Skip to content

Commit

Permalink
Merge pull request #396 from maester365/tnh-EidscaUpdatedDescription
Browse files Browse the repository at this point in the history
Added links and updated description on EIDSCA
  • Loading branch information
merill committed Jul 31, 2024
2 parents 889698c + ab20659 commit 8594692
Show file tree
Hide file tree
Showing 52 changed files with 33 additions and 75 deletions.
2 changes: 1 addition & 1 deletion build/eidsca/Update-EidscaTests.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -344,7 +344,7 @@ function UpdateTemplate($template, $control, $controlItem, $docName, $isDoc) {
if (-not [string]::IsNullOrWhiteSpace($controlItem.SkipCondition) ) {
$SkipCheck = "if ( $($controlItem.SkipCondition) ) {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason '$($controlItem.SkipReason)'
return " + '$null' + " `
return " + '$null' +"`
}"
$output = $output -replace '%SkipCheck%', "$($SkipCheck)"

Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAF01.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAF01 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('Fido2')" -ApiVersion beta

[string]$tenantValue = $result.state
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAF02.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAF02 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of FIDO2 security keys is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('Fido2')" -ApiVersion beta

[string]$tenantValue = $result.isSelfServiceRegistrationAllowed
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAF03.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAF03 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of FIDO2 security keys is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('Fido2')" -ApiVersion beta

[string]$tenantValue = $result.isAttestationEnforced
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAF04.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAF04 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of FIDO2 security keys is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('Fido2')" -ApiVersion beta

[string]$tenantValue = $result.keyRestrictions.isEnforced
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAF05.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAF05 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of FIDO2 security keys is not enabled and key restriction not enforced.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('Fido2')" -ApiVersion beta

[string]$tenantValue = $result.keyRestrictions.aaGuids -notcontains $null
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAF06.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAF06 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of FIDO2 security keys is not enabled and key restriction not enforced.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('Fido2')" -ApiVersion beta

[string]$tenantValue = $result.keyRestrictions.aaGuids -notcontains $null -and ($result.keyRestrictions.enforcementType -eq 'allow' -or $result.keyRestrictions.enforcementType -eq 'block')
Expand Down
2 changes: 1 addition & 1 deletion powershell/internal/eidsca/Test-MtEidscaAG01.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
The state of migration of the authentication methods policy from the legacy multifactor authentication and self-service password reset (SSPR) policies. In January 2024, the legacy multifactor authentication and self-service password reset policies will be deprecated and you'll manage all authentication methods here in the authentication methods policy. Use this control to manage your migration from the legacy policies to the new unified policy.

In January 2024, the legacy multifactor authentication and self-service password reset policies will be deprecated and you'll manage all authentication methods here in the authentication methods policy. Use this control to manage your migration from the legacy policies to the new unified policy.
On September 30th, 2025, the legacy multifactor authentication and self-service password reset policies will be deprecated and you'll manage all authentication methods here in the authentication methods policy. Use this control to manage your migration from the legacy policies to the new unified policy.

#### Test script
```
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAG01.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAG01 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy" -ApiVersion beta

[string]$tenantValue = $result.policyMigrationState
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAG02.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAG02 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy" -ApiVersion beta

[string]$tenantValue = $result.reportSuspiciousActivitySettings.state
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAG03.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAG03 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy" -ApiVersion beta

[string]$tenantValue = $result.reportSuspiciousActivitySettings.includeTarget.id
Expand Down
2 changes: 1 addition & 1 deletion powershell/internal/eidsca/Test-MtEidscaAM01.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy/authentica

- [Open in Graph Explorer](https://developer.microsoft.com/en-us/graph/graph-explorer?request=policies/authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')&method=GET&version=beta&GraphUrl=https://graph.microsoft.com)
- [microsoftAuthenticatorAuthenticationMethodConfiguration resource type - Microsoft Graph v1.0 | Microsoft Learn](https://learn.microsoft.com/en-us/graph/api/resources/microsoftauthenticatorauthenticationmethodconfiguration)

- [View in Microsoft Entra admin center](https://entra.microsoft.com/#view/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/~/AdminAuthMethods)

<!--- Results --->
%TestResult%
2 changes: 1 addition & 1 deletion powershell/internal/eidsca/Test-MtEidscaAM02.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy/authentica

- [Open in Graph Explorer](https://developer.microsoft.com/en-us/graph/graph-explorer?request=policies/authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')&method=GET&version=beta&GraphUrl=https://graph.microsoft.com)
- [microsoftAuthenticatorAuthenticationMethodConfiguration resource type - Microsoft Graph v1.0 | Microsoft Learn](https://learn.microsoft.com/en-us/graph/api/resources/microsoftauthenticatorauthenticationmethodconfiguration)

- [View in Microsoft Entra admin center](https://entra.microsoft.com/#view/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/~/AdminAuthMethods)

<!--- Results --->
%TestResult%
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAM02.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAM02 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of Microsoft Authenticator is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')" -ApiVersion beta

[string]$tenantValue = $result.state
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAM03.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAM03 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of Microsoft Authenticator is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')" -ApiVersion beta

[string]$tenantValue = $result.featureSettings.numberMatchingRequiredState.state
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAM04.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAM04 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of Microsoft Authenticator is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')" -ApiVersion beta

[string]$tenantValue = $result.featureSettings.numberMatchingRequiredState.includeTarget.id
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAM06.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAM06 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of Microsoft Authenticator is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')" -ApiVersion beta

[string]$tenantValue = $result.featureSettings.displayAppInformationRequiredState.state
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAM07.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAM07 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of Microsoft Authenticator is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')" -ApiVersion beta

[string]$tenantValue = $result.featureSettings.displayAppInformationRequiredState.includeTarget.id
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAM09.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAM09 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of Microsoft Authenticator is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')" -ApiVersion beta

[string]$tenantValue = $result.featureSettings.displayLocationInformationRequiredState.state
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAM10.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAM10 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of Microsoft Authenticator is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')" -ApiVersion beta

[string]$tenantValue = $result.featureSettings.displayLocationInformationRequiredState.includeTarget.id
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAP01.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAP01 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authorizationPolicy" -ApiVersion beta

[string]$tenantValue = $result.allowedToUseSSPR
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAP04.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAP04 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authorizationPolicy" -ApiVersion beta

[string]$tenantValue = $result.allowInvitesFrom
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAP05.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAP05 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authorizationPolicy" -ApiVersion beta

[string]$tenantValue = $result.allowedToSignUpEmailBasedSubscriptions
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAP06.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAP06 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authorizationPolicy" -ApiVersion beta

[string]$tenantValue = $result.allowEmailVerifiedUsersToJoinOrganization
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAP07.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAP07 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authorizationPolicy" -ApiVersion beta

[string]$tenantValue = $result.guestUserRoleId
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAP08.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAP08 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authorizationPolicy" -ApiVersion beta

[string]$tenantValue = $result.permissionGrantPolicyIdsAssignedToDefaultUserRole | Sort-Object -Descending | select-object -first 1
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAP09.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAP09 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authorizationPolicy" -ApiVersion beta

[string]$tenantValue = $result.allowUserConsentForRiskyApps
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAP10.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAP10 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authorizationPolicy" -ApiVersion beta

[string]$tenantValue = $result.defaultUserRolePermissions.allowedToCreateApps
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAP14.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAP14 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authorizationPolicy" -ApiVersion beta

[string]$tenantValue = $result.defaultUserRolePermissions.allowedToReadOtherUsers
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAT01.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAT01 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('TemporaryAccessPass')" -ApiVersion beta

[string]$tenantValue = $result.state
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaAT02.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaAT02 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Authentication method of Temporary Access Pass is not enabled.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('TemporaryAccessPass')" -ApiVersion beta

[string]$tenantValue = $result.isUsableOnce
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaAV01.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaAV01 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/authenticationMethodsPolicy/authenticationMethodConfigurations('Voice')" -ApiVersion beta

[string]$tenantValue = $result.state
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaCP01.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaCP01 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Settings value is not available. This may be due to the change that this API is no longer available for recent created tenants.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "settings" -ApiVersion beta

[string]$tenantValue = $result.values | where-object name -eq 'EnableGroupSpecificConsent' | select-object -expand value
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaCP03.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaCP03 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Settings value is not available. This may be due to the change that this API is no longer available for recent created tenants.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "settings" -ApiVersion beta

[string]$tenantValue = $result.values | where-object name -eq 'BlockUserConsentForRiskyApps' | select-object -expand value
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaCP04.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaCP04 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Settings value is not available. This may be due to the change that this API is no longer available for recent created tenants.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "settings" -ApiVersion beta

[string]$tenantValue = $result.values | where-object name -eq 'EnableAdminConsentRequests' | select-object -expand value
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaCR01.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaCR01 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "policies/adminConsentRequestPolicy" -ApiVersion beta

[string]$tenantValue = $result.isEnabled
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaCR02.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaCR02 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Admin Consent Workflow is not enabled'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/adminConsentRequestPolicy" -ApiVersion beta

[string]$tenantValue = $result.notifyReviewers
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaCR03.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaCR03 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Admin Consent Workflow is not enabled'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/adminConsentRequestPolicy" -ApiVersion beta

[string]$tenantValue = $result.notifyReviewers
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaCR04.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaCR04 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Admin Consent Workflow is not enabled'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "policies/adminConsentRequestPolicy" -ApiVersion beta

[string]$tenantValue = $result.requestDurationInDays
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaPR01.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaPR01 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Settings value is not available. This may be due to the change that this API is no longer available for recent created tenants.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "settings" -ApiVersion beta

[string]$tenantValue = $result.values | where-object name -eq 'BannedPasswordCheckOnPremisesMode' | select-object -expand value
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaPR02.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaPR02 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "settings" -ApiVersion beta

[string]$tenantValue = $result.values | where-object name -eq 'EnableBannedPasswordCheckOnPremises' | select-object -expand value
Expand Down
1 change: 0 additions & 1 deletion powershell/internal/eidsca/Test-MtEidscaPR03.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ function Test-MtEidscaPR03 {
Add-MtTestResultDetail -SkippedBecause 'Custom' -SkippedCustomReason 'Settings value is not available. This may be due to the change that this API is no longer available for recent created tenants.'
return $null
}

$result = Invoke-MtGraphRequest -RelativeUri "settings" -ApiVersion beta

[string]$tenantValue = $result.values | where-object name -eq 'EnableBannedPasswordCheck' | select-object -expand value
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaPR05.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaPR05 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "settings" -ApiVersion beta

[string]$tenantValue = $result.values | where-object name -eq 'LockoutDurationInSeconds' | select-object -expand value
Expand Down
3 changes: 1 addition & 2 deletions powershell/internal/eidsca/Test-MtEidscaPR06.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ function Test-MtEidscaPR06 {
[OutputType([bool])]
param()




$result = Invoke-MtGraphRequest -RelativeUri "settings" -ApiVersion beta

[string]$tenantValue = $result.values | where-object name -eq 'LockoutThreshold' | select-object -expand value
Expand Down
2 changes: 1 addition & 1 deletion powershell/internal/eidsca/Test-MtEidscaST08.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
Indicating whether or not a guest user can be an owner of groups
Indicating whether or not a guest user can be an owner of groups, manage

CISA SCuBA 2.18: Guest users SHOULD have limited access to Azure AD directory objects

Expand Down
Loading

0 comments on commit 8594692

Please sign in to comment.