Skip to content

Commit f53fe7b

Browse files
PsCustomObjectPsCustomObject
authored andcommitted
Fixed typos in post
1 parent 8f70ba9 commit f53fe7b

1 file changed

Lines changed: 9 additions & 9 deletions

File tree

_posts/2020-09-21-Exchange-Online-Certificate-Based-Authentication.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,17 +19,17 @@ header:
1919
teaser: "/assets/images/ExchangeLogo.png"
2020
---
2121

22-
Microsoft released to GA the new version of *Exchange Online Management* module, version *2.0.3* at the time this article, which introces **Certificate Based Authencation** for PowerShell sessions. *Basic Authentication* has been already deprecated and originally planned for removal in *Ocober 2020* but due CoVid-19 outbreak this has been post-poned to 2021 as you can [read here](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-april-2020-update/ba-p/1275508).
22+
Microsoft released to GA the new version of *Exchange Online Management* module, version *2.0.3* at the time this article, which introduces **Certificate Based Authentication** for PowerShell sessions. *Basic Authentication* has been already deprecated and originally planned for removal in *October 2020* but due CoVid-19 outbreak this has been postponed to 2021 as you can [read here](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-april-2020-update/ba-p/1275508).
2323

2424
I have been using the module preview in production for quite some time but held back publishing this article so to have all places in place as GA.
2525

2626
## Exchange Online Certificate Based authentication - Register Azure Application
2727

28-
The first step to deploy Certificate Based authentication is to register a new *Azure Application*. Navigate *Azure Active Directory* in the Azure portal and select **App Registrations** (alternatively use the search function whcih is what I usually do)
28+
The first step to deploy Certificate Based authentication is to register a new *Azure Application*. Navigate *Azure Active Directory* in the Azure portal and select **App Registrations** (alternatively use the search function which is what I usually do)
2929

3030
![Azure Application Registration](/assets/images/Azure_Application_Registration_Blade.png)
3131

32-
In the app registrations under *Owned applications* we can list all applications that we registered under our account, in my case this is still empty, and under *All applications* as the name implies all application registered tenant wide.
32+
In the app registrations under *Owned applications* we can list all applications that we registered under our account, in my case this is still empty, and under *All applications* as the name implies all application registered tenant wide.
3333

3434
![Azure owned applications](/assets/images/Azure_Owned_Applications.png)
3535

@@ -46,7 +46,7 @@ Once done click on the **Register** button, provision will only take a couple of
4646

4747
### Exchange Online Certificate Based authentication - Grant API Permissions
4848

49-
Once the application has been registered we need to configre/grant API permissions that will define what our application can and cannot do. Either seelct *API Permissions* from the left blade or from the link directly below the API properties and select **Add permission**
49+
Once the application has been registered we need to configure/grant API permissions that will define what our application can and cannot do. Either select *API Permissions* from the left blade or from the link directly below the API properties and select **Add permission**
5050

5151
![ExOV2 Certificate Authentication Application](/assets/images/Configure_API_Permissions.png)
5252

@@ -58,13 +58,13 @@ From the **Request API Permissions** scroll all the way down the *Supported Lega
5858
![ExOV2 Certificate Authentication Application](/assets/images/Exchange_API_Permissions.png)
5959
![ExOV2 Certificate Authentication Application](/assets/images/Exchange_API_Permissions._2.png)
6060

61-
The last step invovles clicking the **Grant Admin Consent for <your tenant name>** so that permissions will be deployed for all mailboxes.
61+
The last step involves clicking the **Grant Admin Consent for <your tenant name>** so that permissions will be deployed for all mailboxes.
6262

6363
![ExOV2 Certificate Authentication Application](/assets/images/EXO_Grant_Admin_Consent.png)
6464

6565
## Exchange Online Certificate Based authentication - Configure Authentication
6666

67-
With the application created configured in AzureAD we need to configure authentication against AzureAD. When using *[application permissions model](https://en.wikipedia.org/wiki/Application_permissions)* authenticaiton is performed via a **client secret**, a token, or a **certificate**. Token authentication is considered, rightly so, *less secure* for this reason only certificate one is supported by Exchange Online/Microsoft.
67+
With the application created configured in AzureAD we need to configure authentication against AzureAD. When using *[application permissions model](https://en.wikipedia.org/wiki/Application_permissions)* authentication is performed via a **client secret**, a token, or a **certificate**. Token authentication is considered, rightly so, *less secure* for this reason only certificate one is supported by Exchange Online/Microsoft.
6868

6969
In the scope of Exchange OnLine authentication it is unimportant if we're using a self signed or publicly trusted certificate as long as **we have the associated private key**.
7070

@@ -98,7 +98,7 @@ In the Azure Portal select *Certificates and Secretes* from the left blade and *
9898
**Note:** Write down the certificate thumbprint displayed in the Azure page as we will need this later on.
9999
{: .notice--primary}
100100

101-
## Exchange Online Certificate Based authentication - Grant permissiosn
101+
## Exchange Online Certificate Based authentication - Grant permissions
102102

103103
As I mentioned in the **Grant API Permissions** paragraph Graph API does not support any Exchange management operations nor we can use Exchange **RBAC** model as that only applies to user objects not applications, like in our case, which are represented by a **Service Principal**.
104104
What we can do is granting a **[AzureAD Directory Role](https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/directory-assign-admin-roles#exchange-service-administrator-permissions)** to our application Service Principal.
@@ -141,6 +141,6 @@ And here's the result
141141

142142
## Closing notes
143143

144-
This was quite a long post but steps to get up and running with Exchange Online Certificate based authentication are numerous even if not difficult to implemnt but well worth following.
144+
This was quite a long post but steps to get up and running with Exchange Online Certificate based authentication are numerous even if not difficult to implement but well worth following.
145145

146-
Certificate Based authentication resolves a number of challenges administrators had to face up to this point, chief among all [storing credentials](https://pscustomobject.github.io/powershell/howto/Store-Credentials-in-PowerShell-Script/) which is inherently insecure.
146+
Certificate Based authentication resolves a number of challenges administrators had to face up to this point, chief among all [storing credentials](https://pscustomobject.github.io/powershell/howto/Store-Credentials-in-PowerShell-Script/) which is inherently insecure.

0 commit comments

Comments
 (0)