Wiki source code of ACMP Intune Connector

Last modified by Jannis Klein on 2024/08/13 08:28

Hide last authors
Sabrina V. 7.1 1 {{figureCaption}}
2 Intune-relevante Abfrageaktionen
3 {{/figureCaption}}
4
5 {{figureCaption}}
6 Eingabe des geheimen Clientschlüssels
7 {{/figureCaption}}
8
9 {{aagon.priorisierung}}
10 160
11 {{/aagon.priorisierung}}
12
Jannis Klein 1.1 13 {{aagon.floatingbox/}}
14
Sabrina V. 7.1 15 Microsoft Intune is a cloud-based solution that helps you manage your mobile devices. It allows you to remotely manage devices, secure access or even lock them down. With the ACMP Intune Connector, you can inventory the devices from Intune in ACMP and send the most important actions to the devices from ACMP.
Jannis Klein 1.1 16
Sabrina V. 7.1 17 = **Requirements for using the ACMP Intune Connector** =
Jannis Klein 1.1 18
Sabrina V. 7.1 19 To use the ACMP Intune Connector, the following requirements must be met:
Jannis Klein 1.1 20
Sabrina V. 7.1 21 * You need a user account with the appropriate permissions for Microsoft Azure Active Directory
22 * There must be a connection between AESB and ACMP. AESB must be available for this and the necessary details of the [[SICS connection>>doc:||anchor="H1.ACMPconsole:CheckSICSconnectioninACMP"]] must be stored in ACMP
23 * AESB must be at least version 1.8
24 * You need a working internet connection, as Intune is a cloud solution and requires a network connection to work.
25 * A running instance of Intune
Jannis Klein 1.1 26
Sabrina V. 7.1 27 = Preparations in Azure Active Directory =
Jannis Klein 1.1 28
Sabrina V. 7.1 29 To enable the ACMP Intune Connector to access the Intune API, you must first register an enterprise application in Azure Active Directory and grant the required permissions within those applications.
Jannis Klein 1.1 30
Sabrina V. 7.1 31 == Register the Enterprise Application ==
Jannis Klein 1.1 32
Sabrina V. 7.1 33 First, sign in to the [[Azure AD (Active Directory)>>https://aad.portal.azure.com/]] and navigate to Azure Active Directory in the Overview. Click the //Manage// > //Application// //Registrations// tab and create a new application registration.
Jannis Klein 1.1 34
35 {{figure}}
Sabrina V. 7.1 36 (% style="text-align:center" %)
37 [[image:65_Intune_App-Registrierung in der Azure AD.png]]
Jannis Klein 1.1 38
39 {{figureCaption}}
Sabrina V. 7.1 40 App registrations in the Azure AD
Jannis Klein 1.1 41 {{/figureCaption}}
42 {{/figure}}
43
Sabrina V. 7.1 44 Enter all the necessary information: Enter a name for the application and select the accounts to support. Finish the process by clicking //Register//.
Jannis Klein 1.1 45
46 {{figure}}
Sabrina V. 7.1 47 (% style="text-align:center" %)
48 [[image:65_Intune_Anwendung registrieren.png]]
Jannis Klein 1.1 49
50 {{figureCaption}}
Sabrina V. 7.1 51 Register application
Jannis Klein 1.1 52 {{/figureCaption}}
53 {{/figure}}
54
Sabrina V. 7.1 55 If you now open the created application, you will see a summary of the information added. This includes the display name, the various IDs (application, object and directory ID) and details of the account types supported.
Jannis Klein 1.1 56
57 {{figure}}
Sabrina V. 7.1 58 (% style="text-align:center" %)
59 [[image:65_Intune_Zusammenfassung der Anwendungsinformationen.png||alt="65_Intune_Anwendung registrieren.png"]]
Jannis Klein 1.1 60
61 {{figureCaption}}
Sabrina V. 7.1 62 Summary of the application information
Jannis Klein 1.1 63 {{/figureCaption}}
64 {{/figure}}
65
Sabrina V. 7.1 66 == Distribute permissions ==
Jannis Klein 1.1 67
Sabrina V. 7.1 68 The next step is to assign the necessary permissions to the business application to access the Graph API. To do this, go to the Permissions section within the registered application (//Manage// > //API// //Permissions//).
Jannis Klein 1.1 69
70 {{figure}}
Sabrina V. 7.1 71 (% style="text-align:center" %)
72 [[image:65_Intune_API Berechtigungen.png]]
Jannis Klein 1.1 73
74 {{figureCaption}}
Sabrina V. 7.1 75 API permissions
Jannis Klein 1.1 76 {{/figureCaption}}
77 {{/figure}}
78
Sabrina V. 7.1 79 There, click //Add Permission//. This will bring up a page where you can request the API permissions. In this step you need to select the //Microsoft Graph//.
Jannis Klein 1.1 80
81 {{figure}}
Sabrina V. 7.1 82 (% style="text-align:center" %)
83 [[image:65_Intune_Microsoft Graph anfordern.png]]
Jannis Klein 1.1 84
85 {{figureCaption}}
Sabrina V. 7.1 86 API permissions: Request Microsoft Graph
Jannis Klein 1.1 87 {{/figureCaption}}
88 {{/figure}}
89
Sabrina V. 7.1 90 A distinction is made between "Delegated Permissions" and "Application Permissions". Enter the following values individually under 'Delegated permissions' and repeat the process by entering each of the following list entries:
Jannis Klein 1.1 91
92 * DeviceManagementManagedDevices.Read.All
93 * DeviceManagementManagedDevices.ReadWrite.All
94 * User.Read
95
96 {{figure}}
Sabrina V. 7.1 97 (% style="text-align:center" %)
98 [[image:65_Intune_Delegierte Berechtigungen verteilen.png]]
Jannis Klein 1.1 99
100 {{figureCaption}}
Sabrina V. 7.1 101 Distribute delegated permissions
Jannis Klein 1.1 102 {{/figureCaption}}
103 {{/figure}}
104
Sabrina V. 7.1 105 Tick the appropriate items, scroll back to the top, click the //Application Permissions// field and add the following permissions:
Jannis Klein 1.1 106
107 * DeviceManagementApps.Read.All
108 * DeviceManagementConfiguration.Read.All
109 * DeviceManagementManagedDevices.PrivilegedOperations.All
110 * DeviceManagementManagedDevices.Read.All
111 * DeviceManagementManagedDevices.ReadWrite.All
112 * DeviceManagementServiceConfig.Read.All
113 * User.Read.All
114
Sabrina V. 7.1 115 When you have selected all the permissions, click //Add Permissions//. You will see the entries in the overview.
Jannis Klein 1.1 116
117 {{figure}}
Sabrina V. 7.1 118 (% style="text-align:center" %)
119 [[image:65_Intune_Verteilte Berechtigungen (ohne Einwilligung).png]]
Jannis Klein 1.1 120
121 {{figureCaption}}
Sabrina V. 7.1 122 Deployed permissions (without consent)
Jannis Klein 1.1 123 {{/figureCaption}}
124 {{/figure}}
125
Sabrina V. 7.1 126 If you have not already done so, you may need to give your consent to the permissions. To do this, click on the //Grant administrator// //consent for// //"%Your Company%//" field. This will change the status and the user permission will be granted.
Jannis Klein 1.1 127
128 {{figure}}
Sabrina V. 7.1 129 (% style="text-align:center" %)
130 [[image:65_Intune_Bewilligte Berechtigungen.png]]
Jannis Klein 1.1 131
132 {{figureCaption}}
Sabrina V. 7.1 133 Authorised permissions
Jannis Klein 1.1 134 {{/figureCaption}}
135 {{/figure}}
136
Sabrina V. 7.1 137 == Upload client secret key or certificates ==
Jannis Klein 1.1 138
Sabrina V. 7.1 139 Later, during the initial setup of the ACMP Intune Connector, you have to specify an authentication type in the AESB console. You can choose from two methods supported by the Microsoft Client Credentials Provider: //Certificate// or //Client Secret Key//.
Jannis Klein 1.1 140
141 {{aagon.infobox}}
Sabrina V. 7.1 142 The procedure differs depending on the authentication type selected. Read below to find out what you need to consider for each method.
Jannis Klein 1.1 143 {{/aagon.infobox}}
144
Sabrina V. 7.1 145 === Upload certificate ===
Jannis Klein 1.1 146
147 {{aagon.infobox}}
Sabrina V. 7.1 148 Due to the higher level of security, Microsoft recommends that you use a certificate as your credential.
Jannis Klein 1.1 149 {{/aagon.infobox}}
150
Sabrina V. 7.1 151 Certificates can be used as an authentication method to log in to Azure Active Directory in the AESB console. A certificate always consists of a public and private part, where the public key is loaded directly into Azure AD. The private part is used in the AESB console. This certificate pair needs to be generated beforehand. Read how to generate a certificate via [[Microsoft>>url:https://learn.microsoft.com/en-us/azure/app-service/configure-ssl-certificate?tabs=apex%2Cportal]] or[[ Open SSL>>url:https://stackoverflow.com/questions/6307886/how-to-create-pfx-file-from-certificate-and-private-key]].
Jannis Klein 1.1 152
Sabrina V. 7.1 153 Navigate to //Certificates & Secrets// in the previously registered application. In the details, click on the //Certificates// tab and upload the previously created certificate.
Jannis Klein 1.1 154
155 {{figure}}
Sabrina V. 7.1 156 (% style="text-align:center" %)
157 [[image:65_Intune_Zertifikat hochladen.png]]
Jannis Klein 1.1 158
159 {{figureCaption}}
Sabrina V. 7.1 160 Upload certificate
Jannis Klein 1.1 161 {{/figureCaption}}
162 {{/figure}}
163
Sabrina V. 7.1 164 A field will open on the right hand side where you can upload the certificate. Browse to the appropriate directory, upload the file and enter an optional description for the certificate. Then click Add and the certificate will be saved for the application.
Jannis Klein 1.1 165
166 {{aagon.infobox}}
Sabrina V. 7.1 167 Please note that only .cer, .pem and .crt file types are supported when uploading a certificate.
Jannis Klein 1.1 168 {{/aagon.infobox}}
169
170 {{figure}}
Sabrina V. 7.1 171 (% style="text-align:center" %)
172 [[image:65_Intune_Hochgeladenes Zertifikat in der Azure Active Directory.png]]
Jannis Klein 1.1 173
174 {{figureCaption}}
Sabrina V. 7.1 175 Uploaded certificate in the Azure Active Directory
Jannis Klein 1.1 176 {{/figureCaption}}
177 {{/figure}}
178
Sabrina V. 7.1 179 === Adding a secret client key ===
Jannis Klein 1.1 180
Sabrina V. 7.1 181 The secret client key is a string of characters used by the enterprise application as an authentication key or proof of identity when requesting the token. To do this, go to the Permissions area within the registered application (//Security// > //Permissions//) and click the Application Registration link. Navigate to //Certificates// & //Secrets//. In the details, click the //Secret Client Keys// tab and create a new key.
Jannis Klein 1.1 182
183 {{figure}}
Sabrina V. 7.1 184 (% style="text-align:center" %)
185 [[image:65_Intune_Neuen Clientschlüssel hinterlegen.png]]
Jannis Klein 1.1 186
187 {{figureCaption}}
Sabrina V. 7.1 188 Store new client key
Jannis Klein 1.1 189 {{/figureCaption}}
190 {{/figure}}
191
Sabrina V. 7.1 192 When creating a new secret client key, you can configure the validity period. Note that once the validity period has expired, a new key must be created and stored in the AESB.
Jannis Klein 1.1 193
194 {{figure}}
Sabrina V. 7.1 195 (% style="text-align:center" %)
196 [[image:65_Intune_Geheimen Clientschlüssel hinterlegen.png]]
Jannis Klein 1.1 197
198 {{figureCaption}}
Sabrina V. 7.1 199 Adding a secret client key
Jannis Klein 1.1 200 {{/figureCaption}}
201 {{/figure}}
202
203 {{aagon.infobox}}
Sabrina V. 7.1 204 You will need the secret client key you created when you set up the AESB. Keep this in mind for future reference.
Jannis Klein 1.1 205 {{/aagon.infobox}}
206
Sabrina V. 7.1 207 = Configuration in AESB and ACMP =
Jannis Klein 1.1 208
Sabrina V. 7.1 209 Before you can use Intune in ACMP, you need to do some preliminary work in the ACMP and AESB consoles.
Jannis Klein 1.1 210
Sabrina V. 7.1 211 == 1. **ACMP console: Check SICS connection in ACMP** ==
Jannis Klein 1.1 212
Sabrina V. 7.1 213 It is necessary that you have a working SICS connection in ACMP. To do this, go to //System// > //Settings// > //ACMP Server// > //SICS Connection//. First tick the box to enable the connection. Then enter the host and port, as well as the user name and password for the operator. You specified the corresponding operator during the installation of the AESB, which you must also specify here. Specify whether to attempt an unencrypted connection if SSL/TLS fails. Then test the connection.
Jannis Klein 1.1 214
Sabrina V. 7.1 215 Also tick the Public API access rights box to grant access. You can now save your settings. ACMP and SICS are now connected to each other.
Jannis Klein 1.1 216
217 {{figure}}
Sabrina V. 7.1 218 (% style="text-align:center" %)
219 [[image:65_Intune_SICS-Verbindung_575.png||alt="65_ACMP_Einstellungen_SICS Verbindung.png"]]
Jannis Klein 1.1 220
221 {{figureCaption}}
Sabrina V. 7.1 222 Set up SICS connection in ACMP
Jannis Klein 1.1 223 {{/figureCaption}}
224 {{/figure}}
225
Sabrina V. 7.1 226 == 2. AESB console: **Install and configure the Intune Connector** ==
Jannis Klein 1.1 227
Sabrina V. 7.1 228 Now go to the AESB console. From the Dashboard, navigate to the //Products// menu item. In the overview you will find a list of all packages available for installation or updates. Select //ACMP Intune Adapter// and click //Install// either in the quick selection bar or directly in the fields. A new window will open and the installation will begin.
Jannis Klein 1.1 229
230 {{figure}}
Sabrina V. 7.1 231 (% style="text-align:center" %)
232 [[image:65_AESB_Übersicht des ACMP Intune Adapters in der AESB Console.png]]
Jannis Klein 1.1 233
234 {{figureCaption}}
Sabrina V. 7.1 235 Overview of the ACMP Intune Adapter in the AESB Console
Jannis Klein 1.1 236 {{/figureCaption}}
237 {{/figure}}
238
Sabrina V. 7.1 239 The first step tells you what you need to have already done to successfully install the Intune Adapter: You need a configured and working Microsoft Intune instance and a working ACMP SICS connection. In the second step of the installation wizard, you have the option to assign a template name at the top of the pages.
Jannis Klein 1.1 240
Sabrina V. 7.1 241 Under //Intune Connector Configuration//, you can set basic settings for the Intune Connector. Under ACMP Server ID, you need to specify the server to which the changes will be sent. If you enter an asterisk, the changes will be sent to all ACMP servers that have a SICS connection and whose connection information is identical to the information you entered in step //[[1. ACMP console: Check SICS connection in ACMP>>doc:||anchor="H1.ACMPconsole:CheckSICSconnectioninACMP"]]//. You can also specify the name of the workflow instance under which the settings are to be sent. You can do this under //Ondemand definition name//.
Jannis Klein 1.1 242
Sabrina V. 7.1 243 In the //Intune Configuration// menu item, you can now use one of the two login methods: the secret client key or a certificate.
Jannis Klein 1.1 244
Sabrina V. 7.1 245 === Option 1: Certificate authentication method: ===
Jannis Klein 1.1 246
247 {{aagon.infobox}}
Sabrina V. 7.1 248 Microsoft recommends the certificate authentication method.
Jannis Klein 1.1 249 {{/aagon.infobox}}
250
Sabrina V. 7.1 251 Configuring Intune with a certificate is very similar to the //secret client key// authentication method. You only need to upload the certificate and enter its password.
Jannis Klein 1.1 252
Sabrina V. 7.1 253 Select //Certificate// as the authentication type. Enter the certificate to be used in the Certificate field. Only .pfx files can be uploaded. Then enter the certificate password, if available. Also enter the Application ID (Client) (the ID is used to identify the user to Intune) and the Directory ID (Tenant) (it runs under the tenant) in the fields provided. Both strings can be found in the general information of the previously registered business application on the Azure AD pages.
Jannis Klein 1.1 254
255 {{figure}}
Sabrina V. 7.1 256 (% style="text-align:center" %)
257 [[image:65_Eingabe der Anwendungs- und Verzeichnis-ID.png]]
Jannis Klein 1.1 258
259 {{figureCaption}}
Sabrina V. 7.1 260 Enter the application and directory ID
Jannis Klein 1.1 261 {{/figureCaption}}
262 {{/figure}}
263
264 {{figure}}
Sabrina V. 7.1 265 (% style="text-align:center" %)
266 [[image:65_AESB_Hochladen des Zertifikats.png]]
Jannis Klein 1.1 267
268 {{figureCaption}}
Sabrina V. 7.1 269 Uploading the certificate
Jannis Klein 1.1 270 {{/figureCaption}}
271 {{/figure}}
272
Sabrina V. 7.1 273 === Option 2: **Secret client key authentication method:** ===
Jannis Klein 1.1 274
Sabrina V. 7.1 275 Select //secret client key// as the authentication type. Under //secret client key//, enter the value that you generated as the secret key on the [[Azure Active Directory pages>>doc:||anchor="HUploadclientsecretkeyorcertificates"]].
Jannis Klein 1.1 276
277 {{aagon.infobox}}
Sabrina V. 7.1 278 Please note that the value is displayed in abbreviated form. This means that it will have a different character length when entered in the AESB console.
Jannis Klein 1.1 279 {{/aagon.infobox}}
280
281 {{figure}}
Sabrina V. 7.1 282 (% style="text-align:center" %)
283 [[image:65_Eingabe des geheimen Clientschlüssels.png||height="234" width="1000"]]
Jannis Klein 1.1 284
285 {{figureCaption}}
Sabrina V. 7.1 286 Enter the secret client key
Jannis Klein 1.1 287 {{/figureCaption}}
288 {{/figure}}
289
Sabrina V. 7.1 290 Also enter the Application ID (Client) (the ID is used to identify the user to Intune) and the Directory ID (Tenant) (under which the Tenant runs) in the fields provided. Both strings can be found in the general information of the previously registered Enterprise Application (Azure AD).
Jannis Klein 1.1 291
292 {{figure}}
Sabrina V. 7.1 293 (% style="text-align:center" %)
294 [[image:65_Eingabe der Anwendungs- und Verzeichnis-ID.png]]
Jannis Klein 1.1 295
296 {{figureCaption}}
Sabrina V. 7.1 297 Enter the application and directory ID
Jannis Klein 1.1 298 {{/figureCaption}}
299 {{/figure}}
300
301 {{figure}}
Sabrina V. 7.1 302 (% style="text-align:center" %)
303 [[image:65_AESB_Eingabe der Informationen zum geheimen Clientschlüssel.png]]
Jannis Klein 1.1 304
305 {{figureCaption}}
Sabrina V. 7.1 306 Enter the info for the secret client key
Jannis Klein 1.1 307 {{/figureCaption}}
308 {{/figure}}
309
Sabrina V. 7.1 310 Click //Verify Connection//. If the connection is successful, you will be taken to the //scanner configuration//, where you can optionally set time intervals for the scanner. If you do not want to make any changes, click //Next//.
Jannis Klein 1.1 311
Sabrina V. 7.1 312 The Intune adapter installation will begin in the background. When the installation is complete and all items have been successfully installed, you can click //Finish//. You will be returned to the AESB Console Overview page. There are several places in the AESB Console where you can check that the installation was successful and that all the required applications are available:
Jannis Klein 1.1 313
Sabrina V. 7.1 314 |**Navigation point**|**Description**
315 |Microservices|Below the Supervisors & microservice instances, you will see the entries //IntuneConnector_1 //and //IntuneWorkflowEngine_1//.
316 |Workflows|Within the Workflow engines & instances section, the entries //IntuneWorkflowEngine_1 //and //IntuneMobileDevices_1 //must be listed.
Jannis Klein 1.1 317
318 {{aagon.infobox}}
Sabrina V. 7.1 319 You can also install the Intune Connector more than once. This allows you to use both the secret client key and the certificate as the authentication type. A dual installation is useful, for example, if you are using multiple ACMP servers and want the data to flow to them. Multiple installations will increment the microservices and workflow entries. In this case, you would have, for example, //IntuneWorkflowEngine_1//,// IntuneWorkflowEngine_2, and IntuneMobileDevices_1 and IntuneMobileDevices_2//.
Jannis Klein 1.1 320 {{/aagon.infobox}}
321
Sabrina V. 7.1 322 = How to use Intune in ACMP =
Jannis Klein 1.1 323
Sabrina V. 7.1 324 Once you have set up the ACMP Intune Connector, devices are imported from Intune into ACMP. You can use this data in queries and reports, for example. You can also send some actions to the devices through ACMP.
Jannis Klein 1.1 325
Sabrina V. 7.1 326 == Query Actions ==
Jannis Klein 1.1 327
Sabrina V. 7.1 328 Navigate to //Client Management// > //Query Management//. Open a query that contains the required Clients.
Jannis Klein 1.1 329
Sabrina V. 7.1 330 In the query result set you will see the inventoried Client types (e.g. Clients of type Android, iOS or Windows). Select the Clients on which you want to perform an Intune action.
331
Jannis Klein 1.1 332 {{figure}}
Sabrina V. 7.1 333 (% style="text-align:center" %)
334 [[image:65_Abfrageaktionen_Intune relevante Abfrageaktionen.png]]
Jannis Klein 1.1 335
336 {{figureCaption}}
Sabrina V. 7.1 337 Intune-relevant Query Actions
Jannis Klein 1.1 338 {{/figureCaption}}
339 {{/figure}}
340
Sabrina V. 7.1 341 You can choose between the following actions:
Jannis Klein 1.1 342
343 {{aagon.infobox}}
Sabrina V. 7.1 344 Note that any subsequent actions (sending notifications,retire devices, etc.) that you want to send or perform on the endpoint via Intune may be delayed. The status of the job will be shown as //Finished// in the Job Monitor as the action has been executed by ACMP and successfully passed to Intune.
Jannis Klein 1.1 345 {{/aagon.infobox}}
346
Sabrina V. 7.1 347 |**Query Actions**|(% style="width:1141px" %)**Description**
348 |Send Intune notification|(% style="width:1141px" %)You can use this action to send Intune notifications to the [[Company Portal app>>https://apps.microsoft.com/store/detail/unternehmensportal/9WZDNCRFJ3PZ?hl=de-de&gl=de]] on the selected devices. The messages may also appear on lock screens or in the Android apps. Make sure you only share information that is not too sensitive if you want to send notifications about it.
349 \\Enter both a title and body text, then click //Execution//.
350 |Retire Intune devices|(% style="width:1141px" %)This action deletes the Intune-specific settings on the selected devices. It also removes the //Company Portal app// and deletes the selected devices from Intune Management.
351 |Wipe Intune devices|(% style="width:1141px" %)If you want to reset an Intune device to its factory settings, choose this action. This will also delete the device from Intune Management. You must select the checkbox for this step and confirm the confirmation prompt before you can perform the action.
352 |Remotely lock Intune devices|(% style="width:1141px" %)If you want to lock Intune devices remotely, you can do so from the Action. This requires the user to correctly enter their chosen security mechanism (PIN, password, facial recognition, etc.) on the endpoint to unlock the device.
353 |Synchronize Intune devices|(% style="width:1141px" %)This action causes selected Intune devices to send their inventory data to Intune. This allows you to keep devices up to date with the latest information.
Jannis Klein 1.1 354
355 == Client Details ==
356
Sabrina V. 7.1 357 If you want to view information about an Intune device, you can get all the relevant data from the Client Details. To do this, navigate to the required client in a query and double-click to open the details.
Jannis Klein 1.1 358
Sabrina V. 7.1 359 Under the //Mobile Device Management// > //Mobile Device// menu, you can find all the information about the stored mobile device. If you want to perform an Intune related action on the selected Client, you can use the options in the [[quick selection bar>>https://apps.microsoft.com/store/detail/unternehmensportal/9WZDNCRFJ3PZ?hl=de-de&gl=de]].
360
Jannis Klein 1.1 361 {{aagon.infobox}}
Sabrina V. 7.1 362 There are fields for all the information stored here, which you can use in queries, filters and reports, for example.
Jannis Klein 1.1 363 {{/aagon.infobox}}
364
365 {{figure}}
Sabrina V. 7.1 366 (% style="text-align:center" %)
367 [[image:65_Abfrageaktion_Ansicht der Intune Client Details.png]]
Jannis Klein 1.1 368
369 {{figureCaption}}
Sabrina V. 7.1 370 View of the Intune Client details
Jannis Klein 1.1 371 {{/figureCaption}}
372 {{/figure}}
© Aagon GmbH 2025
Besuchen Sie unsere neue Aagon-Community