-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Azure
- Azure
- Table of contents
- [Authentication](#Authentication)
- [Permissions](#Permissions)
- [Options](#Options)
- Authentication
- Supported Methods
- azure-cli
- Supported Methods
1. The easiest way to do it it with `az login`(for more authentication method,
you can refer to https://docs.microsoft.com/en-us/cli/azure/authenticate-azure-cli?view=azure-cli-latest) 3. Run Scout with the `--cli` flag
- User Credentials
- User Credentials via Browser
This authentication method is mostly useful for users which have MFA enabled.
- Service Principal
https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal)
2. Run Scout with the `--service-principal` flag. 3. Scout will prompt you for the required information
- File-Based Authentication
az ad sp create-for-rbac --sdk-auth > mycredentials.json
`--file-auth path/to/mycredentials.json`
- Managed Service Identity
https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/)
2. Run Scout with the `--msi` flag
- MFA
- Azure CLI
- Install the CLI: https://docs.microsoft.com/en-us/cli/azure/install-azure-cli?view=azure-cli-latest - Run `az login` to log the CLI into your account. This will open a web browser and let you log in - Run Scout with the Azure `--cli` option
- User Browser Login
- Run Scout with the Azure `--user-account-browser` option - Through a browser, pick your azure account
- Permissions
1. Create a user in the desired directory 2. Grant the given user the role of Global Reader in the directory 3. Add the user to the desired subscription, with both `Reader` and `Security Reader` roles
When using a ScoutSuite **V5** or below. Additionally, when running Scout with Service Principals, the following [Azure](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-graph-api) are required:
- `Directory.Read.All`
The following screenshot shows the required configuration: ![Service](https://user-images.githubusercontent.com/4206926/73562458-77bfe980-445b-11ea-9041-86b6c6bd71c3.jpg)
On version **V6**, since we use Microsoft Graph, when running Scout with Service Principals the following [Microsoft](https://docs.microsoft.com/en-us/graph/permissions-reference) are required:
- `Directory.Read.All` - `Policy.Read.All`
The following screenshot shows the required configuration: ![Screen](https://user-images.githubusercontent.com/23067852/115295831-30894b80-a128-11eb-83c8-66de42d2391b.png)
- Options
- Subscriptions
- Options
- For some modes of authentication (i.e. Service Principal, or user credentials via Browser, the tenant ID must be provided).
- The `--subscriptions` option can be used to scan a number of subscriptions in one execution.
- e.g. `--subscriptions 11111111-2222-3333-4444-555555555555 66666666-7777-8888-9999-000000000000`
- The `--all-subscriptions` option can be used to scan all the subscriptions to which the provided credentials have access.
- Home
- Getting Started
- Setup
- Compliance
- Configuration and Usage
- Docker
- [v6] Upgrade to v6-alpha
- Advanced Usage
- Understanding the Architecture
- How to Contribute
- FAQ