在本地测试Azure Active Directory安全 [英] Testing Azure Active Directory security locally

查看:51
本文介绍了在本地测试Azure Active Directory安全的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我在启用了Azure Active Directory安全性(快速设置)的Azure上部署了一个Web应用程序.因此,当我尝试访问该应用程序时,我需要成为AD的一部分才能访问.

I have a web application deployed on Azure with the Azure Active Directory security enabled (the express setting). So, when I try to access the application, I need to be a part of the AD to have access.

我想向应用程序添加更多功能,例如显示当前登录的用户,实现注销,管理权限等...我相信我可以使用Azure Graph API来完成所有事情.

I would like to add more features to the application, like displaying the current user logged in, implement a logout, managing permissions etc... I believe I can achieve all of things with Azure Graph API.

但是,要做到这一点,我将需要在本地测试一些东西.有什么方法可以在本地模拟Azure AD?它已在Azure上打开",并且在那里一切正常,但是在我的本地计算机上没有任何模拟它的方法.

However, to do this, I will need to test some stuff locally. Is there any way to simulate Azure AD locally? It is "switched on" on Azure and everything works great there, but ain't got nothing to simulate this on my local machine.

推荐答案

没有可用的Azure AD的本地"或脱机"版本.

您目前的选择是:

  • 使用实际的Azure AD租户进行测试.您可以创建自己的测试租户,以允许您根据需要进行更改,从而将与公司Azure AD的管理员的工作推迟到准备好投入生产为止.

  • Test using an actual Azure AD tenant. You can create your own test tenant to allow you to make changes as necessary, postponing the need to work with the admin of your corporate Azure AD until you're ready to go to production.

创建自己的可实现OpenID Connect协议的Mock STS ,并在开发/测试期间使用该协议.这里的风险是,您必须确保此Mock STS的行为类似于Azure AD的行为,或者必须足够接近您的目的.

Create your own Mock STS that implements the OpenID Connect protocol and use that during development/testing. The risk here is that you'll have to make sure that this Mock STS behaves just like Azure AD does or close enough for your purposes.

作为旁注,您可以在 Azure AD反馈论坛中创建要求此功能的反馈条目

As a side note, you can create a feedback entry asking for a feature on this in the Azure AD Feedback Forum

这篇关于在本地测试Azure Active Directory安全的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆