Application Proxy

  • Application Proxy allows access to on-prem web applications after sign-in to Entra ID.

  • Application proxy has following components

    • Endpoint - This is the external URL that the users browse to access the on-prem application. External users must authenticate to AAD

    • Application Proxy Service - This services runs in the cloud and passes the token provided by Entra ID to the on-prem connector

    • Application Proxy Connector - This is an agent that runs on the on-prem infrastructure and acts as a communication agent between the cloud proxy service and on-prem application. It also communicates with the on-prem AD in case of SSO

    • On-prem application - The application that is exposed using application proxy

image.png
  • Compared to directly exposing an on-prem app, application proxy does provide additional security (authentication handled by Entra ID, Conditional Access etc.)

  • But, it does NOT help if the on-prem application has code or deployment related vulnerabilities.

  • We can enumerate the applications that has application proxy configured using the Azure AD module (may take a few minutes to complete).

. C:\\AzAD\\Tools\\Get-MgApplicationProxyApplication.ps1
  • Get the Service Principal (Enterprise Application)

Get-MgServicePrincipal -Filter "DisplayName -eq 'Finance Management System'"
  • Use Get-MgApplicationProxyAssignedUsersAndGroups.ps1 to find users and groups assigned to the application

. C:\\AzAD\\Tools\\Get-MgApplicationProxyAssignedUsersAndGroups.ps1
Get-ApplicationProxyAssignedUsersAndGroups -ObjectId ec350d24-e4e4-4033-ad3f-bf60395f0362

Last updated