AZURE AD APP REGISTRATION — CREATE APP ROLES USING MS GRAPH API AND POWERSHELL — PART 2
In my previous post, https://pujah-goviel.medium.com/azure-ad-app-registration-create-application-using-ms-graph-api-and-powershell-6d8e28f4ac45, I wrote about creating app registration programmatically. In this post, I will aim at creating multiple app roles via PowerShell script that uses Azure AD PowerShell commands that in turn uses MS Graph behind. App roles are usually defined on application registration representing a service, app or API.
This article assumes you have knowledge of App registration, just giving a brief overview about app roles to start with.
When a user signs in to the application, Azure AD emits a roles claim for each role that the user or service principal has been granted individually to the user and from their group membership. This can be used to implement claim-based authorization. App roles can be assigned to a user or a group of users. App roles can also be assigned to the service principal for another application, or to the service principal for a managed identity.
Once you’ve added app roles in your application, you can assign users and groups to the roles. When the users assigned to the various app roles sign in to the application, their tokens will have their assigned roles in the roles claim.
Similarly, you can assign an app role to a client app. When you assign app roles to an application, you create application permissions. Application permissions are typically used by daemon apps or back-end services that need to authenticate and make authorized API calls as themselves, without the interaction of a user.
For programmatically creating app roles, I have created a script in my GitHub repository — CreateAppRoles.ps1
My GitHub repository link is:
How the script works?
- CreateAppRoles.ps1 will first authenticate to Azure AD (using script ConnectToAzureAD.ps1)
- Once authenticated, it will create the app roles.
Note: CreateAppRoles.ps1 requires ConnectToAzureAD.ps1 to be in the same folder.
Before using script:
If you have not read my previous post, please click here https://pujah-goviel.medium.com/azure-ad-app-registration-create-application-using-ms-graph-api-and-powershell-6d8e28f4ac45 to follow the sections for:
- Create master App Registration
If you have already done that, you do not need to repeat the above steps.
How to run the script?
Please follow the steps below to use the repository and run the script:
- Go to the link: https://github.com/Pujago/ApplicationRegistrationUsingMSGraphAPIs-Public
- Clone the repository.
- Open the PowerShell terminal, go to the repository location, go to scripts folder.
Once done, run the following commands:
Connect to Azure account:
You can use this script code to connect using master app credentials:
$ServicePrincipalUser=”<Master app registration Client Id>”
$ServicePrincipalPW=”<Master app registration client secret>”
$passwd = ConvertTo-SecureString $ServicePrincipalPW -AsPlainText -Force
$pscredential = New-Object System.Management.Automation.PSCredential($ServicePrincipalUser, $passwd)
Connect-AzAccount -ServicePrincipal -Credential $pscredential -Tenant “<Your tenant Id>”
Or if you have application administrator role, you can use command below to login in.
Connect-AzAccount -TenantId <Your tenant ID>
Run the script:
.\CreateAppRoles.ps1 -appName “<Enter a display name of existing app reg>” -appRolesList “<approles separated by comma”.
For e.g. .\CreateAppRoles.ps1 -appName “TestPujah-1” -appRolesList “Survey.Read,Survey.Create,Query.Read,Query.Write”
In my next post, I will be writing about how to create scopes to expose web API registration programmatically. Till then, happy reading.
Originally published at https://www.leogether.com.