uidNumber, gidNumber, etc.) across all users and groups without delegated access.
Credentials are stored in Himmelblau’s encrypted cache, protected by the machine key.
All cred subcommands must be run as root.
cred secret
Store a client secret for confidential client authentication.Open your app registration
In the Entra ID portal, go to Azure Active Directory → App registrations and open (or create) your application.
Create a client secret
Under Manage → Certificates & secrets, go to the Client secrets tab. Click New client secret, choose an expiry, and click Add.
Copy the secret value
Copy the Value (not the Secret ID) immediately. You will not be able to retrieve it again after navigating away.
Store the secret in Himmelblau
Run
aad-tool cred secret with the client ID and the secret value you copied:| Flag | Description |
|---|---|
--client-id | The Azure AD application (client) ID this secret is associated with. |
--domain | The tenant domain this secret is associated with (e.g. example.onmicrosoft.com). |
--secret | The client secret value copied from the Entra ID portal. |
--debug / -d | Enable verbose debug logging. |
cred cert
Generate an RSA 256 HSM-backed key pair and self-signed certificate for confidential client authentication. The private key is generated inside the TPM (or SoftHSM) and never leaves it.Open your app registration
In the Entra ID portal, go to Azure Active Directory → App registrations and open (or create) your application.
Generate the key pair and certificate
Run the command to generate the key and write the PEM certificate to a file:
Upload the certificate to Entra ID
Under Manage → Certificates & secrets, go to the Certificates tab. Click Upload certificate and select the PEM file written to
--cert-out. Azure stores this certificate for authenticating via public key.| Flag | Description |
|---|---|
--client-id | The Azure AD application (client) ID this certificate is associated with. |
--domain | The tenant domain this certificate is associated with. |
--valid-days | Number of days the self-signed certificate will be valid. |
--cert-out | Path to write the generated PEM certificate file. This is the file you upload to Entra ID. |
--debug / -d | Enable verbose debug logging. |
cred delete
Delete stored confidential client credentials from Himmelblau’s encrypted cache. If neither--secret nor --cert is specified, both are deleted.
| Flag | Description |
|---|---|
--domain | (Required) The tenant domain whose credentials will be deleted. |
--secret | Delete only the client secret, leaving any certificate in place. |
--cert | Delete only the client certificate, leaving any secret in place. |
--debug / -d | Enable verbose debug logging. |
cred list
Check Himmelblau’s encrypted cache for the presence of confidential client credentials for a given domain. Reports whether a client secret and/or client certificate exists.| Flag | Description |
|---|---|
--domain | (Required) The tenant domain to check. |
--debug / -d | Enable verbose debug logging. |
