Automate Seamless SSO Kerberos decryption key rollover AZUREADSSOACC
Currently to automate the Kerberos SSO decryption key rollover for AZUREADSSOACC , we would need to store domain admin and tenant global admin credentials in a script or scheduled task.
This is obviously not ideal. We currently having to perform the rollover task manually each month.
Please look at how this process could be improved for automation.
Thanks for your interest on this feature. This capability is still in the pipeline. The initial estimate was obviously off and we are looking at a new timeline. We are aware of the benefit of having this rollover made automatic and the interest you have on the feature, and that’s how we are looking at it while prioritizing it against other capabilities requests.
Thanks for your patience!
Principal Program Manager
Björn Bengtsson commented
Please prioritize this!
Gregory Mund commented
WOW, almost a year and a half and no update on this? C'mon Man!! This should have been automated out of the gate, not an afterthought. If you aren't going to actually work on this maybe you should change the status from Started to Stalled.
Neut, Erik van der commented
Found a post leading to this, hoping it was a better solution than community powershell scripts, but no.... Voted
Brenton Crosby commented
Would like to see some action on this, as long as the Azure AD Connect client is auto-updating this feature should be able to be rolled out to everyone who has that in place.
[Deleted User] commented
Is there any progress on this one? :) Still waiting
Joar Borgli commented
Hello WE NEEDED THIS 2 years ago already soon 3!
What is happening with this? In mid 2018 it was going to be 4-6 months away.. can you please provide an update to advise why this is taking so long? It seems it should be a fairly simple functionality improvement that impacts most, if not all of your customers on Azure AD.
Any progress ?
How does it take year and a half since the last official response and still no progress on something that should have been implemented from the beginning of the feature announcement?
Any updates on this feature please?
This feature is badly needed. I am currently storing passwords using securestring and also using NTFS permissions and EFS encryption but I know that's not enough. I really like to have the kerberos decryption keys rotated automatically
Peter Hulstrøm commented
Patrick Alphonso commented
Any updates !?
Brad Martin commented
Is there any update on this? Manual rotation or scripting with passwords are not good solutions.
Kent Calero commented
come on microsoft!
Komoroske, Gina commented
Wow, Microsoft, this is over a year old. Your best practice document and now your security center flags overuse of global administrators. Why is this difficult to create a role w/out that level of access to roll this key over?
David van Boven commented
Any progress on this?
Hugo Gerryts commented
I would also like to see this process automated. Putting username and password in a script goes against all security best practises.
Stefan Redlin commented
Is there any update on this feature?
Please implement modern authentication (like login with certificate) to logon on AzureAD as soon as possible.