DefSec.blog

DefSec.blog – Random IT Stuff, Cybersecurity, Active Directory

Menu
  • Cybersecurity
  • Active Directory
  • Azure Active Directory
Menu

Roll over the Kerberos decryption key of the “AZUREADSSO” computer account

Posted on January 22, 2023January 27, 2023 by th3alch3m1st

It’s is very important to regularly (every 30 days) roll over the Kerberos key for the AZUREADSSO computer account. This account represents your Azure AD in your on-prem AD.

Permissions needed to perform this operation – on-prem Domain Administrator(DA) and Azure AD Global Administrator(GA)

Assuming your environment consists of a single AD forest:

  1. Optional – Remove your DA account from the on-prem “Protected Users” AD group(hint – if your DA is not a member of that group – it should be!). In case your environment utilizes PKI and your DA account have this option enabled – “Smart card required for interactive logon” under the Account tab, uncheck it and change the account password.
  2. Download and install Azure AD PowerShell (soon to be replaced by Microsoft Graph PowerShell) – Open PowerShell as Administrator and call Install-Module AzureAD
  3. Navigate to "C:\Program Files\Microsoft Azure Active Directory Connect"
  4. Import the Seamless SSO PowerShell module – Import-Module .\AzureADSSO.psd1
  5. Run PowerShell as Administrator and call New-AzureADSSOAuthenticationContext. This command will produce a popup to enter your Azure AD GA credentials.
  6. Call $creds = Get-Credential. When prompted enter your DA credentials. Use this format domain\da_account
  7. Call Update-AzureADSSOForest -OnPremCredentials $creds. This command updates the Kerberos decryption key for the AZUREADSSO computer account. Open Azure AD and check if the key has been successfully updated – Seamless single sign-on – Microsoft Azure
  8. Optional – Reverse all changes that were made in step #1. Once the “Smart card required for interactive logon” option is enabled again the DA account password will be reset to a random value.
Share on Social Media
x linkedin
  • Active Directory (4)
  • Azure Active Directory (1)
  • Cybersecurity (4)
  • IT Stuff (1)

Recent Posts

  • How to remove domain applied GPO settings

    February 8, 2023
  • Disable IPv6 to prevent DNS spoofing

    February 5, 2023
  • Disable Link-Local Multicast Name Resolution(LLMNR) via Group Policy

    January 27, 2023
  • How to reset the Directory Services Restore Mode administrator account password in Windows Server

    January 22, 2023
  • Disclaimer
  • Contact
©2023 DefSec.blog