Skip to content

Instantly share code, notes, and snippets.

View watahani's full-sized avatar

WataruHaniyama watahani

View GitHub Profile
<ClaimsProvider>
<!-- The following Domain element allows this profile to be used if the request comes with domain_hint
query string parameter, e.g. domain_hint=facebook.com -->
<Domain>yahoo.co.jp</Domain>
<DisplayName>Yahoo! Japan</DisplayName>
<TechnicalProfiles>
<TechnicalProfile Id="Yahoo-OIDCv2">
<!-- The text in the following DisplayName element is shown to the user on the claims provider
selection screen. -->
<DisplayName>Yahoo!</DisplayName>

Azure Application Proxy ログ

事前認証: Azure Active Directory で実施

デバッグ ログ一覧

  • 24006
    • リクエスト受信 (通信開始)
    • Client request received. Transaction ID: '{5642affd-35e6-4ba5-947d-15511008f63a}'
  • 24007
-----BEGIN CERTIFICATE-----
MIIDsjCCApqgAwIBAgIQcLzFKr72oLNJOdc+nGG3ITANBgkqhkiG9w0BAQsFADBn
MSswKQYDVQQLDCJDcmVhdGVkIGJ5IGh0dHA6Ly93d3cuZmlkZGxlcjIuY29tMRUw
EwYDVQQKDAxET19OT1RfVFJVU1QxITAfBgNVBAMMGERPX05PVF9UUlVTVF9GaWRk
bGVyUm9vdDAeFw0xODA3MzAwNDAxMzFaFw0yMTEwMjgwNDAxMzFaMGcxKzApBgNV
BAsMIkNyZWF0ZWQgYnkgaHR0cDovL3d3dy5maWRkbGVyMi5jb20xFTATBgNVBAoM
DERPX05PVF9UUlVTVDEhMB8GA1UEAwwYRE9fTk9UX1RSVVNUX0ZpZGRsZXJSb290
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv2vsXCjwlWdjFYxffxJk
IdX9GJ12YBdXZyRayf7oRCFUGGEjmMrrb4t5MBwSDUkLxz/kvVO+jhN50mSKEUBG
1um4PYtzsLIThFCfrvRKRjUkgxpptPH8GukSxm60oi5VazWmzXsxnawKvL7QDZEP
param(
[Parameter(Mandatory = $false)]
[string]
$zoneName,
[Parameter(Mandatory = $false)]
[string]
$resourceGroupName,
[Parameter(Mandatory = $false)]

AAD Event Log

CTAP コマンドの送信は 210x 番台、生データが入ってんのは 110x 番台っぽい。

210x 番台のログで GetAssertion か MakeCredential を探して、そのあとの 110x 番台のログ見れば、中身が見える。

Make Credential

Request (make credential)

$mcMaxExport = 50000
$mcMaxImport = 50000
$mcStartTime = '2019/01/01 00:00'
$mcFiles = Get-ChildItem -Path $mcEvtPath | Where-Object { $_.name -clike '*.evtx' }
$SignInLogs = @()
$SignInEvents = @{ }
foreach ($mcFile in $mcFiles) {
$mc412s = Get-WinEvent -FilterHashtable @{Path = $mcfile.FullName; LogName = "AD FS Auditing"; Level = 0; StartTime = $mcStartTime; id = "412" } -MaxEvents $mcMaxExport -ErrorAction SilentlyContinue | Sort-Object -Property TimeCreated
@watahani
watahani / get-all-oauth-scopes.ps1
Last active January 14, 2020 00:17
Get All OAuth scopes and service principal
# Get all OAuth scopes
try {
$allAuth2PermissionsGrants = Get-AzureADOAuth2PermissionGrant -All $true
$allServicePrincipals = Get-AzureADServicePrincipal -All $true
$allUsers = Get-AzureADUser -All $true
$servicePrincipalScope = New-Object System.Collections.ArrayList
import * as express from "express";
import * as request from "request";
import * as crypto from "crypto"
import config from "./config"
const app = express();
const port = 3000;
const baseUri = "https://api.authlete.com/api/auth/"
const serviceId = config.serviceId
# use this script only for debug purpose.
param(
[Parameter(Position=0,Mandatory=$true)]
[string]
$NewCertThumbprint,
[Parameter(Position=1,Mandatory=$true)]
[string]
$CertFriendlyName,
We couldn’t find that file to show.