That seems like hard work compared to using the powershell cmdlets. If you had 
an ongoing integration that needed to do it, sure. Hit the REST api for a 
one-off? Hmm.

(googles ‘bulk create users in azure active directory’)
https://blogs.msdn.microsoft.com/charles_sterling/2015/06/29/creating-users-in-an-azure-ad-in-bulk/
 

From: Greg Low (罗格雷格博士)
Sent: Wednesday, 21 June 2017 4:44 PM
To: ozDotNet
Subject: Re: Azure Active Directory

Hi Greg

You make a call to get a token, then call the graph api to create users. 
https://msdn.microsoft.com/library/azure/ad/graph/api/users-operations#CreateUser


Regards,

Greg

Dr Greg Low
1300SQLSQL (1300 775 775) office | +61 419201410 mobile│ +61 3 8676 4913 fax
SQL Down Under | Web: www.sqldownunder.com

From: ozdotnet-boun...@ozdotnet.com <ozdotnet-boun...@ozdotnet.com> on behalf 
of Greg Keogh <gfke...@gmail.com>
Sent: Wednesday, June 21, 2017 5:12:25 PM
To: ozDotNet
Subject: Re: Azure Active Directory 
 
Chaps, I spent almost four hours this afternoon attempting to write some 
managed code that authenticated a user/password against Azure AD from a native 
app. I know you're not supposed to handle credentials like that, but it was an 
experiment for migration of the old database. I read hundreds of confusing and 
conflicting articles on the subject and they generally say it's possible, but I 
failed despite heroic and obtuse efforts. I presume it just doesn't work the 
way I think and I'm using the frameworks incorrectly. To be honest, I'm not 
even sure I had the AD environment setup correctly, so I might have been doubly 
wasting my time.

Now I'm wondering how I would migrate hundreds of users from the legacy 
database into Azure AD. Anyone done that?

GK

On 21 June 2017 at 12:19, Greg Low (罗格雷格博士) <g...@greglow.com> wrote:
AAD is a wonderful tool really. Keep in mind that it has a couple of flavours, 
B2C (business to consumer) being the latest.
 
I’ve got clients who moved to it and simply love it. One is a car manufacturer 
who used to have to manage domains for dealers, etc. They used to spend their 
life with password and access issues. Now they just use 2 factor auth and 
cloud-based password reset, etc. and that’s all pretty much disappeared.
 
It’s also worth thinking about the fact that AAD is what anyone using Office 
365 will already be using anyway. And it can then be the directory for a big 
range of other things – Microsoft stuff like Power BI, Flow, Office 365, etc. 
but also others like DropBox, ZenDesk, etc, etc, etc.
 
Regards,
 
Greg
 
Dr Greg Low
 
1300SQLSQL (1300 775 775) office | +61 419201410 mobile│ +61 3 8676 4913 fax
SQL Down Under | Web: www.sqldownunder.com |http://greglow.me
 
From: ozdotnet-boun...@ozdotnet.com [mailto:ozdotnet-boun...@ozdotnet.com] On 
Behalf Of Greg Keogh
Sent: Wednesday, 21 June 2017 10:45 AM
To: ozDotNet <ozdotnet@ozdotnet.com>
Subject: Re: Azure Active Directory
 
Yooiks! I'm not quite sure what I want (which is a worry). WAAD vs AADDS
 
You say WAAD is more light-weight, which probably suits us, I think.
 
Overall, as a coder, I want to put all authentication and permission/roles 
information for all of our apps and users in a single place where it can be 
maintained by admin staff, and it's easy to query from .NET code.
 
Am I wrong to regard WAAD as some sort of "magic" database to where I can stuff 
all our vintage data? Perhaps I'm thinking like a reductionist and expecting a 
quick fix.
 
If all you need to do is put WAAD authentication in front of a web app, then 
this is a piece of piss. Just deploy your app into App Server or App Service 
Environment and then turn on Azure AD auth. The App Service intercepts requests 
and does the SAML login for you transparently. The logged on user gets 
presented back to the app in a cookie. 
 
This is a good clue. I'll look into the details of doing this.
 
GK


Reply via email to