARAMETER MSALCache Full name of the MSAL token cache. If not provided, uses msal_token_cache.bin from current user's profile under .Azure .PARAMETER AddToCache Adds the tokens to AADInternals token cache .PARAMETER CopyToClipboard Copies the tokens to clipboard as JSON string .EXAMPLE PS\:>Export-AADIntAzureCliTokens Users: user@company.com,user2@company.com UserName access_token -------- ------------ user@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... user@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... user2@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... user2@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... .EXAMPLE PS\:>Export-AADIntAzureCliTokens -MSALCache "C:\Users\user\.Azure\msal_token_cache.bin.old" Users: user@company.com,user2@company.com UserName access_token -------- ------------ user@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... user@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... user2@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... user2@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... .EXAMPLE PS\:>Export-AADIntAzureCliTokens -AddToCache Users: user@company.com,user2@company.com 4 access tokens added to cache .EXAMPLE PS\:>Export-AADIntAzureCliTokens -AddToCache -CopyToClipboard Users: user@company.com,user2@company.com 4 access tokens added to cache 4 access tokens copied to clipboard .EXAMPLE PS\:>Export-AADIntAzureCliTokens -CopyToClipboard Users: user@company.com,user2@company.com 4 access tokens copied to clipboard #> [cmdletbinding()] Param( [switch]$AddToCache, [switch]$CopyToClipboard, [switch]$DPAPI, [String]$MSALCache ) Begin { # Load system.security assembly Add-Type -AssemblyName System.Security } Process { # Parses the object definition string # Sep 29th 2022 function Parse-ObjectDefinition { Param( [Parameter(Mandatory=$True)] [String]$Definition ) Process { # Get the array $Definition = $Definition.Substring($Definition.IndexOf("@")) # Get the string between @{ and } $Definition = $Definition.Substring(2,$Definition.Length-3) $attributes = [ordered]@{} if(-not [string]::IsNullOrEmpty($Definition)) { # Split to array of name=value pairs $properties = $Definition.Split("; ") # Loop through the properties foreach($property in $properties) { # Split & add to attributes $parts = $property.Split("=") if(-not [string]::IsNullOrEmpty($parts[0])) { $attributes[$parts[0]] = $parts[1] } } } return New-Object -TypeName psobject -Property $attributes } } # Set the path if database was not provided, depends on the OS we are running. if([string]::IsNullOrEmpty($MSALCache)) { switch([system.environment]::OSversion.Platform) { ("Linux") { $MSALCache="~/.azure/msal_token_cache.json" break } ("Unix") { $MSALCache="~/.azure/msal_token_cache.json" break } default # Defaults to Windows { $MSALCache="$env:HOMEDRIVE$env:HOMEPATH\.Azure\msal_token_cache.bin" $DPAPI = $true break } } } # Test whether the MSAL cache exists if(-not (Test-Path $MSALCache)) { Throw "The MSAL token cache does not exist: $MSALCache" } try { Write-Verbose "Loading and parsing cache $MSALCache" # Unprotect the token cache if($DPAPI) { $decTokens = Get-BinaryContent $MSALCache $tokens = [text.encoding]::UTF8.GetString([Security.Cryptography.ProtectedData]::Unprotect($decTokens,$null,'CurrentUser')) } else { $tokens = Get-Content $MSALCache -Encoding UTF8 } $objTokens = $tokens | ConvertFrom-Json $users = [ordered]@{} foreach($account in ($objtokens.Account | Get-Member -MemberType NoteProperty)) { # Need to parse the definition manually :( $properties = Parse-ObjectDefinition -Definition $account.Definition $users[$properties.home_account_id] = $properties.username } Write-Verbose "Found tokens for $($users.Count) users" Write-Verbose "Looking for tokens" $access_tokens = @() foreach($access_token in ($objtokens.AccessToken | Get-Member -MemberType NoteProperty)) { Write-Verbose "Parsing access token $($access_token.name)" # Need to parse the definition manually :( $at_properties = Parse-ObjectDefinition -Definition $access_token.Definition # Get the refresh token and parse properties if found $rt_properties = $null $tenantId = $at_properties.home_account_id.Split(".")[1] $rt_name = $access_token.name.Replace("accesstoken","refreshtoken").Replace("-organizations-","--").Replace("-$tenantId-","--") $refresh_token = $objtokens.RefreshToken | Get-Member -Name $rt_name if($refresh_token) { Write-Verbose "Parsing refresh token $rt_name" $rt_properties = Parse-ObjectDefinition -Definition $refresh_token.Definition } # Form the return object $attributes = [ordered]@{ "UserName" = $users[$at_properties.home_account_id] "access_token" = $at_properties.secret "refresh_token" = $rt_properties.secret } if($AddToCache) { Add-AccessTokenToCache -AccessToken $at_properties.secret -RefreshToken $rt_properties.secret | Out-Null } $access_tokens += New-Object psobject -Property $attributes } # Print out the usernames Write-Host "Users: $($users.Values -Join ",")" # Print count cached tokens if($AddToCache) { Write-Host "$($access_tokens.Count) access tokens added to cache." Write-Host "Note: AADInternals only stores tokens for one user! The token of last added user is used." } # Copy tokens to clipboard and print the count if($CopyToClipboard) { $access_tokens | ConvertTo-Json | Set-Clipboard Write-Host "$($access_tokens.Count) access tokens copied to clipboard" } # Return if(-not $AddToCache -and -not $CopyToClipboard) { return $access_tokens } } catch { Throw $_ } } } # Exports access tokens from the Token Broker cache # Oct 20th 2022 function Export-TokenBrokerTokens { <# .SYNOPSIS Exports access tokens from the Token Broker cache. .DESCRIPTION Exports access tokens from the Token Broker cache. .PARAMETER AddToCache Adds the tokens to AADInternals token cache .PARAMETER CopyToClipboard Copies the tokens to clipboard as JSON string .EXAMPLE PS\:>Export-AADIntTokenBrokerTokens Users: user@company.com,user2@company.com UserName access_token -------- ------------ user@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... user@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... user2@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... user2@company.com eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6IjJaUXBKM1VwYmpBWVhZR2FYRUpsOGx... .EXAMPLE PS\:>Export-AADIntTokenBrokerTokens -AddToCache Users: user@company.com,user2@company.com 4 access tokens added to cache .EXAMPLE PS\:>Export-AADIntTokenBrokerTokens -AddToCache -CopyToClipboard Users: user@company.com,user2@company.com 4 access tokens added to cache 4 access tokens copied to clipboard .EXAMPLE PS\:>Export-AADIntTokenBrokerTokens -CopyToClipboard Users: user@company.com,user2@company.com 4 access tokens copied to clipboard #> [cmdletbinding()] Param( [switch]$AddToCache, [switch]$CopyToClipboard ) Begin { # Load system.security assembly Add-Type -AssemblyName System.Security } Process { # Test whether the Token Broker cache exists $TBRES = "$env:LOCALAPPDATA\Microsoft\TokenBroker\Cache\*.tbres" if(-not (Test-Path $TBRES)) { Throw "The Token Broker cache does not exist: $TBRES" } $access_tokens = @() $users = [ordered]@{} # Get the cache files $files = Get-Item -Path $TBRES foreach($file in $files) { try { Write-Verbose "Parsing $file" $data = Get-BinaryContent -Path $file.FullName $content = Parse-TBRES -Data $data if($content.WTRes_Token -ne $null -and $content.WTRes_Token -ne "No Token") { $parsedToken = Read-AccessToken -AccessToken $content.WTRes_Token # Could be JWE which can't be parsed if($parsedToken) { $users[$parsedToken.oid] = $parsedToken.unique_name # Form the return object $attributes = [ordered]@{ "UserName" = $parsedToken.unique_name "access_token" = $content.WTRes_Token } if($AddToCache) { Add-AccessTokenToCache -AccessToken $content.WTRes_Token | Out-Null } $access_tokens += [PSCustomObject] $attributes } } } catch { Write-Verbose "Got exception: $_" } } Write-Verbose "Found tokens for $($users.Count) users" # Print out the usernames if($users.Count -gt 0) { Write-Host "Users: $($users.Values -Join ",")" } else { Write-Host "No tokens found." } # Print count cached tokens if($AddToCache) { Write-Host "$($access_tokens.Count) access tokens added to cache." Write-Host "Note: AADInternals only stores tokens for one user! The token of last added user is used." } # Copy tokens to clipboard and print the count if($CopyToClipboard) { $access_tokens | ConvertTo-Json | Set-Clipboard Write-Host "$($access_tokens.Count) access tokens copied to clipboard" } # Return if(-not $AddToCache -and -not $CopyToClipboard) { return $access_tokens } } } # Gets RST token # Mar 3rd 2023 function Get-RSTToken { [cmdletbinding()] Param( [Parameter(ParameterSetName='Credentials',Mandatory=$True)] [System.Management.Automation.PSCredential]$Credentials, [Parameter(ParameterSetName='UserNameAndPassword',Mandatory=$True)] [String]$UserName, [Parameter(ParameterSetName='UserNameAndPassword',Mandatory=$False)] [String]$Password, [Parameter(Mandatory=$True)] [String]$EndpointAddress, [Parameter(Mandatory=$True)] [String]$Url ) Process { If([String]::IsNullOrEmpty($UserName)) { $UserName = $Credentials.UserName $Password = $Credentials.GetNetworkCredential().password } $requestId = (New-Guid).ToString() $now = Get-Date $created = $now.toUniversalTime().toString("o") $expires = $now.addMinutes(10).toUniversalTime().toString("o") $body=@" <?xml version='1.0' encoding='UTF-8'?> <s:Envelope xmlns:s='http://www.w3.org/2003/05/soap-envelope' xmlns:wsse='http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd' xmlns:saml='urn:oasis:names:tc:SAML:1.0:assertion' xmlns:wsp='http://schemas.xmlsoap.org/ws/2004/09/policy' xmlns:wsu='http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd' xmlns:wsa='http://www.w3.org/2005/08/addressing' xmlns:wssc='http://schemas.xmlsoap.org/ws/2005/02/sc' xmlns:wst='http://schemas.xmlsoap.org/ws/2005/02/trust' xmlns:ic='http://schemas.xmlsoap.org/ws/2005/05/identity'> <s:Header> <wsa:Action s:mustUnderstand='1'>http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue</wsa:Action> <wsa:To s:mustUnderstand='1'>$url</wsa:To> <wsa:MessageID>urn:uuid:$((New-Guid).ToString())</wsa:MessageID> <wsse:Security s:mustUnderstand="1"> <wsu:Timestamp wsu:Id="_0"> <wsu:Created>$created</wsu:Created> <wsu:Expires>$expires</wsu:Expires> </wsu:Timestamp> <wsse:UsernameToken wsu:Id="uuid-$((New-Guid).toString())"> <wsse:Username>$UserName</wsse:Username> <wsse:Password>$Password</wsse:Password> </wsse:UsernameToken> </wsse:Security> </s:Header> <s:Body> <wst:RequestSecurityToken Id='RST0'> <wst:RequestType>http://schemas.xmlsoap.org/ws/2005/02/trust/Issue</wst:RequestType> <wsp:AppliesTo> <wsa:EndpointReference> <wsa:Address>$EndpointAddress</wsa:Address> </wsa:EndpointReference> </wsp:AppliesTo> <wst:KeyType>http://schemas.xmlsoap.org/ws/2005/05/identity/NoProofKey</wst:KeyType> </wst:RequestSecurityToken> </s:Body> </s:Envelope> "@ try { $response = Invoke-RestMethod -UseBasicParsing -Uri $url -Method Post -Body $body -ErrorAction SilentlyContinue $tokenResponse = $response.Envelope.Body.RequestSecurityTokenResponse if($tokenResponse) { switch($tokenResponse.TokenType) { # DesktopSSOToken when EndpointAddress is: # urn:federation:MicrosoftOnline ("urn:oasis:names:tc:SAML:1.0:assertion") { $token = $tokenResponse.RequestedSecurityToken.Assertion.DesktopSsoToken break } # Passport Compact when EndpointAddress is one of: # officeapps.live.com # sharepoint.com ("urn:passport:compact") { $token = $tokenResponse.RequestedSecurityToken.BinarySecurityToken.'#text' break } # Passport Legacy when EndpointAddress is: # http://Passport.NET/tb ("urn:passport:legacy") { # TODO: Try to figure out how this is encrypted $cipherData = $tokenResponse.RequestedSecurityToken.EncryptedData.CipherData.CipherData $keyName = $tokenResponse.RequestedSecurityToken.EncryptedData.KeyInfo.KeyName $encAlg = $tokenResponse.RequestedSecurityToken.EncryptedData.EncryptionMethod.Algorithm Write-Warning "Unable to decrypt legacy passport token, returning encrypted token" $token = $cipherData break } } return $token } else { $errorDetails = $response.Envelope.Body.Fault.Detail.error.internalerror.text } } catch { $stream = $_.Exception.Response.GetResponseStream() $responseBytes = New-Object byte[] $stream.Length $stream.Position = 0 $stream.Read($responseBytes,0,$stream.Length) | Out-Null $responseXml = [xml][text.encoding]::UTF8.GetString($responseBytes) $errorDetails = $responseXml.Envelope.Body.Fault.Detail.error.internalerror.text } throw $errorDetails } } # Checks whether the client is a FOCI clientid # Apr 25th 2023 function IsFOCI { [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [guid]$ClientId, [Parameter(Mandatory=$False)] [int]$FOCI = -1 ) Process { # If FOCI = 1 this is 100% a FOCI client # Is this a known FOCI client? $isFOCI = $Script:FOCIs.ContainsKey($ClientId.ToString()) Write-Verbose "FOCI: Known FOCI $isFOCI, FOCI indicator $FOCI" # Is this a new or deprecated FOCI client? if($isFOCI -and $FOCI -eq 0) { # Found in FOCI list, but no FOCI indicator present Write-Warning "Found deprecated FOCI client $ClientId. Please report at https://github.com/secureworks/family-of-client-ids-research" $isFOCI = $False } elseif ($FOCI -eq 1 -and -not $isFOCI) { # Not found on FOCI list, but FOCI indicator present Write-Warning "Found a new FOCI client $ClientId. Please report at https://github.com/secureworks/family-of-client-ids-research" $Script:FOCIs[$ClientId] = "UNKNOWN" $isFOCI = $True } return $isFOCI } } # Lists FOCI clients # Apr 26th 2023 function Get-FOCIClientIDs { <# .SYNOPSIS Dumps the list of known FOCI client ids .DESCRIPTION Dumps the list of Family of known Client IDs (FOCI) client ids .Parameter Online Get's list online from https://raw.githubusercontent.com/secureworks/family-of-client-ids-research/main/known-foci-clients.csv .Example PS C:\>Get-AADIntFOCIClientIDs client_id application_name --------- ---------------- 00b41c95-dab0-4487-9791-b9d2c32c80f2 Office 365 Management 04b07795-8ddb-461a-bbee-02f9e1bf7b46 Microsoft Azure CLI 1950a258-227b-4e31-a9cf-717495945fc2 Microsoft Azure PowerShell 1fec8e78-bce4-4aaf-ab1b-5451cc387264 Microsoft Teams 26a7ee05-5602-4d76-a7ba-eae8b7b67941 Windows Search 27922004-5251-4030-b22d-91ecd9a37ea4 Outlook Mobile 4813382a-8fa7-425e-ab75-3b753aab3abb Microsoft Authenticator App ab9b8c07-8f02-4f72-87fa-80105867a763 OneDrive SyncEngine d3590ed6-52b3-4102-aeff-aad2292ab01c Microsoft Office 872cd9fa-d31f-45e0-9eab-6e460a02d1f1 Visual Studio af124e86-4e96-495a-b70a-90f90ab96707 OneDrive iOS App 2d7f3606-b07d-41d1-b9d2-0d0c9296a6e8 Microsoft Bing Search for Microsoft Edge 844cca35-0656-46ce-b636-13f48b0eecbd Microsoft Stream Mobile Native 87749df4-7ccf-48f8-aa87-704bad0e0e16 Microsoft Teams - Device Admin Agent cf36b471-5b44-428c-9ce7-313bf84528de Microsoft Bing Search 0ec893e0-5785-4de6-99da-4ed124e5296c Office UWP PWA 22098786-6e16-43cc-a27d-191a01a1e3b5 Microsoft To-Do client 4e291c71-d680-4d0e-9640-0a3358e31177 PowerApps 57336123-6e14-4acc-8dcf-287b6088aa28 Microsoft Whiteboard Client 57fcbcfa-7cee-4eb1-8b25-12d2030b4ee0 Microsoft Flow 66375f6b-983f-4c2c-9701-d680650f588f Microsoft Planner 9ba1a5c7-f17a-4de9-a1f1-6178c8d51223 Microsoft Intune Company Portal a40d7d7d-59aa-447e-a655-679a4107e548 Accounts Control UI a569458c-7f2b-45cb-bab9-b7dee514d112 Yammer iPhone b26aadf8-566f-4478-926f-589f601d9c74 OneDrive c0d2a505-13b8-4ae0-aa9e-cddd5eab0b12 Microsoft Power BI d326c1ce-6cc6-4de2-bebc-4591e5e13ef0 SharePoint e9c51622-460d-4d3d-952d-966a5b1da34c Microsoft Edge eb539595-3fe1-474e-9c1d-feb3625d1be5 Microsoft Tunnel ecd6b820-32c2-49b6-98a6-444530e5a77a Microsoft Edge f05ff7c9-f75a-4acd-a3b5-f4b6a870245d SharePoint Android f44b1140-bc5e-48c6-8dc0-5cf5a53c0e34 Microsoft Edge .Example PS C:\>Get-AADIntFOCIClientIDs -Online client_id application_name --------- ---------------- 00b41c95-dab0-4487-9791-b9d2c32c80f2 Office 365 Management 04b07795-8ddb-461a-bbee-02f9e1bf7b46 Microsoft Azure CLI 1950a258-227b-4e31-a9cf-717495945fc2 Microsoft Azure PowerShell 1fec8e78-bce4-4aaf-ab1b-5451cc387264 Microsoft Teams 26a7ee05-5602-4d76-a7ba-eae8b7b67941 Windows Search 27922004-5251-4030-b22d-91ecd9a37ea4 Outlook Mobile 4813382a-8fa7-425e-ab75-3b753aab3abb Microsoft Authenticator App ab9b8c07-8f02-4f72-87fa-80105867a763 OneDrive SyncEngine d3590ed6-52b3-4102-aeff-aad2292ab01c Microsoft Office 872cd9fa-d31f-45e0-9eab-6e460a02d1f1 Visual Studio af124e86-4e96-495a-b70a-90f90ab96707 OneDrive iOS App 2d7f3606-b07d-41d1-b9d2-0d0c9296a6e8 Microsoft Bing Search for Microsoft Edge 844cca35-0656-46ce-b636-13f48b0eecbd Microsoft Stream Mobile Native 87749df4-7ccf-48f8-aa87-704bad0e0e16 Microsoft Teams - Device Admin Agent cf36b471-5b44-428c-9ce7-313bf84528de Microsoft Bing Search 0ec893e0-5785-4de6-99da-4ed124e5296c Office UWP PWA 22098786-6e16-43cc-a27d-191a01a1e3b5 Microsoft To-Do client 4e291c71-d680-4d0e-9640-0a3358e31177 PowerApps 57336123-6e14-4acc-8dcf-287b6088aa28 Microsoft Whiteboard Client 57fcbcfa-7cee-4eb1-8b25-12d2030b4ee0 Microsoft Flow 66375f6b-983f-4c2c-9701-d680650f588f Microsoft Planner 9ba1a5c7-f17a-4de9-a1f1-6178c8d51223 Microsoft Intune Company Portal a40d7d7d-59aa-447e-a655-679a4107e548 Accounts Control UI a569458c-7f2b-45cb-bab9-b7dee514d112 Yammer iPhone b26aadf8-566f-4478-926f-589f601d9c74 OneDrive c0d2a505-13b8-4ae0-aa9e-cddd5eab0b12 Microsoft Power BI d326c1ce-6cc6-4de2-bebc-4591e5e13ef0 SharePoint e9c51622-460d-4d3d-952d-966a5b1da34c Microsoft Edge eb539595-3fe1-474e-9c1d-feb3625d1be5 Microsoft Tunnel ecd6b820-32c2-49b6-98a6-444530e5a77a Microsoft Edge f05ff7c9-f75a-4acd-a3b5-f4b6a870245d SharePoint Android f44b1140-bc5e-48c6-8dc0-5cf5a53c0e34 Microsoft Edge #> [cmdletbinding()] Param( [Parameter(Mandatory=$False)] [switch]$Online ) Process { if($Online) { try { $FOCIClients = Invoke-RestMethod -UseBasicParsing -Uri "https://raw.githubusercontent.com/secureworks/family-of-client-ids-research/main/known-foci-clients.csv" ConvertFrom-Csv -Delimiter "," -InputObject $FOCIClients } catch { Throw "Unable to get FOCI clients from https://raw.githubusercontent.com/secureworks/family-of-client-ids-research/main/known-foci-clients.csv" } } else { foreach($key in $Script:FOCIs.Keys) { [PSCustomObject]@{ "client_id" = $key "application_name" = $Script:FOCIs[$key] } } } } } # Parses config from login.microsoftonline.com sites # May 28th 2023 function Parse-LoginMicrosoftOnlineComConfig { [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$Body ) Process { # Try to get the $Config= $c = Get-StringBetween -String $body -Start '$Config=' -End "//]]>" try { # Trim null, carriage return, newline, and ; $c = $c.TrimEnd(@(0x00,0x0a,0x0d,0x3B)) $j = $c | ConvertFrom-Json -ErrorAction SilentlyContinue # Some verbose if($j.serverDetails) { $s = $j.serverDetails Write-Verbose "SERVER: $($s.dc) $($s.ri) $($s.ver.v -join ".")" } if($j.correlationId) { Write-Verbose "Correlation ID: $($j.correlationId)" } if($j.sessionId) { Write-Verbose "Session ID: $($j.sessionId)" } } catch {} return $j } } # Gets authorization code in interactive mode - Supports MFA # May 28th 2023 # OAuth 2.0 Auth code grant flow function Get-AuthorizationCode { [cmdletbinding()] Param( # Use these default values to get the code as some tenants may have blocked others with Conditional Access. # You can then use the refresh_token to get access_token for correct resource and clientid. [Parameter(Mandatory=$False)] [String]$Resource = "https://graph.windows.net", [Parameter(Mandatory=$True)] [String]$ClientId = "1b730954-1685-4b74-9bfd-dac224a7b894", [Parameter(Mandatory=$False)] [String]$Tenant, [Parameter(Mandatory=$False)] [string]$AMR, [Parameter(Mandatory=$False)] [string]$RefreshTokenCredential, [Parameter(Mandatory=$False)] [System.Management.Automation.PSCredential]$Credentials, [Parameter(Mandatory=$False)] [System.Security.Cryptography.X509Certificates.X509Certificate2]$Certificate, [Parameter(Mandatory=$False)] [string]$PfxFileName, [Parameter(Mandatory=$False)] [string]$PfxPassword, [Parameter(Mandatory=$False)] [string]$OTPSecretKey, [Parameter(Mandatory=$False)] [string]$TAP, [Parameter(Mandatory=$False)] [string]$RedirectURI ) Begin { # Function for processing ADFS authentication function Process-ADFSLogin { [cmdletbinding()] Param( [Parameter(Mandatory=$False)] [System.Management.Automation.PSCredential]$Credentials, [Parameter(Mandatory=$False)] [String]$UserName, [Parameter(Mandatory=$False)] [Microsoft.PowerShell.Commands.WebRequestSession]$webSession, [Parameter(Mandatory=$True)] [String]$FederationRedirectUrl ) Process { # If authentication type is Federated, we must first authenticate against the identity provider # to fetch SAML token and then get access token from Microsoft Online if($Credentials) { $UserName = $Credentials.UserName } # Only ADFS is supported if(!$FederationRedirectUrl.Contains("/adfs/")) { Throw "Only ADFS federation is supported." } # Loop until we get a correct password or get CTRL+C $passwordOk = $false while(-not $passwordOk) { # Set credentials if($Credentials) { $password = $Credentials.GetNetworkCredential().Password # Set Credentials to $null to avoid authentication loop $Credentials = $null } # Prompt for password else { $password = Read-HostPassword -Prompt "Password" } if($password -eq $null) { return $null } # Set the parameters $body = @{ "UserName" = $UserName "Kmsi" = "" "AuthMethod" = "FormsAuthentication" "Password" = $password } try { # Authenticate $response = Invoke-WebRequest2 -Uri $FederationRedirectUrl -Method POST -Body $body -Headers $Headers -WebSession $webSession [xml]$xmlResponse = $response.content # Extract WS-Fed parameters $body=@{} foreach($input in $xmlResponse.html.body.form.input) { $body[$input.name] = $input.value } $url = "https://login.microsoftonline.com/login.srf" return Invoke-WebRequest2 -Uri $url -WebSession $webSession -Method Post -MaximumRedirection 0 -ErrorAction SilentlyContinue -Body $body -Headers @{"User-Agent"="Mozilla/5.0 (Windows NT 10.0; Win64; x64)"} } catch { $_ # Failed, probably just wrong password } } } } # Function for processing password & TAP function Process-Login { [cmdletbinding()] Param( [Parameter(Mandatory=$False)] [System.Management.Automation.PSCredential]$Credentials, [Parameter(Mandatory=$False)] [boolean]$isTAP = $false, [Parameter(Mandatory=$True)] [PSObject]$Config, [Parameter(Mandatory=$False)] [string]$TAP ) Process { # Loop until we get a correct password/TAP or get CTRL+C while(-not $passwordOk) { # Use the provided TAP if($isTAP -and -not [string]::IsNullOrEmpty($TAP)) { $password = $TAP } # Use the provided credentials elseif($Credentials) { $password = $Credentials.GetNetworkCredential().Password } # Prompt for password/TAP else { $pwdPrompt = "Password" if($isTAP) { $pwdPrompt = "Temporary Access Pass" } $password = Read-HostPassword -Prompt $pwdPrompt } # Send the password/TAP if($config.urlPost.startsWith("/")) { $url = "https://login.microsoftonline.com$($config.urlPost)" } else { $url = $config.urlPost } # Create the body $body = @{ "login" = $userName "passwd" = $password "ctx" = $config.sCtx "flowToken" = $config.sFT "canary" = $config.canary "client_id" = $ClientId } if($isTAP) { $body.Remove("passwd") $body["accesspass"] = $password } $response = Invoke-WebRequest2 -Uri $url -WebSession $LoginSession -Method Post -MaximumRedirection 0 -Headers $Headers -Body $body -ErrorAction SilentlyContinue $config = Parse-LoginMicrosoftOnlineComConfig -Body $response.Content # Expired password if($config.pgid -eq "ConvergedChangePassword") { Write-Verbose "ConvergedChangePassword" $newPasswordOk = $false while($newPasswordOk -eq $false) { # Prompt for the password Write-Host "You need to update your password because this is the first time you are signing in, or because your password has expired." $newPassword = Read-HostPassword -Prompt "New password" if([string]::IsNullOrEmpty($newPassword)) { return $null } # SSPR BEGIN $body = @{ "Ctx" = $config.sCtx "FlowToken" = $config.sFT "OldPassword" = $password "NewPassword" = $newPassword } $url = "https://login.microsoftonline.com$($config.urlAsyncSsprBegin)" $ssprResponse = Invoke-RestMethod -UseBasicParsing -Uri $url -WebSession $LoginSession -Method Post -MaximumRedirection 0 -ErrorAction SilentlyContinue -Headers $Headers -Body ($body | ConvertTo-Json) -ContentType "application/json; charset=UTF-8" # SSPR POLL while($ssprResponse.IsJobPending) { $body = @{ "Ctx" = $ssprResponse.Ctx "FlowToken" = $ssprResponse.FlowToken "CoupledDataCenter" = $ssprResponse.CoupledDataCenter "CoupledScaleUnit" = $ssprResponse.CoupledScaleUnit } $url = "https://login.microsoftonline.com$($config.urlAsyncSsprPoll)" $ssprResponse = Invoke-RestMethod -UseBasicParsing -Uri $url -WebSession $LoginSession -Method Post -MaximumRedirection 0 -ErrorAction SilentlyContinue -Headers $Headers -Body ($body | ConvertTo-Json) -ContentType "application/json; charset=UTF-8" } # Complexity requirements.. if($ssprResponse.ErrorMessage) { Write-Host $ssprResponse.ErrorMessage -ForegroundColor Red } else { $newPasswordOk = $true } } # SSPR END $body = @{ "ctx" = $ssprResponse.Ctx "flowToken" = $ssprResponse.FlowToken "currentpasswd" = $password "confirmnewpasswd" = $newPassword "canary" = $config.canary } $url = "https://login.microsoftonline.com$($config.urlPost)" $response = Invoke-WebRequest2 -Uri $url -WebSession $LoginSession -Method Post -MaximumRedirection 0 -Headers $Headers -Body $body -ContentType "application/x-www-form-urlencoded" -ErrorAction SilentlyContinue $config = Parse-LoginMicrosoftOnlineComConfig -Body $response.Content } # MFA action required if($config.pgid -eq "ConvergedProofUpRedirect") { Write-Verbose "ConvergedProofUpRedirect" $MFADays = $config.iRemainingDaysToSkipMfaRegistration if($MFADays) { Write-Warning "MFA must be set up in $($MFA) days" # Create the body $body = @{ "LoginOptions" = 1 "ctx" = $config.sCtx "flowToken" = $config.sFT "canary" = $config.canary } $url = $config.urlSkipMfaRegistration $response = Invoke-WebRequest2 -Uri $url -WebSession $LoginSession -MaximumRedirection 0 -Headers $Headers -ErrorAction SilentlyContinue } else { throw "MFA method must be registered." } } # Keep me signed in prompt elseif($config.pgid -eq "KmsiInterrupt") { Write-Verbose "KMSI" # Create the body $body = @{ "LoginOptions" = 1 "ctx" = $config.sCtx "flowToken" = $config.sFT "canary" = $config.canary } $url = "https://login.microsoftonline.com$($config.urlPost)" $response = Invoke-WebRequest2 -Uri $url -WebSession $LoginSession -Method Post -MaximumRedirection 0 -Headers $Headers -Body $body -ContentType "application/x-www-form-urlencoded" -ErrorAction SilentlyContinue } # Some weird redirect issue with non-edge Chrome browsers elseif($config.oPostParams) { Throw "Chrome redirect issue. Try using Edge or non-chrome User-Agent." } # Check the response code switch($response.StatusCode) { # We got an error or MFA prompt 200 { $config = Parse-LoginMicrosoftOnlineComConfig -Body $response.Content # Something severe if($config.strServiceExceptionMessage) { # Wrong redirect URI if($config.strServiceExceptionMessage.StartsWith("AADSTS50011")) { Write-Verbose "Invalid redirect URI, trying to get correct one" $newRedirectURI="" try { $url = "https://login.microsoftonline.com/common/oauth2/authorize?client_id=$ClientID&response_type=code" $response = Invoke-WebRequest2 -Uri $url -WebSession $LoginSession -Method Get -MaximumRedirection 0 -Headers $Headers -ErrorAction SilentlyContinue # Parse from the Location header if($response.StatusCode -eq 302) { $newRedirectURI = $response.Headers.Location.Substring(0,$response.Headers.Location.IndexOf("?")) Write-Verbose "Redirect URI: $newRedirectURI" Write-Warning "Wrong RedirectURI $RedirectURI for client $ClientID." Write-Warning "Try again with switch -RedirectURI $newRedirectURI" } else { Write-Error $config.strServiceExceptionMessage } return $null } catch { throw $config.strServiceExceptionMessage } } else { throw $config.strServiceExceptionMessage } } # Wrong password etc elseif($config.sErrorCode -ne $null) { # When using TAP for MFA, the correct error code is not returned if($config.sErrorCode -eq "InvalidAccessPass") { $AADError = "130503: Your Temporary Access Pass is incorrect. If you don't know your pass, contact your administrator." } # Get error text from Azure AD else { $AADError = Get-Error -ErrorCode $config.sErrorCode } # We don't want to loop with provided password/TAP so throw the error if(($Credentials) -or ($isTAP -and (-not [string]::IsNullOrEmpty($TAP)))) { Throw $AADError } Write-Host $AADError -ForegroundColor Red } # MFA elseif($config.arrUserProofs -ne $null) { $passwordOk = $true $MFA = $true } } # Ok, we got the code! 302 { $passwordOk = $true } } } return [pscustomobject]@{ "MFA" = $MFA "Config" = $Config "Response" = $response } } } } Process { # Remove variables Remove-Variable -Name "LoginSession" -ErrorAction SilentlyContinue Remove-Variable -Name "Config" -ErrorAction SilentlyContinue Remove-Variable -Name "Response" -ErrorAction SilentlyContinue # Load certificate if provided if(!$Certificate -and -not [string]::IsNullOrEmpty($PfxFileName)) { $Certificate = Load-Certificate -FileName $PfxFileName -Password $PfxPassword -Exportable } # Get redirect url if([string]::IsNullOrEmpty($RedirectURI)) { $RedirectURI = Get-AuthRedirectUrl -ClientId $ClientId -Resource $Resource } # Create the url $loginEndPoint = "https://login.microsoftonline.com" $request_id=(New-Guid).ToString() $url="$loginEndPoint/$Tenant/oauth2/authorize?resource=$Resource&client_id=$ClientId&response_type=code&redirect_uri=$RedirectURI&client-request-id=$request_id&prompt=login&scope=openid profile&response_mode=query&sso_reload=True" # Authentication Method References (AMR), "mfa" or "ngcmfa" will enforce MFA # Ref: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-oapx/0fc398ca-88d0-4118-ae60-c3033e396e60 if($AMR) { $url+="&amr_values=$AMR" } # Headers $headers = @{ "User-Agent" = Get-UserAgent } # Set RefreshTokenCredential for device authentication if($RefreshTokenCredential) { $headers["x-ms-RefreshTokenCredential"] = $RefreshTokenCredential $parsedToken = Read-AccessToken -AccessToken $RefreshTokenCredential if($parsedToken.request_nonce) { $url += "&sso_nonce=$($parsedToken.request_nonce)" } } # Make the first request to authorization endpoint. Allow one redirect for sso_nonce $response = Invoke-WebRequest -UseBasicParsing -Uri $url -SessionVariable "LoginSession" -Method get -MaximumRedirection 1 -ErrorAction SilentlyContinue -Headers $Headers $config = Parse-LoginMicrosoftOnlineComConfig -Body $response.Content # Prompt for user name if not provided if($Credentials) { $userName = $Credentials.UserName } else { Write-Host "Logging in to $($config.sCompanyDisplayName)" $userName = Read-Host -Prompt "Please Enter Office 365 Admin Account" } # Get credential type $credType = Get-CredentialType -UserName $userName -FlowToken $config.sFT -OriginalRequest $config.sCtx -webSession $LoginSession # Check whether we are throttling if($credType.ThrottleStatus -eq 1) { Write-Warning "Requests throttled. If authentication fails, wait a minute and try again." } # Does the user exist? if($credType.IfExistsResult -ne 0 -and $credType.IfExistsResult -ne 6 -and $credType.IfExistsResult -ne 5) { Throw "We couldn't find an account with that username." } # Check the credential type (managed vs federated) $isFederated = ![string]::IsNullOrEmpty($credType.Credentials.FederationRedirectUrl) # Do the federated domain authentication if($isFederated) { # Create WS-Fed response $response = Process-ADFSLogin -Credentials $Credentials -UserName $userName -webSession $loginSession -FederationRedirectUrl $credType.Credentials.FederationRedirectUrl switch($response.StatusCode) { # We got an error or MFA prompt 200 { $config = Parse-LoginMicrosoftOnlineComConfig -Body $response.Content # Something severe if($config.strServiceExceptionMessage) { throw $config.strServiceExceptionMessage } # Wrong password etc elseif($config.sErrorCode -ne $null) { # When using TAP for MFA, the correct error code is not returned if($config.sErrorCode -eq "InvalidAccessPass") { $AADError = "130503: Your Temporary Access Pass is incorrect. If you don't know your pass, contact your administrator." } # Get error text from Azure AD else { $AADError = Get-Error -ErrorCode $config.sErrorCode } # We don't want to loop with provided password/TAP so throw the error if($isTAP -and (-not [string]::IsNullOrEmpty($TAP))) { Throw $AADError } Write-Host $AADError -ForegroundColor Red } # MFA elseif($config.arrUserProofs -ne $null) { $MFA = $true } } # Ok, we got the code! 302 { $passwordOk = $true } } #$config = $loginResponse.Config #$MFA = $loginResponse.MFA #$response = $loginResponse.Response } # Do the managed domain authentication else { # Ask which account to use (MSA or AAD) # MSA not supported at the moment, so skip this <# $accountType = 0 # AAD if($credType.IfExistsResult -eq 6) { $options = @( New-Object System.Management.Automation.Host.ChoiceDescription "&1 Work or school account" New-Object System.Management.Automation.Host.ChoiceDescription "&2 Personal account" ) $accountType = $host.UI.PromptForChoice("Choose account","It looks like this email is used with more than one account from Microsoft. Which one do you want to use?",$options,0) } #> # Choose authentication method $authOptions = @() $nAuthOption = 0 $pwdOption = -2 $cbaOption = -2 $tapOption = -2 # Password? if($credType.Credentials.HasPassword -eq $True) { Write-Verbose "Password enabled." $pwdOption = $nAuthOption $nAuthOption++ $authOptions += New-Object System.Management.Automation.Host.ChoiceDescription "&$nAuthOption Password" } # Temporary Access Pass (TAP)? if($credType.Credentials.HasAccessPass -eq $True) { Write-Verbose "Temporary Access Pass enabled." $tapOption = $nAuthOption $nAuthOption++ $authOptions += New-Object System.Management.Automation.Host.ChoiceDescription "&$nAuthOption Temporary Access Pass" } # Certificate Based Authentication (CBA)? if($credType.Credentials.HasCertAuth -eq $True) { Write-Verbose "CBA enabled." if($Certificate) { $cbaOption = $nAuthOption $nAuthOption++ $authOptions += New-Object System.Management.Automation.Host.ChoiceDescription "&$nAuthOption Certificate" } else { Write-Verbose "No certificate provided, skipping CBA." } } # No supported authentication options found :( if($authOptions.Count -eq 0) { Throw "No supported authentication options found!" } # Just one option so use that elseif($authOptions.Count -eq 1) { $authOption = 0 } # If we have TAP and it's available, use that elseif($tapOption -ge 0 -and -not [string]::IsNullOrEmpty($TAP)) { $authOption = $tapOption } # Prompt for options else { $authOption = $host.UI.PromptForChoice("Authentication options","Choose authentication method",[System.Management.Automation.Host.ChoiceDescription[]]$authOptions,0) } switch($authOption) { $pwdOption { $cPWD = $true } $cbaOption { $cCBA = $true } $tapOption { $cTAP = $true } default { return $null } } # PWD & TAP if($cPWD -or $cTAP) { $loginResponse = Process-Login -Credentials $Credentials -Config $config -IsTAP ($cTAP -eq $true) -TAP $TAP if($loginResponse -eq $null) { return $null } $config = $loginResponse.Config $MFA = $loginResponse.MFA $response = $loginResponse.Response } } if($MFA) { # Get MFA types from the config $MFATypes = [ordered]@{} $MFAOptions = @() $m = 1 foreach($mfaType in $config.arrUserProofs) { # Certificate not currently supported if($mfaType.authMethodId -ne "Certificate") { $MFATypes[$mfaType.authMethodId] = $mfaType.display $MFAOptions += New-Object System.Management.Automation.Host.ChoiceDescription "&$m $($mfaType.authMethodId) ($($mfaType.display))" $m++ # If OTPSecret is provided and whe have PhoneAppOTP option, use that if($mfaType.authMethodId -eq "PhoneAppOTP" -and -not [string]::IsNullOrEmpty($OTPSecretKey)) { $mfaMethod = $mfaType.authMethodId } } } if($MFAOptions.Count -eq 0) { Throw "No supported MFA methods found!" } # Ask user to choose MFA method if not automatically chosen if(-not $mfaMethod) { # If there's just one method, use that if($MFATypes.Count -eq 1) { $mfaMethod = [string]$MFATypes.Keys[0] } else { $mfaSelection = $host.UI.PromptForChoice("MFA options","Choose MFA method",$MFAOptions,0) if($mfaSelection -eq -1) { return $null } $p = 0 foreach($key in $MFATypes.Keys) { if($p -eq $mfaSelection) { $mfaMethod = $key break } $p++ } } } # Start the MFA loop $url = $config.urlBeginAuth $body = @{ "AuthMethodId" = $mfaMethod "ctx" = $config.sCtx "flowToken" = $config.sFT "Method" = "BeginAuth" } # TAP has unique MFA flow if($mfaMethod -eq "AccessPass") { $body["AuthMethodId"] = "PhoneAppOTP" } $headers = @{ "User-Agent" = Get-UserAgent "canary" = $config.apiCanary "Content-Type" = "application/json; charset=utf-8" } # SAS/BeginAuth if not TAP if($mfaMethod -eq "AccessPass") { $beginAuth = $true } else { $response = Invoke-RestMethod -UseBasicParsing -Uri $url -WebSession $LoginSession -Method Post -MaximumRedirection 0 -ErrorAction SilentlyContinue -Headers $Headers -Body ($body|ConvertTo-Json) $beginAuth = $response.Success -eq $true } if($beginAuth) { # Prompt for MFA method switch($mfaMethod) { "PhoneAppNotification" { Write-Host "Open your Authenticator app, and enter the number shown to sign in:​​" Write-Host $response.Entropy break } "PhoneAppOTP" { # Use provided OTPSecret if($OTPSecretKey) { Write-Host "Using the provided OTP Secret for MFA." # Calculate OTP using the secret key $OTP = New-AADIntOTP -SecretKey $OTPSecretKey # Strip the spaces $additionalAuthData = $OTP.OTP.Replace(" ","") break } else { $additionalAuthData = Read-Host "Please type in the code displayed on your authenticator app from your device" break } } "OneWaySMS" { $additionalAuthData = Read-Host "We texted your phone $($MFATypes[$mfaMethod]). Please enter the code to sign in" break } "TwoWayVoiceMobile" { Write-Host "We're calling your phone $($MFATypes[$mfaMethod]). Please answer it to continue." break } "TwoWayVoiceAlternateMobile" { Write-Host "We're calling your phone $($MFATypes[$mfaMethod]). Please answer it to continue." break } "AccessPass" { # TAP has a unique flow $loginResponse = Process-Login -Config $config -IsTAP $true -TAP $TAP if($loginResponse -eq $null) { return $null } $config = $loginResponse.Config $MFA = $loginResponse.MFA $response = $loginResponse.Response break } default { Throw "MFA method $mfaMethod not supported." break } } # SAS/EndAuth if($mfaMethod -ne "AccessPass") { for($p = 1;$p -le $config.iMaxPollAttempts ; $p++) { # If OTP or SMS send a single request if(@("PhoneAppOTP","OneWaySMS") -contains $mfaMethod) { $url = $config.urlEndAuth $headers = @{ "User-Agent" = Get-UserAgent "canary" = $config.apiCanary "Content-Type" = "application/json; charset=utf-8" } $body = @{ "AdditionalAuthData" = $additionalAuthData "AuthMethodId" = $mfaMethod "SessionId" = $response.SessionId "FlowToken" = $response.FlowToken "Ctx" = $response.Ctx "Method" = "EndAuth" } $response = Invoke-RestMethod -UseBasicParsing -Uri $url -WebSession $LoginSession -Method Post -MaximumRedirection 0 -ErrorAction SilentlyContinue -Headers $Headers -Body ($body | ConvertTo-Json) } # Poll until we get response or timeout else { $url = "$($config.urlEndAuth)?authMethodId=$mfaMethod&pollCount=$p" $headers = @{ "User-Agent" = Get-UserAgent "x-ms-sessionId" = $response.SessionId "x-ms-flowToken" = $response.FlowToken "x-ms-ctx" = $response.Ctx } $response = Invoke-RestMethod -UseBasicParsing -Uri $url -WebSession $LoginSession -Method Get -MaximumRedirection 0 -ErrorAction SilentlyContinue -Headers $Headers } if($response.Success -eq $true) { # SAS/ProcessAuth $headers = @{ "User-Agent" = Get-UserAgent "Content-Type" = "application/x-www-form-urlencoded" } $url = $config.urlPost $body = @{ "request" = $response.Ctx "mfaAuthMethod" = $mfaMethod "login" = $userName "flowToken" = $response.FlowToken "canary" = $config.canary } $response = Invoke-WebRequest2 -Uri $url -WebSession $LoginSession -Method Post -MaximumRedirection 0 -Headers $Headers -Body $body -ErrorAction SilentlyContinue break } elseif($response.Retry -eq $false) { Throw "$($response.Message) $($response.ResultValue)" } Start-Sleep -Milliseconds $config.iPollingInterval } } } } # Some weird redirect again if($response.Content.Contains("https://device.login.microsoftonline.com")) { Write-Warning "Got an error, try using another User-Agent, current is: $(Get-UserAgent)" throw "Got unexpected redirect to https://device.login.microsoftonline.com" } # Check for errors $config = Parse-LoginMicrosoftOnlineComConfig -Body $response.Content if($config.strServiceExceptionMessage) { Write-Warning "Got an error, try using another User-Agent, current is: $(Get-UserAgent)" throw $config.strServiceExceptionMessage } elseif($config.sErrorCode -ne $null) { $AADError = Get-Error -ErrorCode $config.sErrorCode throw $AADError } $authorizationCode = Parse-CodeFromResponse -Response $response return $authorizationCode } } # May 21st 2024 # Return tenant subscope from Open ID configuration function Get-TenantSubscope { [cmdletbinding()] Param( [Parameter(ParameterSetName='Domain',Mandatory=$True)] [String]$Domain, [Parameter(ParameterSetName='Config',Mandatory=$True)] [PSObject]$OpenIDConfiguration ) Process { # Get Tenant Region subscope from Open ID configuration if($OpenIDConfiguration -eq $null) { $OpenIDConfiguration = Get-OpenIDConfiguration -Domain $Domain } return $OpenIDConfiguration.tenant_region_sub_scope } } # May 21st 2024 # Return tenant login url based on the subscope function Get-TenantLoginUrl { [cmdletbinding()] Param( [Parameter(Mandatory=$false)] [String]$SubScope ) Process { # Use the correct url switch($SubScope) { "DOD" # DoD { return "https://login.microsoftonline.us" } "DODCON" # GCC-High { return "https://login.microsoftonline.us" } default # Commercial/GCC { return "https://login.microsoftonline.com" } } } } function Add-SyncFabricServicePrincipal { <# .SYNOPSIS Adds Microsoft.Azure.SyncFabric service principal needed to create BPRTs. .DESCRIPTION Adds Microsoft.Azure.SyncFabric service principal needed to create BPRTs. Requires Application Administrator, Cloud Application Administrator, Directory Synchronization Accounts, Hybrid Identity Administrator, or Global Administrator permissions. .Parameter AccessToken The Access Token. If not given, tries to use cached Access Token. .Example PS C:\>Get-AADIntAccessTokenForAADGraph -SaveToCache PS C:\>Add-AADIntSyncFabricServicePrincipal DisplayName AppId ObjectId ----------- ----- -------- Microsoft.Azure.SyncFabric 00000014-0000-0000-c000-000000000000 138018f7-6aa2-454c-a103-a7e682e17d6b #> [cmdletbinding()] Param( [Parameter(Mandatory=$False)] [String]$AccessToken ) Process { $AccessToken = Get-AccessTokenFromCache -AccessToken $AccessToken -ClientID "1b730954-1685-4b74-9bfd-dac224a7b894" -Resource "https://graph.windows.net" $body = @{ "accountEnabled" = "True" "appId" = "00000014-0000-0000-c000-000000000000" "appRoleAssignmentRequired" = $false "displayName" = "Microsoft.Azure.SyncFabric" "tags" = @( "WindowsAzureActiveDirectoryIntegratedApp" ) } # Call the API $result = Call-GraphAPI -AccessToken $AccessToken -Command "servicePrincipals" -Body ($body | ConvertTo-Json) -Method Post if($result) { [pscustomobject]@{ "DisplayName" = $result.displayName "AppId" = $result.appId "ObjectId" = $result.objectId } } } } # This script contains utility functions for Graph API at https://graph.windows.net # Office 365 / Azure AD v2, a.k.a. AzureAD module uses this API # Calls the provisioning SOAP API function Call-GraphAPI { [cmdletbinding()] Param( [Parameter(Mandatory=$True)] [String]$AccessToken, [Parameter(Mandatory=$True)] [String]$Command, [Parameter(Mandatory=$False)] [String]$ApiVersion="1.61-internal", [Parameter(Mandatory=$False)] [ValidateSet('Put','Get','Post','Delete','Patch')] [String]$Method="Get", [Parameter(Mandatory=$False)] $Body, [Parameter(Mandatory=$False)] $Headers, [Parameter(Mandatory=$False)] [String]$QueryString ) Process { # Set the required variables $TenantID = (Read-Accesstoken $AccessToken).tid if($Headers -eq $null) { $Headers=@{} } $Headers["Authorization"] = "Bearer $AccessToken" # Call the API $response = Invoke-RestMethod -UseBasicParsing -Uri "https://graph.windows.net/$TenantId/$Command`?api-version=$ApiVersion$(if(![String]::IsNullOrEmpty($QueryString)){"&$QueryString"})" -ContentType "application/json; charset=utf-8; odata.metadata=none" -Method $Method -Body $Body -Headers $Headers -ErrorAction SilentlyContinue # Return if($response.value) { return $response.value } else { return $response } } } function Get-ServicePrincipals { <# .SYNOPSIS Extracts Azure AD service principals .DESCRIPTION Extracts Azure AD service principals. If client id(s) are provided, show detailed information. .Parameter AccessToken The Access Token. If not given, tries to use cached Access Token. .Parameter ClientIds List of client ids to get detailed information. .Example PS C:\>Get-AADIntAccessTokenForAADGraph -SaveToCache PS C:\>Get-AADIntServicePrincipals AccountEnabled : true Addresses : AppPrincipalId : d32c68ad-72d2-4acb-a0c7-46bb2cf93873 DisplayName : Microsoft Activity Feed Service ObjectId : 321e7bdd-d7b0-4a64-8eb3-38c259c1304a ServicePrincipalNames : ServicePrincipalNames TrustedForDelegation : false AccountEnabled : true Addresses : Addresses AppPrincipalId : 0000000c-0000-0000-c000-000000000000 DisplayName : Microsoft App Access Panel ObjectId : a9e03f2f-4471-41f2-96c5-589d5d7117bc ServicePrincipalNames : ServicePrincipalNames TrustedForDelegation : false AccountEnabled : true Addresses : AppPrincipalId : dee7ba80-6a55-4f3b-a86c-746a9231ae49 DisplayName : Microsoft AppPlat EMA ObjectId : ae0b81fc-c521-4bfd-9eaa-04c520b4b5fd ServicePrincipalNames : ServicePrincipalNames TrustedForDelegation : false AccountEnabled : true Addresses : Addresses AppPrincipalId : 65d91a3d-ab74-42e6-8a2f-0add61688c74 DisplayName : Microsoft Approval Management ObjectId : d8ec5b95-e5f6-416e-8e7c-c6c52ec5a11f ServicePrincipalNames : ServicePrincipalNames TrustedForDelegation : false #> [cmdletbinding()] Param( [Parameter(Mandatory=$False)] [String]$AccessToken, [Parameter(Mandatory=$False)] [String[]]$ClientIds ) Process { $AccessToken = Get-AccessTokenFromCache -AccessToken $AccessToken -ClientID "1b730954-1685-4b74-9bfd-dac224a7b894" -Resource "https://graph.windows.net" # If client id(s) are provided, get only those (with extra information) if($ClientIds) { $body = @{ "appIds" = $ClientIds } # Call the API Call-GraphAPI -AccessToken $AccessToken -Command "getServicePrincipalsByAppIds" -Body ($body | ConvertTo-Json) -Method Post -QueryString "`$Select=" } else { # Call the Provisioning API Get-ServicePrincipals2 -AccessToken $AccessToken } } } |