Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updating for W365 support, a new PEM X.509 cert process, and completed documentation for the new process #2

Open
wants to merge 29 commits into
base: main
Choose a base branch
from

Conversation

AzureToTheMax
Copy link
Contributor

This contains...

  1. Updates to make the client side scripts better compatible with Windows 365 devices.

  2. Updates to use the full PEM formatted X.509 public certificate as a single value upload to replace the fields for the Azure Device ID, Thumbprint, and raw public key as all three values are contained within this cert. This includes modifications to the client side scripts to generate this alternate base body, as well as a new function for the Function App and alterations to the Function App to be able to pull apart this certificate into the needed values. So far I have not had any issues in testing/deploying this to AAD and Hybrid Win10/11 devices.

  3. There is a new sample script which exports the PEM X.509 public certificate to the .CER format for visual inspection. This is the same content which is passed in the body and allows visual confirmation that the private key is not part of this upload. The Base64 content simply needs to be broken into lines of a certain length, along with a header and footer added, to then be in the .CER format.

  4. All of this is covered in the revamped and completed documentation regarding how the process works in the ReadMe.

NOT COMPLETE - still needs more info but I want to make a coding change.
Updating for Windows 365 / Cloud PCs which have their JoinInfo child key as their Azure ID rather than the thumbprint
still not done
Fixed issue pertaining to Cloud PCs (Windows 365) devices ability to locate their AzureADDeviceID.
@AzureToTheMax Updated for Cloud PCs which don't have their thumbprint as their JoinInfo key name.
@AzureToTheMax - Updated to use X509 for the full public key with extended properties in the PEM format
@AzureToTheMax - Updated to no longer use Thumbprint field, now redundant.
Just adding a note for future someone.

AzureToTheMax was here - this function does not appear to be used anywhere? If it is, it may need to be updated to accept a full PEM and use the X502 class like the others.
1. Updated Thumbprint compare to use actual PEM cert via X502 class rather than simply a passed and separate thumbprint value.

2. Updated Hash compare to use full PEM cert via the X502 class, pull out just the public key data, and compare from that like before.
@AzureToTheMax - Updated to use full PEM cert via X502, extract the public key, and perform test like before using that.
@AzureToTheMax - Fixed issue pertaining to Cloud PCs (Windows 365) devices ability to locate their AzureADDeviceID.
@AzureToTheMax - Fixed issue pertaining to Cloud PCs (Windows 365) devices ability to locate their AzureADDeviceID.
A mostly complete readme with all the new x509 class wording. It's late and I will need to re-read it again tomorrow.
1.0.1 - 2023-05-11 Updated to use X509 class
1.0.2 - 2023-05-14 Updated to pull Azure AD Device ID from the cert
Updating to include Get-AzureADDeviceRecord
Fixing Get-AzureADDeviceIDFromCertificate name
Corrected Date
Updating for PSObject example
Updating for better examples in adding other values
Fixing capital letter issue
Fixing spelling error in Synopsis / Description
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant