11 votes1 comment · Azure Active Directory » Role-based Access Control · Flag idea as inappropriate… · Admin →Tobias Weisserth commented
I agree. The main issue with the devicelogin method is its interactive nature that rules out most use cases for SSH in the first place.
AAD gated jumpbox setups used for devops automation through Ansible and other tools require a friction-less, non-interactive workflow based on SSH public key authentication. The benefit of AAD in this scenario is tying the eligibility of logins to the existence of a valid AAD account with a saved key. If a user is terminated in AAD (because their employment ends or other reasons), the jumpbox requires no extra clean-up/management or configuration to clean up after local Linux users, their home directories and keys stored there.
In the current form, AAD Login in Linux is a gimmick. :(
Thank you for your feedback. We’re currently working on building support for the advanced features introduced in Python version 3.7 (e.g. enabling you to leverage data classes for triggers and bindings).
We plan to release this soon after the GA milestone.Tobias Weisserth shared this idea ·
valid suggestion subject to upvoteTobias Weisserth commented
If love to see Letsencrypt supported as well. Thanks!