Blog Post

Core Infrastructure and Security Blog
6 MIN READ

How to Retrieve an Azure AD Bulk Token with PowerShell

Christian Kielhorn's avatar
Nov 09, 2021

 

Hi, my Name is Christian Kielhorn, and I’m a Senior Customer Engineer – formerly known as Premier Field Engineer – within Germanys Customer Success Organization for Modern Work.

 

Today I’d like to come back to a customer’s question – as the customer asked me how to join a Windows 10 (or Windows 11) Client automatically to AzureAD – as like as we did before with the Domain Join. 

Well, honestly, I thought – cool, only 5 minutes to go, but it wasn’t. It isn’t like doing a Domain Join with Username and Password – it is more or less using a so-called bulk enrollment token (BPRT). 

 

My fellow Colleague GenerAhl wrote an article - Bulk join a Windows device to Azure AD and Microsoft Endpoint Manager using a provisioning package - Microsoft Tech Community – and decided to work with the Windows Configuration Designer (I copied and modified also the current state part). 

 

There is only one thing – the user you are enrolling with this it is the same user you are logged in ot registered within the Azure AD Login Page from WCD (first time) – and not even a service user as many companies would like to.

 

And rather than doing stuff like logoff / logon or disconnect and delete the WCD WebApp registration within AzureAD or something like this I was on my way to find an alternative – something with PowerShell and found something in 3rd Party PowerShell Module named AADInternals.

 

We can also use PowerShell natively, yes, and it does need only some more PowerShell Cmdlets, how to create the appropriate Rest methods, but doing it as easy as possible- I decided to use the AADInternals (for a more detailed view – have a look into the PRT.ps1 of AADInternals).

 

At this point I have to say that we as Microsoft cannot guarantee the consistency of 3rd Party Scripts we are referring to, it is an approach for today and we will not take over any kind of responsibility using this 3rd Party Modules.

 

If you do have some questions regarding the module itself, kindly ask the developer or have a look into the source code (yes, it is available under: GitHub – Gerenios/AADInternals: AADInternals PowerShell module for administering Azure AD and Office 365) 

 

Current state: 

CONTOSO.COM has hundreds of Kiosk Devices within the company’s lobbies or Microsoft Teams Rooms devices in their Meeting rooms running Windows 10. These machines are not Active Directory joined today and the IT Pro decided: they should not. 

 

Desired state: 

All these devices should be joined to Azure Active Directory and enrolled into Intune. 

 

Process:

The goal is to Azure AD join these machines and enroll them into Intune using a provisioning package. The IT Pro tasked with the job has read through the Microsoft Docs article Bulk enrollment for Windows devices but doesn’t like the requirement to rename the device as all devices are already conforming to the established naming standard.  

Automatic MDM enrollment  to Intune is enabled for all Azure AD joined machines. If this is not the configuration you use in your tenant you would simply end up with an Azure AD joined device, without Intune management after applying the provisioning package. There is nothing in the provisioning package itself that will address the MDM enrollment, it’s all automatically taken care of by Azure AD. 

 

Prerequisites  

Start an administrative PowerShell and change the execution policy (for this moment / process only) to install the AAD Internals PowerShell Module:

Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process
Install-Module AADInternals
Import-Module AADInternals

 

 

The module is now ready and after typing in:

Get-AADIntAccessTokenForAADGraph -SaveToCache

 

An authentication window appears and as requested you should login with your service account name and it's appropriate password: 

 

 

After typing in the password to its page, we do have a result:

 

Let's check the cache:

Get-AADIntCache

 

Confused about the Client ID? The Client Application does the trick – AADInternals uses the ClientID “1b730954-1685-4b74-9bfd-dac224a7b894” and asks either for authentication or uses the cached token.

In addition there are well-known client application IDs, and a small spreadsheet with some selected examples – copied from my tenant, but you can review and compare it with your own Enterprise Application Tab: Enterprise applications - Microsoft Azure

Client App

Client ID

Resource

MS Graph API

1b730954-1685-4b74-9bfd-dac224a7b894

graph_api

MS Exchange Remote PowerShell

a0c73c16-a7e3-4564-9a95-2bdf47383716

exo

Exchange Online

00000002-0000-0ff1-ce00-000000000000

o365exo

SharePoint Online

00000003-0000-0ff1-ce00-000000000000

o365spo

MS Teams

1fec8e78-bce4-4aaf-ab1b-5451cc387264

teams

Microsoft Support and Recovery Assistant (SARA)

d3590ed6-52b3-4102-aeff-aad2292ab01c

sara

OneDrive Sync Engine

ab9b8c07-8f02-4f72-87fa-80105867a763

onedrive

Windows Configuration Designer (WCD)

de0853a1-ab20-47bd-990b-71ad5077ac7b

 

Skype for Business online

00000004-0000-0ff1-ce00-000000000000

 

Microsoft Intune

0000000a-0000-0000-c000-000000000000

 

 

As far as you can see, Intune is also an Enterprise Application within Azure as well as the Windows Configuration Designer from ADK (where Anders connected through for his blog post to get his Token).

 

Successfully and tested - so let's start over with a token and the resource identifier: 

Get-AADIntAccessTokenForAADGraph -Resource urn:ms-drs:enterpriseregistration.windows.net -SaveToCache

You will be asked for username and password - and the result should look like:

 

Once we want to acquire a Bulk Enrollment Token, we must type in: 

$bprt = New-AADIntBulkPRTToken -Name "svc_dem@CONTOSO.COM"

 

The Token has an expiration time from now to 180 days – which is also the maximum, so every 180 days you should rework this package. 

If you do want to have a shorter date, maybe from now to 90 days, it can be realized with: 

$bprt = New-AADIntBulkPRTToken -Name "svc_dem@CONTOSO.COM" -Expires ((get-date).AddDays(90).date)

 

Once it was successfully fired, we will get a result as like as: 

 

Open that .json file, and it will look like: 

Copy the content from refresh_token without double quotes to your clipboard – now we are ready to proceed with the Windows Configuration Designer and it’s provisioning package.  
And yes, we can do it using PowerShell as well: 

(get-content .\package_387bc075-0f58-40cd-b32c-a268951d67cb-BPRT.json | ConvertFrom-json).refresh_token 

 

Okay, now we retrieved the refresh token and now?
We will create a provisioning package using the Windows Configuration Designer:  

From the advanced view select the category Accounts / Azure 

 

The copied refresh token needs to be pasted in from the clipboard to the BPRT field: 

 

Anders created from scratch using the Wizard, and there were two options inside we should set to because in my lab I had some errors joining the device to AzureAD automatically were as I forgot to set these settings: 

 

Once it is the HideOobe Option to TRUE and AllowAllTrustedApps to TRUE as well. That’s it. (Disabling Cortana is only for testing purposes for me) 

 

Now export it via the menu as a provisioning package (for testing purposes as uncrypted package only) and implement it to your deployment process like MDT: 

  • First, copy the content of the export to your deployment share – for the first attempts I selected my deploymentshare/script directory (which will be referred as %scriptroot% within MDT Deployment) and created an subdir named “PPKG” 
  • Add a “Run Command line” Step with the command:
     DISM.exe /Image=%OSDISK% /Add-ProvisioningPackage /PackagePath:%SCRIPTROOT%\PPKG\mtr02aad.ppkg

 

After a successful deployment the device joined itself to Azure using my token and assigned the ownership to my SVC_DEM Account (which is a normal user account with the special Device Enrollment Manager Role) – it enrolls also in Intune successfully: 

 

Afterall, I put it into my favorite PowerShell App Deployment Toolkit (my personal recommended wrapping tool to get applications usable for MDT, SCCM and Intune as well) and created an application to be deployed within my MDT.  

 

Within the deploy-application.ps1 I am using the following command: 

Install-ProvisioningPackage -PackagePath "$dirfiles\mtr02aad.ppkg" -ForceInstall -QuietInstall -Verbose

 

And for uninstallation purposes: 

Uninstall-ProvisioningPackage -PackageId ((Get-ProvisioningPackage | where {$_.packagename -eq "mtr02aad"}).PackageID.GUID) 

 

Now I have an application I am able to distribute within my choice of deployment tools and ready to go. 

 

And the Result: 

 

 

 

 

 

Happy bulk deploying :smile:

Disclaimer
The sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages.
 

 

Updated Nov 10, 2021
Version 3.0
No CommentsBe the first to comment