The repository contains a Proof of concept Azure Function implementation that does the following:
- Triggered via Azure Storage Queue message.
The message that needs to be pushed into the storage queue accepts the following schema:
{
"OrgName": "Your Organization name (just the name not the entire URL)",
"PAT": "A personal access token",
"ProjectId": "Must be the Guid of an Azure DevOps Project",
"RotateAllServiceConnections": false,
"ServiceEndpoints": ["Must be a guid - a Service Connection ID"],
"DaysBeforeExpire": 1,
"LifeTimeInDays": 5
}
- The function has a Managed Identity
- The Managed Identity needs to have
Application.ReadWrite.OwnedBy
Graph permissions and consent granted by Azure AD Administrators. - The function read the endpoint (aka. AzDO Service Connection) (or multiple endpoints) and determine the corresponding Azure AD Application (via Service Principal)
⚡ Password Credentails
- If the Service Connection was created with Client Secret (password based authentication).
- Function will generate a new password credentail (based on
DaysBeforeExpire
andLifeTimeInDays
provided in storage message). - Update the service connection in Azure DevOps to use that.
- Delete the old password credentails for the AAD application.
- Function will generate a new password credentail (based on
⚡ Certificate credentails
- If the service connection was created with Certificate (PEM) based authentication.
- Function will generate a Self-Signed certificate.
- Update the Application in Azure AD - creating the certificate credentials with the newly created certificate (essentially a self-signed PFX). Note: This operation will remove the old certificate from the application in Azure AD.
- Update the Azure DevOps service connection to use the newly created certificate (through the PEM)
📢 Important Notice: The Azure function in this demo application doesn't do anything for securing the API endpoints (there are some test/temporary endpoints), you should either remove them or bring your owner authentiation mechanism with Web Application Firewall (WAF) to protect these endpoints. You must NOT deploy the Azure functions with nacked endpoints exposed in the wild internet.
The implementation is all about Managed Identities. The code offers all the APIs to manage application registrations and service principals in Azure Active directory as REST API and you can deploy it as Azure Functions.
After deploying it as Azure Functions, you need to make sure the Managed Identity is enabled and Microsoft Graph Application permissions are granted to that idenity.
You can use the bash script examples as described in setup-msi-permissions.sh
file.
Then you can use that Azure function REST endpoints to orchestrate your workflows to manage app registrations and service principals.
There are some example payload schema and REST endpoints can be found in example.http
.
You are more than welcome to contribute to the repository! 🥂
This is under MIT license, you are free to use, modify the code anyway you want. Of course, I would appreciate if you acknoledge if this code helped you. That surely motivates and makes my day!
Enjoy!