SOLVED
Home

AAD Application Proxy and B2B Users

%3CLINGO-SUB%20id%3D%22lingo-sub-85249%22%20slang%3D%22en-US%22%3EAAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-85249%22%20slang%3D%22en-US%22%3E%3CP%3EJust%20want%20a%20confirmation%20the%20following%20would%20work%3A%3C%2FP%3E%3CP%3EInvite%20B2B%20user%3C%2FP%3E%3CP%3ECreate%20DISABLED%20AD%20Account%20on%20local%20ADDS%20with%20the%20UPN%20of%20the%20invited%20B2B%20user%20(Automation%20via%20SCIM%20Provisioning)%3C%2FP%3E%3CP%3EUse%20AAD%20App%20Proxy%20to%20provide%20on-premises%20application%20to%20B2B%20user%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-324406%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-324406%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F65883%22%20target%3D%22_blank%22%3E%40Mark%20Wahl%3C%2FA%3E%26nbsp%3BI%20started%20configuring%20the%20new%20B2B%20shadow%20accounts%2C%20but%20it%20seams%20that%20the%20Application%20Proxy%20ignores%20the%20%22Delegated%20Login%20Identity%22%20configuration.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20results%20in%20the%20fact%20that%20my%20on-prem%20application%20server%20receives%20the%20cloud%20UPN%20(the%20one%20with%20%23EXT%23)%20instead%20of%20the%20configured%20sAMAccountName%20in%20the%20on-prem%20AD%20and%20respondes%20with%20a%20401%20since%20the%20user%20is%20not%20found%2Fmatched.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20assumed%20that%20the%20on-prem%20connector%20fetched%20the%20sAMAccountName%20form%20the%20on-prem%20AD%2C%20but%20it%20looks%20like%20it's%20using%20the%26nbsp%3BonPremisesSamAccountName%20in%20Azure%20AD%20for%20this%20assignment%20(which%20is%20not%20available%20for%20B2B%20users%20and%20read-only%20via%20the%20Graph%20API).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAny%20suggestion%20for%20the%20issue%20I'm%20facing%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegards%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENick%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-285963%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-285963%22%20slang%3D%22en-US%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fb2b%2Fhybrid-cloud-to-on-premises%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fb2b%2Fhybrid-cloud-to-on-premises%3C%2FA%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-196547%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-196547%22%20slang%3D%22en-US%22%3E%3CP%3EHas%20there%20been%20any%20progress%20on%20the%20documentation%20or%20is%20any%20guidance%20available.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-166675%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-166675%22%20slang%3D%22en-US%22%3E%3CP%3EI%20Tested%20this%20in%20my%20lab%20today%20and%20made%20things%20work%20for%20guest%20access%20to%20on%20premises%20applications%20via%20Integrated%20authentication%20as%20well%20as%20federated%20authentication%20by%20creating%20a%20shadow%20user%20in%20the%20on-premises%20directory.%3C%2FP%3E%0A%3CP%3EHowever%2C%20the%20UPN%20passed%26nbsp%3Bback%20to%20my%20on-premises%20applications%20seems%20to%20differ%20in%20each%20case.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFederated%20Authentication%26nbsp%3Bseems%20to%20be%26nbsp%3Bpassing%20my%20original%20UPN%3A%3C%2FP%3E%0A%3CP%3Eguest.user%40guestdirectory.com%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3Ewhile%20Application%20Proxy%20is%20passing%20my%20guest%20UPN%20from%20the%20test%20tenant%3A%3C%2FP%3E%0A%3CP%3Eguest.user_guestdirectory.com%23EXT%23%40mydirectory.com%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20for%20now%2C%20I%20ended%20up%20having%20two%20different%20Accounts%20in%20my%20on-premises%20directory.%20I%20thought%20about%20using%20a%20different%20attribute%2C%20but%26nbsp%3Bapplication%20proxy%20only%20gives%20me%20a%20limited%20choice%20and%20I%20think%20UPN%20is%20still%20the%20most%20convenient%20pick.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAny%20Ideas%20on%20how%20to%20overcome%20this%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-142542%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-142542%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Mark%2C%20any%20updates%20on%20the%20documentation%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-137785%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-137785%22%20slang%3D%22en-US%22%3E%3CP%3EAny%20updates%20from%20Mark%20Wahl%20on%20the%20document%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-130830%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-130830%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Mark%2C%20just%20wondering%20if%20and%20where%20I%20can%20find%20the%20update%20documentation%20about%20this%20topic.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%20in%20advance%2C%3C%2FP%3E%0A%3CP%3ERonny%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-95962%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-95962%22%20slang%3D%22en-US%22%3E%3CBLOCKQUOTE%3E%3CHR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F65883%22%20target%3D%22_blank%22%3E%40Mark%20Wahl%3C%2FA%3E%20wrote%3A%3CBR%20%2F%3E%3CP%3EIt%20is%20correct%20that%20the%20user%20does%20not%20need%20to%20authenticate%20themselves%20to%20the%20AD%20DS%20domains.%26nbsp%3B%20However%20the%20documentation%20on%20the%20combination%20of%20AD%20user%20account%20attributes%20that%20will%20be%20supported%20with%20Azure%20AD%20App%20Proxy%20for%20Windows%20integrated%20auth%20applications%20will%20need%20to%20be%20updated%20for%20the%20B2B%20guest%20scenario.%26nbsp%3B%20(Typically%20for%20employees%20accessing%20on-premises%20apps%2C%20the%20users%20have%20been%20enabled%20on-premises%20as%20well%20as%20in%20Azure%20AD%2C%20so%20this%20issue%20has%20not%20yet%20showed%20up%20--%20until%20now%20when%20we%20have%20guests).%26nbsp%3B%20We'll%20need%20the%20Azure%20AD%20app%20proxy%26nbsp%3Bfor%20guest%20scenario%20validation%20to%20be%20completed%20so%20we%20can%20ensure%20the%20combination%20of%20attributes%20work%20together%2C%20since%20KCD%20scenarios%20are%20often%20difficult%20to%20get%20working%20on%20first%20try%20particularly%20for%20multi-domain%2Fmulti-forest%20scenarios.%26nbsp%3B%20Feel%20free%20to%20reach%20out%20to%20Sarat%20or%20I%20offline%20via%20email%20if%20you%20wish%20to%20discuss%20further.%26nbsp%3B%20Thanks%2C%20Mark%26nbsp%3B%3C%2FP%3E%3CHR%20%2F%3E%3C%2FBLOCKQUOTE%3E%3CP%3EMark%2C%20do%20you%20know%20if%20the%20guide%20has%20now%20been%20published%3F%20Our%20set%20up%20is%20SharePoint%26nbsp%3Band%20Web%20Servers%20deployed%20on%20Windows%26nbsp%3BIIS%20all%26nbsp%3Bdeployed%20in%20an%20Azure%20IaaS%20environment.%20These%20servers%20are%20joined%20to%20the%20Azure%20%26nbsp%3BAD%20DS%20Domain.%20The%20application%20is%20published%20using%20Application%20Proxy%2C%20with%20IWA%20and%20Azure%20AD.%20However%2C%20we%20cannot%20seem%20to%20get%20external%20users%20to%20authorize%20on%20the%20backend%20application.%20For%20consumer%20identity%20we%20get%20MFA%20and%20then%20get%20forbidden%20and%20autorization%20errors%2C%20for%20external%20organisation%20users%2C%20the%20collaboration%20invitation%20does%20not%20get%20delivered%20to%20the%20recipient.%20I%26nbsp%3B%20created%20the%20external%20users%26nbsp%3Bin%20the%20Azure%20AD%20DS%20environment%20and%20modified%20the%20UPN%20to%20reflect%20the%20invited%20external%20users%20-%26nbsp%3B%20However%20no%20joy.%20Internal%20users%20however%20works.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECan%20you%20confirm%20if%20this%20is%20a%20supported%20configuration%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-95961%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-95961%22%20slang%3D%22en-US%22%3E%3CBLOCKQUOTE%3E%3CHR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F65883%22%20target%3D%22_blank%22%3E%40Mark%20Wahl%3C%2FA%3E%20wrote%3A%3CBR%20%2F%3E%3CP%3EIt%20is%20correct%20that%20the%20user%20does%20not%20need%20to%20authenticate%20themselves%20to%20the%20AD%20DS%20domains.%26nbsp%3B%20However%20the%20documentation%20on%20the%20combination%20of%20AD%20user%20account%20attributes%20that%20will%20be%20supported%20with%20Azure%20AD%20App%20Proxy%20for%20Windows%20integrated%20auth%20applications%20will%20need%20to%20be%20updated%20for%20the%20B2B%20guest%20scenario.%26nbsp%3B%20(Typically%20for%20employees%20accessing%20on-premises%20apps%2C%20the%20users%20have%20been%20enabled%20on-premises%20as%20well%20as%20in%20Azure%20AD%2C%20so%20this%20issue%20has%20not%20yet%20showed%20up%20--%20until%20now%20when%20we%20have%20guests).%26nbsp%3B%20We'll%20need%20the%20Azure%20AD%20app%20proxy%26nbsp%3Bfor%20guest%20scenario%20validation%20to%20be%20completed%20so%20we%20can%20ensure%20the%20combination%20of%20attributes%20work%20together%2C%20since%20KCD%20scenarios%20are%20often%20difficult%20to%20get%20working%20on%20first%20try%20particularly%20for%20multi-domain%2Fmulti-forest%20scenarios.%26nbsp%3B%20Feel%20free%20to%20reach%20out%20to%20Sarat%20or%20I%20offline%20via%20email%20if%20you%20wish%20to%20discuss%20further.%26nbsp%3B%20Thanks%2C%20Mark%26nbsp%3B%3C%2FP%3E%3CHR%20%2F%3E%3C%2FBLOCKQUOTE%3E%3CP%3EMark%2C%20do%20you%20know%20if%20the%20guide%20has%20now%20been%20published%3F%20Our%20set%20up%20is%20SharePoint%26nbsp%3Band%20Web%20Servers%20deployed%20on%20Windows%26nbsp%3BIIS%20all%26nbsp%3Bdeployed%20in%20an%20Azure%20IaaS%20environment.%20These%20servers%20are%20joined%20to%20the%20Azure%20%26nbsp%3BAD%20DS%20Domain.%20The%20application%20is%20published%20using%20Application%20Proxy%2C%20with%20IWA%20and%20Azure%20AD.%20However%2C%20we%20cannot%20seem%20to%20get%20external%20users%20to%20authorize%20on%20the%20backend%20application.%20For%20consumer%20identity%20we%20get%20MFA%20and%20then%20get%20forbidden%20and%20autorization%20errors%2C%20for%20external%20organisation%20users%2C%20the%20collaboration%20invitation%20does%20not%20get%20delivered%20to%20the%20recipient.%20I%26nbsp%3B%20created%20the%20external%20users%26nbsp%3Bin%20the%20Azure%20AD%20DS%20environment%20and%20modified%20the%20UPN%20to%20reflect%20the%20invited%20external%20users%20-%26nbsp%3B%20However%20no%20joy.%20Internal%20users%20however%20works.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECan%20you%20confirm%20if%20this%20is%20a%20supported%20configuration%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-85331%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-85331%22%20slang%3D%22en-US%22%3E%3CP%3EPerfect%2C%20will%20reach%20out%20to%20you%20if%20we%20get%20into%20detail%20any%20time%20soon.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-85320%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-85320%22%20slang%3D%22en-US%22%3E%3CP%3EIt%20is%20correct%20that%20the%20user%20does%20not%20need%20to%20authenticate%20themselves%20to%20the%20AD%20DS%20domains.%26nbsp%3B%20However%20the%20documentation%20on%20the%20combination%20of%20AD%20user%20account%20attributes%20that%20will%20be%20supported%20with%20Azure%20AD%20App%20Proxy%20for%20Windows%20integrated%20auth%20applications%20will%20need%20to%20be%20updated%20for%20the%20B2B%20guest%20scenario.%26nbsp%3B%20(Typically%20for%20employees%20accessing%20on-premises%20apps%2C%20the%20users%20have%20been%20enabled%20on-premises%20as%20well%20as%20in%20Azure%20AD%2C%20so%20this%20issue%20has%20not%20yet%20showed%20up%20--%20until%20now%20when%20we%20have%20guests).%26nbsp%3B%20We'll%20need%20the%20Azure%20AD%20app%20proxy%26nbsp%3Bfor%20guest%20scenario%20validation%20to%20be%20completed%20so%20we%20can%20ensure%20the%20combination%20of%20attributes%20work%20together%2C%20since%20KCD%20scenarios%20are%20often%20difficult%20to%20get%20working%20on%20first%20try%20particularly%20for%20multi-domain%2Fmulti-forest%20scenarios.%26nbsp%3B%20Feel%20free%20to%20reach%20out%20to%20Sarat%20or%20I%20offline%20via%20email%20if%20you%20wish%20to%20discuss%20further.%26nbsp%3B%20Thanks%2C%20Mark%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-85298%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-85298%22%20slang%3D%22en-US%22%3EAnd%20for%20the%20app%20proxy%20to%20use%20KCD%20for%20impersonation%20the%20account%20could%20be%20disabled%20or%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-85296%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-85296%22%20slang%3D%22en-US%22%3EHi%20Mark%2C%3CBR%20%2F%3Ecreate%20to%20hear%20this%20%3A)%3C%2Fimg%3E%3CBR%20%2F%3EThats%20exactly%20what%20we%20are%20looking%20for.%20We%20(Oxford%20Computer%20Group%20Germany)%20just%20started%20working%20on%20a%20SCIM%20client%20to%20get%20some%20automation%20into%20this%20for%20our%20customers.%3CBR%20%2F%3E%3CBR%20%2F%3ELooking%20forward%20to%20see%20it%20on%20docs!%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-85288%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-85288%22%20slang%3D%22en-US%22%3EOn-premises%20application%20based%20on%20windows%20authentication%3CBR%20%2F%3EAAD%20App%20Proxy%20configured%20AAD%20as%20Preauth%20method%3CBR%20%2F%3EInternal%20Auth%20confiured%20as%20Integrated%20Windows%20Auth.%3CBR%20%2F%3E%3CBR%20%2F%3EThis%20would%20allow%20to%20provide%20a%20internal%20%22legacy%22%20app%20to%20a%20B2B%20user%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-85273%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-85273%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%20I%20assume%20you%20are%20looking%20to%20use%20the%20app%20proxy%20for%20organizations%20with%20on-premises%20apps%20which%20are%20using%20Windows%20authentication.%26nbsp%3B%20We%20are%20currently%20working%20on%20the%20documentation%20for%20this%20scenario%20which%20should%20be%20posted%20to%20docs.microsoft.com%20shortly.%20%26nbsp%3B%20In%20principle%2C%20creating%20an%20account%20in%20a%20AD%20domain%20corresponding%20to%20a%20user%20in%20Azure%20AD%2C%20including%20a%20guest%20user%2C%20would%20enable%20the%20app%20proxy%20to%20match%20the%20user%20coming%20in%20from%20Azure%20AD%20and%20use%20KCD%20for%20impersonation%20and%20permit%20that%20user%20to%20then%20access%20Windows%20integrated%20authentication%2C%20however%20there%20are%20a%20number%20of%20account%20lifecycle%20subtleties%20here.%26nbsp%3B%20So%20even%20if%20you%20see%20the%20app%20proxy%20is%20able%20to%20permit%20the%20communication%20flow%2C%20I'd%20suggest%20waiting%20for%20the%20documentation%20as%20there%20are%20a%20number%20of%20deloyment%20considerations%20and%20best%20practices%20to%20look%20at%20(e.g.%2C%20what%20container%20to%20put%20the%20users%20in%2C%20when%20to%20deprovision%20the%20user%20from%20AD%2C%20how%20to%20avoid%20RID%20exhaustion%20and%20end%20user%20confusion%20about%20%22All%20authenticated%20users%22%20etc)%26nbsp%3B%20Feel%20free%20to%20reach%20out%20to%20us%20if%20you%20have%20additional%20questions.%26nbsp%3B%20Thanks%2C%20Mark%20%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-85256%22%20slang%3D%22en-US%22%3ERe%3A%20AAD%20Application%20Proxy%20and%20B2B%20Users%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-85256%22%20slang%3D%22en-US%22%3EDo%20you%20then%20mean%20that%20the%20Azure%20AD%20App%20Proxy%20App%20should%20use%20Windows%20Authentication%3F%3C%2FLINGO-BODY%3E
Alexander Filipin
Occasional Contributor

Just want a confirmation the following would work:

Invite B2B user

Create DISABLED AD Account on local ADDS with the UPN of the invited B2B user (Automation via SCIM Provisioning)

Use AAD App Proxy to provide on-premises application to B2B user

16 Replies
Highlighted
Do you then mean that the Azure AD App Proxy App should use Windows Authentication?
Solution

Hi, I assume you are looking to use the app proxy for organizations with on-premises apps which are using Windows authentication.  We are currently working on the documentation for this scenario which should be posted to docs.microsoft.com shortly.   In principle, creating an account in a AD domain corresponding to a user in Azure AD, including a guest user, would enable the app proxy to match the user coming in from Azure AD and use KCD for impersonation and permit that user to then access Windows integrated authentication, however there are a number of account lifecycle subtleties here.  So even if you see the app proxy is able to permit the communication flow, I'd suggest waiting for the documentation as there are a number of deloyment considerations and best practices to look at (e.g., what container to put the users in, when to deprovision the user from AD, how to avoid RID exhaustion and end user confusion about "All authenticated users" etc)  Feel free to reach out to us if you have additional questions.  Thanks, Mark  

On-premises application based on windows authentication
AAD App Proxy configured AAD as Preauth method
Internal Auth confiured as Integrated Windows Auth.

This would allow to provide a internal "legacy" app to a B2B user
Hi Mark,
create to hear this :)
Thats exactly what we are looking for. We (Oxford Computer Group Germany) just started working on a SCIM client to get some automation into this for our customers.

Looking forward to see it on docs!
And for the app proxy to use KCD for impersonation the account could be disabled or?

It is correct that the user does not need to authenticate themselves to the AD DS domains.  However the documentation on the combination of AD user account attributes that will be supported with Azure AD App Proxy for Windows integrated auth applications will need to be updated for the B2B guest scenario.  (Typically for employees accessing on-premises apps, the users have been enabled on-premises as well as in Azure AD, so this issue has not yet showed up -- until now when we have guests).  We'll need the Azure AD app proxy for guest scenario validation to be completed so we can ensure the combination of attributes work together, since KCD scenarios are often difficult to get working on first try particularly for multi-domain/multi-forest scenarios.  Feel free to reach out to Sarat or I offline via email if you wish to discuss further.  Thanks, Mark 

Perfect, will reach out to you if we get into detail any time soon.


@Mark Wahl wrote:

It is correct that the user does not need to authenticate themselves to the AD DS domains.  However the documentation on the combination of AD user account attributes that will be supported with Azure AD App Proxy for Windows integrated auth applications will need to be updated for the B2B guest scenario.  (Typically for employees accessing on-premises apps, the users have been enabled on-premises as well as in Azure AD, so this issue has not yet showed up -- until now when we have guests).  We'll need the Azure AD app proxy for guest scenario validation to be completed so we can ensure the combination of attributes work together, since KCD scenarios are often difficult to get working on first try particularly for multi-domain/multi-forest scenarios.  Feel free to reach out to Sarat or I offline via email if you wish to discuss further.  Thanks, Mark 


Mark, do you know if the guide has now been published? Our set up is SharePoint and Web Servers deployed on Windows IIS all deployed in an Azure IaaS environment. These servers are joined to the Azure  AD DS Domain. The application is published using Application Proxy, with IWA and Azure AD. However, we cannot seem to get external users to authorize on the backend application. For consumer identity we get MFA and then get forbidden and autorization errors, for external organisation users, the collaboration invitation does not get delivered to the recipient. I  created the external users in the Azure AD DS environment and modified the UPN to reflect the invited external users -  However no joy. Internal users however works.

 

Can you confirm if this is a supported configuration?


@Mark Wahl wrote:

It is correct that the user does not need to authenticate themselves to the AD DS domains.  However the documentation on the combination of AD user account attributes that will be supported with Azure AD App Proxy for Windows integrated auth applications will need to be updated for the B2B guest scenario.  (Typically for employees accessing on-premises apps, the users have been enabled on-premises as well as in Azure AD, so this issue has not yet showed up -- until now when we have guests).  We'll need the Azure AD app proxy for guest scenario validation to be completed so we can ensure the combination of attributes work together, since KCD scenarios are often difficult to get working on first try particularly for multi-domain/multi-forest scenarios.  Feel free to reach out to Sarat or I offline via email if you wish to discuss further.  Thanks, Mark 


Mark, do you know if the guide has now been published? Our set up is SharePoint and Web Servers deployed on Windows IIS all deployed in an Azure IaaS environment. These servers are joined to the Azure  AD DS Domain. The application is published using Application Proxy, with IWA and Azure AD. However, we cannot seem to get external users to authorize on the backend application. For consumer identity we get MFA and then get forbidden and autorization errors, for external organisation users, the collaboration invitation does not get delivered to the recipient. I  created the external users in the Azure AD DS environment and modified the UPN to reflect the invited external users -  However no joy. Internal users however works.

 

Can you confirm if this is a supported configuration?

 

Thanks.

Hi Mark, just wondering if and where I can find the update documentation about this topic.

 

Thanks in advance,

Ronny 

Any updates from Mark Wahl on the document?

 

Hi Mark, any updates on the documentation?

I Tested this in my lab today and made things work for guest access to on premises applications via Integrated authentication as well as federated authentication by creating a shadow user in the on-premises directory.

However, the UPN passed back to my on-premises applications seems to differ in each case.

 

Federated Authentication seems to be passing my original UPN:

guest.user@guestdirectory.com

 

while Application Proxy is passing my guest UPN from the test tenant:

guest.user_guestdirectory.com#EXT#@mydirectory.com

 

So for now, I ended up having two different Accounts in my on-premises directory. I thought about using a different attribute, but application proxy only gives me a limited choice and I think UPN is still the most convenient pick.

 

Any Ideas on how to overcome this? 

Has there been any progress on the documentation or is any guidance available.

@Mark Wahl I started configuring the new B2B shadow accounts, but it seams that the Application Proxy ignores the "Delegated Login Identity" configuration.

 

This results in the fact that my on-prem application server receives the cloud UPN (the one with #EXT#) instead of the configured sAMAccountName in the on-prem AD and respondes with a 401 since the user is not found/matched.

 

I assumed that the on-prem connector fetched the sAMAccountName form the on-prem AD, but it looks like it's using the onPremisesSamAccountName in Azure AD for this assignment (which is not available for B2B users and read-only via the Graph API).

 

Any suggestion for the issue I'm facing?

 

Regards,

 

Nick