Udostępnij za pośrednictwem


Certificate based authentication - O365

This blog provides step by step process to implement Certificate base authentication on Azure AD for iOS and android devices. Certificate base authentication enables iOS and android devices to use user certificate when connecting to Exchange online resources. Supported scenarios are:

  • Office mobile applications on mobile devices
  • Exchange ActiveSync clients

Certificate base authentication eliminates the need of entering username and password instead require user certificate to access O365 workloads using Microsoft Office applications on mobile devices.

 

Requirement to enable Certificate based authentication for your O365 Tanent

  • Access to certificate authority which generate client certificates in your environment
  • Certificate authority should have CRL (certificate revocation list) which is published on internet
  • Root and intermediate CA certificates
  • User certificate must be issued for client authentication purpose
  • The client certificate must have primary email address in principle name or RFC822 name value of the SAN (Subject Alternate Name)
  • Federation server to be configured with additional claim rules to pass on certificate serial number and issuer

 

Installing Azure AD module

  1. Start Windows PowerShell with administrator privilege
  2. Install Azure AD module version 2.0.0.33 or higher (if not already installed) using below cmdlets

Install-Module -Name AzureAD –RequiredVersion 2.0.0.33

Note: - make sure you have PowerShell version 5.0 , verify that by using $psversiontable.psversion cmdlets

powershellversionchk

  1. Connect to your Azure AD tenant:

Connect-AzureAD

 

Configuring your Azure AD tenant for certificate based authentication

  1. Export Root CA certificate in .cer format
  2. Configure your CA details in Azure AD so that Azure AD can validate user certificates and perform revocation check

Note: - Verify any existing Trusted CA settings in Azure AD using below cmdlets

Get-AzureADTrustedCertificateAuthority

$Cert=Get-Content -Encoding byte "Location of Root CA CER file"

$New_CA=New-Object -TypeName Microsoft.Open.AzureAD.Model.CertificateAuthorityInformation

$New_CA.AuthorityType=0

$New_CA.TrustedCertificate=$Cert

$New_CA.crlDistributionPoint="CRL Distribution URL"

New-AzureADTrustedCertificateAuthority -CertificateAuthorityInformation $New_CA

2

 

  1. Verify the Azure AD trust configuration:

Get-AzureADTrustedCertificateAuthority

3

 

Adding new claims rule for Claims Provider Trust and Relying Party Trusts in ADFS server

  1. Login to ADFS server and open ADFS management console
  2. Clink on Claims Providers Trusts and select Active Directory from middle pane
  3. Choose Edit Claims Rules from Right click Manu or from Actions menu

 

4

Click on Add Rule

5

Select Claim rule template “Pass Through or Filter an Incoming Claim” and hit Next

6

Define the claim rule name and select Incoming rule type as “Serial Number” from drop down list.  Also select Pass through all claim radio button and click Finish to create the new rule.

7

In the same way add new claim rule for “Issuer” as well. The steps are same except you must choose Incoming claim type as Issuer.

8

 

Now we must add these two claims rule for Relying Party Trust i.e. Microsoft Office 365 Identity Platform as well.

  • On ADFS management console, click Relying Party Trust and select Microsoft Office 365 Identity Platform from middle pane
  • Choose Edit Claims Rules from Right click Manu or from Actions menu

9

Clink on Add Rule

10

Select Claim rule template “Pass Through or Filter an Incoming Claim” and hit Next

11

Define the claim rule name and select Incoming rule type as “Serial Number” from drop down list. Also select Pass through all claim value radio button and click Finish to create the rule.

12

In the same way add new claim rule for “Issuer” as well. The steps are same except you must choose Incoming claim type as Issuer

13

 

Testing Certificate based authentication to access active sync email profile on iOS Device

Now to test the CBA on iOS device we have to push certificate and email profile to iOS device from any MDM solution. In my testing, I have used O365 Intune to push certificate profile as well as email profile to my test iOS device.

Once  MDM solution (in my case it is Intune) is ready to manage iOS devices you must enroll iOS device using Microsoft Intune Company Portal app on iOS device.  Once the app is installed login to the Company Portal app using your domain credentials and once your are logged in, it should look like this

 

14          15

 

Once device is enrolled into Intune successfully, you can manage the device from Intune and push Certificate profile, i.e. pushing Root CA certificate as well as client certificate on iOS device. You may verify that on iOS device by going to settings -> General -> Device Management.

 

16          17

To verify device has got the correct certificates for authentication go to more details in Management Profile on iOS device. You may see couple of certificates. One should be your Root CA certificate and another user certificate for authentication.

 

18

To verify email profile, go to accounts under Device Management Profile and you should see email profile like this.

 

19

Once you verify the Certificate profile and email profile on iOS device you should be ready to access your emails using certificate authentication without entering your username and password. You may also use CBA for all Office mobile applications on iOS device.

 

20

Comments

  • Anonymous
    February 16, 2017
    Thanks
  • Anonymous
    February 22, 2017
    Can you post details of your certificate template and cert and email profiles in intune?
    • Anonymous
      February 23, 2017
      As i was testing with iOS device so I have used SCEP Certificate Profile and iOS email profile in Intune. for client certificate i have used User certificate template.
      • Anonymous
        February 24, 2017
        Thank you! I got it working with active sync and it works great! Have you any insight to getting cert authentication working with office Office apps like word or one drive? When I try to login to one drive, and hit the link to sign in with certificate on my adfs page it just times out. But like I said active sync works great.
        • Anonymous
          March 02, 2017
          The comment has been removed
  • Anonymous
    April 07, 2017
    Thank you for the very descriptive blog!In our enviroment, whilst Outlook and Office apps work perfectly the native ios app keeps prompting for a password. I can confirm that your blog has been followed to the letter but it still keeps prompting. Any ideas?
    • Anonymous
      May 02, 2017
      For native iOS app to work properly You have to push certificate and email profile from one of the MDM solution, in my case it was Intune.
  • Anonymous
    July 22, 2017
    The comment has been removed
    • Anonymous
      July 22, 2017
      The comment has been removed
    • Anonymous
      October 13, 2017
      Peter, can you help me with my question in the forum?
  • Anonymous
    September 03, 2017
    Is there any way to require the cert for exchange authentication?
  • Anonymous
    October 10, 2017
    Hi Ashish, we are using Airwatch to push the certoficate and it installs successfully. for some users we get the error "Cannot get email,connection to the server failed" , Same account works fine if we add the account manually. We are on O365. This issue gets fixed automatically but after few days comes up for new users. Any help will be appreciated.
    • Anonymous
      October 13, 2017
      Please provide an update.
      • Anonymous
        October 16, 2017
        This is the error in XCODE logs#EASTraffic [ASGetOptionsTask 0x1073a97c0, conn 0x1071500e0, request 0x107148b30] connection died with error Domain:ASHTTPConnectionErrorDomain Code:503
  • Anonymous
    October 12, 2017
    Thnx for the blog post, really helped a lot
  • Anonymous
    February 05, 2018
    The comment has been removed