Product: PowerShell Universal
Version: 1.5.19
Hi
I am trying to place our on-prem PU server to go behind Azure AD (AAD) for logins, as we want the end-user to use MFA (controlled by our conditional access). I have followed the guides and managed to get users to go through the process using OIDC and they either log on to the dashboard (which has authentication enabled and roles set up) or they get access denied message to the dashboard as their role is not part of the authentication, so this works!
However, looking to set up roles within PU using Hasclaim and as soon as I change the AAD application manifest from "groupMembershipClaims": null,
to "groupMembershipClaims": "SecurityGroup",
or "groupMembershipClaims": "All",
when I try and logon on any account I get āERR_HTTP2_PROTOCOL_ERRORā once logged on. Revert back to null and it works, but ideally, I need to use claims and policy to define the usersā access. I am sure that I have missed something, can anyone help?
Set-up
Windows 2019 Server
IIS Setup (ZIP Install)
Authentication for IIS - Anon
Web.config
Set as default install - i.e. forwardWindowsAuthToken=āfalseā
OIDC Configuration:
"OIDC": {
"Enabled": "true",
"CallbackPath": "/auth/signin-oidc",
"ClientID": "xxxx-xxxxxx-xxxxxx-xxxxx-xxxxx",
"ClientSecret": "xxxx-xxxxx-xxxxx-xxxxx-xxxxx",
"Resource": "https://graph.microsoft.com",
"Authority": "https://login.microsoftonline.com/xxxx-xxxx-xxxxx-xxxxxx-xxxxxxx",
"ResponseType": "id_token token",
"SaveTokens": "true",
"UseTokenLifetime": "false",
"CorrelationCookieSameSite" : "None"
},
Azure App
Note that I have ticked the following
Access tokens (used for implicit flows)
ID tokens (used for implicit and hybrid flows)