Homepage

AADInternals.com

The ultimate Azure AD / Microsoft 365 hacking and admin toolkit

  • AAD KILL CHAIN
  • DOCUMENTATION
  • LINKS
  • OSINT
  • TALKS
  • TOOLS

Authentication

Deep-dive to Azure AD Pass-Through Authentication

Deep-dive to Azure AD Pass-Through Authentication

March 30, 2020

In my earlier blog, I explained how Azure AD identity federation works under-the-hood. In this post, I’ll be doing the same with Azure AD pass-through authentication (PTA).

Recent Posts

  • Elevation of Privilege from Local Admin to gMSA
  • Bypassing Azure AD home tenant MFA and CA
  • Exploiting Azure AD PTA vulnerabilities: Creating backdoor and harvesting credentials
  • Hunt for the gMSA secrets
  • AADInternals World Tour August 2022: USA

Categories

  • Article
  • Blog

Social

Twitter
LinkedIn
nestori.syynimaa@gmail.com

Tags

aadconnect (2) aadinternals (10) abusing (1) active-directory (1) adfs (5) admin (3) administration (1) authentication (1) azure (19) azure-active-directory (26) azuread (6) backdoor (1) blackhat (2) blue-team (1) bprt (2) browser (1) bypass (1) compromise (1) conditional-access (1) conferences (1) cross-tenant (1) defcon (1) desktop-sso (1) device (2) dns (3) elevation-of-privilege (1) email (2) encryption (1) exchange (1) federation (2) forensics (1) gdpr (1) global-administrator (1) gmsa (2) graph (1) groups (1) guest (2) hybrid-join (2) identity (2) inactive (1) insider (1) intune (1) join (2) logs (1) mailbox (1) mdm (1) mfa (7) microsoft365 (2) msa (2) office-365 (9) office365 (9) on-prem (2) onedrive (1) outsider (2) partner (2) password (1) persistence (1) phishing (2) planner (1) powershell (12) prt (5) pta (2) recon (2) reconnaissance (4) seamless-sso (1) security (30) service (1) sso (2) sync (1) synchronisation (1) t2 (1) talks (1) teams (3) tools (2) user (1) virtual-machine (1) windows (1)