Skip to content

Commit 02a9454

Browse files
authored
Merge pull request #78 from KelvinTegelaar/master
[pull] master from KelvinTegelaar:master
2 parents 8c3bc6b + c89c54a commit 02a9454

File tree

317 files changed

+239221
-1948
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

317 files changed

+239221
-1948
lines changed

.github/workflows/upload_dev.yml

+36
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
name: Upload Dev zip
2+
3+
on:
4+
push:
5+
branches:
6+
- dev
7+
8+
jobs:
9+
release:
10+
if: github.event.repository.fork == false && github.event_name == 'push'
11+
name: Upload to Azure
12+
runs-on: ubuntu-latest
13+
14+
steps:
15+
# Checkout the repository
16+
- name: Checkout Code
17+
uses: actions/checkout@v3
18+
19+
# Create ZIP File in a New Source Directory
20+
- name: Prepare and Zip Release Files
21+
run: |
22+
mkdir -p src/releases
23+
zip -r src/releases/dev.zip . \
24+
--exclude "./src/releases/*" \
25+
--exclude ".*" \
26+
--exclude ".*/**"
27+
28+
# Upload to Azure Blob Storage
29+
- name: Azure Blob Upload with Destination folder defined
30+
uses: LanceMcCarthy/[email protected]
31+
with:
32+
connection_string: ${{ secrets.AZURE_CONNECTION_STRING }}
33+
container_name: cipp-api
34+
source_folder: src/releases/
35+
destination_folder: /
36+
delete_if_exists: true

Config/CyberEssentials.BPATemplate.json

+4-1
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,10 @@
9292
"isMFARegistered",
9393
"defaultMFAMethod"
9494
],
95-
"URL": "https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails"
95+
"URL": "https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails",
96+
"Parameters": {
97+
"asApp": "True"
98+
}
9699
}
97100
]
98101
}

Config/cipp-roles.json

+23
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
{
2+
"readonly": {
3+
"include": ["*.Read"],
4+
"exclude": ["CIPP.SuperAdmin.*"]
5+
},
6+
"editor": {
7+
"include": ["*.Read", "*.ReadWrite"],
8+
"exclude": [
9+
"CIPP.SuperAdmin.*",
10+
"CIPP.Admin.*",
11+
"CIPP.AppSettings.*",
12+
"Tenant.Standards.ReadWrite"
13+
]
14+
},
15+
"admin": {
16+
"include": ["*"],
17+
"exclude": ["CIPP.SuperAdmin.*"]
18+
},
19+
"superadmin": {
20+
"include": ["*"],
21+
"exclude": []
22+
}
23+
}

Config/schemaDefinitions.json

+16
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
[
2+
{
3+
"id": "cippUser",
4+
"description": "CIPP User Schema",
5+
"targetTypes": ["User"],
6+
"properties": [
7+
{ "name": "jitAdminEnabled", "type": "Boolean" },
8+
{ "name": "jitAdminExpiration", "type": "DateTime" },
9+
{ "name": "mailboxType", "type": "String" },
10+
{ "name": "archiveEnabled", "type": "Boolean" },
11+
{ "name": "autoExpandingArchiveEnabled", "type": "Boolean" },
12+
{ "name": "perUserMfaState", "type": "String" }
13+
],
14+
"status": "Available"
15+
}
16+
]

ConversionTable.csv

+222
Large diffs are not rendered by default.

Modules/CIPPCore/Public/Add-CIPPScheduledTask.ps1

+4-1
Original file line numberDiff line numberDiff line change
@@ -64,12 +64,15 @@ function Add-CIPPScheduledTask {
6464
if ([int64]$task.ScheduledTime -eq 0 -or [string]::IsNullOrEmpty($task.ScheduledTime)) {
6565
$task.ScheduledTime = [int64](([datetime]::UtcNow) - (Get-Date '1/1/1970')).TotalSeconds
6666
}
67-
67+
$excludedTenants = if ($task.excludedTenants.value) {
68+
$task.excludedTenants.value -join ','
69+
}
6870
$entity = @{
6971
PartitionKey = [string]'ScheduledTask'
7072
TaskState = [string]'Planned'
7173
RowKey = [string]$RowKey
7274
Tenant = $task.TenantFilter.value ? "$($task.TenantFilter.value)" : "$($task.TenantFilter)"
75+
excludedTenants = [string]$excludedTenants
7376
Name = [string]$task.Name
7477
Command = [string]$task.Command.value
7578
Parameters = [string]$Parameters
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
2+
function Get-CIPPAlertDefenderIncidents {
3+
<#
4+
.FUNCTIONALITY
5+
Entrypoint
6+
#>
7+
[CmdletBinding()]
8+
param(
9+
[Parameter(Mandatory = $false)]
10+
[Alias('input')]
11+
$InputValue,
12+
$TenantFilter
13+
)
14+
try {
15+
$AlertData = New-GraphGetRequest -uri "https://graph.microsoft.com/v1.0/security/incidents?`$top=50&`$filter=status eq 'active'" -tenantid $TenantFilter | ForEach-Object {
16+
"Incident ID $($_.id): Created at $($_.createdDateTime). Severity: $($_.severity). `nIncident name: $($_.displayName). Incident URL: $($_.incidentWebUrl)."
17+
}
18+
Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData
19+
20+
} catch {
21+
# Pretty sure this one is gonna be spammy cause of licensing issues, so it's commented out -Bobby
22+
# Write-AlertMessage -tenant $($TenantFilter) -message "Could not get Defender incident data for $($TenantFilter): $(Get-NormalizedError -message $_.Exception.message)"
23+
}
24+
}

Modules/CIPPCore/Public/Alerts/Get-CIPPAlertEntraLicenseUtilization.ps1

+2-2
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ function Get-CIPPAlertEntraLicenseUtilization {
1818
$Alerts = [System.Collections.Generic.List[string]]::new()
1919

2020
# Check P1 License utilization
21-
if ($LicenseData.entitledP1LicenseCount -gt 0) {
21+
if ($LicenseData.entitledP1LicenseCount -gt 0 -or $LicenseData.entitledP2LicenseCount -gt 0) {
2222
$P1Used = $LicenseData.p1FeatureUtilizations.conditionalAccess.userCount
23-
$P1Entitled = $LicenseData.entitledP1LicenseCount
23+
$P1Entitled = $LicenseData.entitledP1LicenseCount + $LicenseData.entitledP2LicenseCount
2424
$P1Usage = ($P1Used / $P1Entitled) * 100
2525
$P1Overage = $P1Used - $P1Entitled
2626

Modules/CIPPCore/Public/Alerts/Get-CIPPAlertMFAAdmins.ps1

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ function Get-CIPPAlertMFAAdmins {
1818
}
1919
}
2020
if (!$DuoActive) {
21-
$users = New-GraphGETRequest -uri "https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails?`$top=999&filter=IsAdmin eq true and isMfaRegistered eq false and userType eq 'member'&`$select=userPrincipalName,lastUpdatedDateTime,isMfaRegistered,IsAdmin" -tenantid $($TenantFilter) | Where-Object { $_.userDisplayName -ne 'On-Premises Directory Synchronization Service Account' }
21+
$users = New-GraphGETRequest -uri "https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails?`$top=999&filter=IsAdmin eq true and isMfaRegistered eq false and userType eq 'member'&`$select=userPrincipalName,lastUpdatedDateTime,isMfaRegistered,IsAdmin" -tenantid $($TenantFilter) -AsApp $true | Where-Object { $_.userDisplayName -ne 'On-Premises Directory Synchronization Service Account' }
2222
if ($users.UserPrincipalName) {
2323
$AlertData = "The following admins do not have MFA registered: $($users.UserPrincipalName -join ', ')"
2424
Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData

Modules/CIPPCore/Public/Alerts/Get-CIPPAlertMFAAlertUsers.ps1

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ function Get-CIPPAlertMFAAlertUsers {
1212
)
1313
try {
1414

15-
$users = New-GraphGETRequest -uri "https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails?`$top=999&filter=IsAdmin eq false and isMfaRegistered eq false and userType eq 'member'&`$select=userPrincipalName,lastUpdatedDateTime,isMfaRegistered,IsAdmin" -tenantid $($TenantFilter) | Where-Object { $_.userDisplayName -ne 'On-Premises Directory Synchronization Service Account' }
15+
$users = New-GraphGETRequest -uri "https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails?`$top=999&filter=IsAdmin eq false and isMfaRegistered eq false and userType eq 'member'&`$select=userPrincipalName,lastUpdatedDateTime,isMfaRegistered,IsAdmin" -tenantid $($TenantFilter) -AsApp $true | Where-Object { $_.userDisplayName -ne 'On-Premises Directory Synchronization Service Account' }
1616
if ($users.UserPrincipalName) {
1717
$AlertData = "The following $($users.Count) users do not have MFA registered: $($users.UserPrincipalName -join ', ')"
1818
Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData

Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNoCAConfig.ps1

+1-3
Original file line numberDiff line numberDiff line change
@@ -12,16 +12,14 @@ function Get-CIPPAlertNoCAConfig {
1212
)
1313

1414
try {
15-
$CAAvailable = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscribedSkus' -tenantid $TenantFilter -erroraction stop).serviceplans
15+
$CAAvailable = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscribedSkus' -tenantid $TenantFilter -ErrorAction Stop).serviceplans
1616
if ('AAD_PREMIUM' -in $CAAvailable.servicePlanName) {
1717
$CAPolicies = (New-GraphGetRequest -uri 'https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies' -tenantid $TenantFilter)
1818
if (!$CAPolicies.id) {
1919
$AlertData = 'Conditional Access is available, but no policies could be found.'
2020
Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData
21-
2221
}
2322
}
24-
2523
} catch {
2624
Write-AlertMessage -tenant $($TenantFilter) -message "Conditional Access Config Alert: Error occurred: $(Get-NormalizedError -message $_.Exception.message)"
2725
}

Modules/CIPPCore/Public/Alerts/Get-CIPPAlertUnusedLicenses.ps1

+3-4
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,14 @@ function Get-CIPPAlertUnusedLicenses {
1111
$TenantFilter
1212
)
1313

14-
1514
try {
1615
$LicenseTable = Get-CIPPTable -TableName ExcludedLicenses
1716
$ExcludedSkuList = Get-CIPPAzDataTableEntity @LicenseTable
1817
$AlertData = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscribedSkus' -tenantid $TenantFilter | ForEach-Object {
19-
$skuid = $_
20-
foreach ($sku in $skuid) {
18+
$skuId = $_
19+
foreach ($sku in $skuId) {
2120
if ($sku.skuId -in $ExcludedSkuList.GUID) { continue }
22-
$PrettyName = ($ConvertTable | Where-Object { $_.GUID -eq $sku.skuid }).'Product_Display_Name' | Select-Object -Last 1
21+
$PrettyName = ($ConvertTable | Where-Object { $_.GUID -eq $sku.skuId }).'Product_Display_Name' | Select-Object -Last 1
2322
if (!$PrettyName) { $PrettyName = $sku.skuPartNumber }
2423
if ($sku.prepaidUnits.enabled - $sku.consumedUnits -gt 0) {
2524
"$PrettyName has unused licenses. Using $($_.consumedUnits) of $($_.prepaidUnits.enabled)."

Modules/CIPPCore/Public/Authentication/Get-CIPPHttpFunctions.ps1

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ function Get-CIPPHttpFunctions {
99
$Results = foreach ($Function in $Functions) {
1010
$Help = Get-Help $Function
1111
if ($Help.Functionality -ne 'Entrypoint') { continue }
12+
if ($Help.Role -eq 'Public') { continue }
1213
[PSCustomObject]@{
1314
Function = $Function.Name
1415
Role = $Help.Role

Modules/CIPPCore/Public/Authentication/Get-CippApiClient.ps1

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ function Get-CippApiClient {
1818
if ($AppId) {
1919
$Table.Filter = "RowKey eq '$AppId'"
2020
}
21-
$Apps = Get-CIPPAzDataTableEntity @Table
21+
$Apps = Get-CIPPAzDataTableEntity @Table | Where-Object { ![string]::IsNullOrEmpty($_.RowKey) }
2222
$Apps = foreach ($Client in $Apps) {
2323
$Client = $Client | Select-Object -Property @{Name = 'ClientId'; Expression = { $_.RowKey } }, AppName, Role, IPRange, Enabled
2424

Modules/CIPPCore/Public/Authentication/New-CIPPAPIConfig.ps1

+12-4
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,14 @@ function New-CIPPAPIConfig {
99
[string]$AppId
1010
)
1111

12+
$Permissions = Get-GraphToken -tenantid $env:TenantID -scope 'https://graph.microsoft.com/.default' -AsApp $true -SkipCache $true -ReturnRefresh $true
13+
$Token = Read-JwtAccessDetails -Token $Permissions.access_token
14+
$Permissions = $Token.Roles | Where-Object { $_ -match 'Application.ReadWrite.All' -or $_ -match 'Directory.ReadWrite.All' }
15+
if (!$Permissions -or $Permissions.Count -lt 2) {
16+
Write-LogMessage -headers $Headers -API $APINAME -tenant 'None '-message 'Insufficient permissions to create API App' -Sev 'Error'
17+
throw 'Insufficient permissions to create API App. This integration requires the following Application permissions in the partner tenant. Application.ReadWrite.All, Directory.ReadWrite.All'
18+
}
19+
1220
try {
1321
if ($AppId) {
1422
$APIApp = New-GraphGetRequest -uri "https://graph.microsoft.com/v1.0/applications(appid='$($AppId)')" -NoAuthCheck $true
@@ -53,13 +61,13 @@ function New-CIPPAPIConfig {
5361

5462
if ($PSCmdlet.ShouldProcess($AppName, 'Create API App')) {
5563
Write-Information 'Creating app'
56-
$APIApp = New-GraphPOSTRequest -uri 'https://graph.microsoft.com/v1.0/applications' -NoAuthCheck $true -type POST -body $CreateBody
64+
$APIApp = New-GraphPOSTRequest -uri 'https://graph.microsoft.com/v1.0/applications' -AsApp $true -NoAuthCheck $true -type POST -body $CreateBody
5765
Write-Information 'Creating password'
58-
$APIPassword = New-GraphPOSTRequest -uri "https://graph.microsoft.com/v1.0/applications/$($APIApp.id)/addPassword" -NoAuthCheck $true -type POST -body "{`"passwordCredential`":{`"displayName`":`"Generated by API Setup`"}}"
66+
$APIPassword = New-GraphPOSTRequest -uri "https://graph.microsoft.com/v1.0/applications/$($APIApp.id)/addPassword" -AsApp $true -NoAuthCheck $true -type POST -body "{`"passwordCredential`":{`"displayName`":`"Generated by API Setup`"}}"
5967
Write-Information 'Adding App URL'
60-
$APIIdUrl = New-GraphPOSTRequest -uri "https://graph.microsoft.com/v1.0/applications/$($APIApp.id)" -NoAuthCheck $true -type PATCH -body "{`"identifierUris`":[`"api://$($APIApp.appId)`"]}"
68+
$APIIdUrl = New-GraphPOSTRequest -uri "https://graph.microsoft.com/v1.0/applications/$($APIApp.id)" -AsApp $true -NoAuthCheck $true -type PATCH -body "{`"identifierUris`":[`"api://$($APIApp.appId)`"]}"
6169
Write-Information 'Adding serviceprincipal'
62-
$ServicePrincipal = New-GraphPOSTRequest -uri 'https://graph.microsoft.com/v1.0/serviceprincipals' -NoAuthCheck $true -type POST -body "{`"accountEnabled`":true,`"appId`":`"$($APIApp.appId)`",`"displayName`":`"$AppName`",`"tags`":[`"WindowsAzureActiveDirectoryIntegratedApp`",`"AppServiceIntegratedApp`"]}"
70+
$ServicePrincipal = New-GraphPOSTRequest -uri 'https://graph.microsoft.com/v1.0/serviceprincipals' -AsApp $true -NoAuthCheck $true -type POST -body "{`"accountEnabled`":true,`"appId`":`"$($APIApp.appId)`",`"displayName`":`"$AppName`",`"tags`":[`"WindowsAzureActiveDirectoryIntegratedApp`",`"AppServiceIntegratedApp`"]}"
6371
Write-LogMessage -headers $Headers -API $APINAME -tenant 'None '-message "Created CIPP-API App with name '$($APIApp.displayName)'." -Sev 'info'
6472
}
6573
}

Modules/CIPPCore/Public/Authentication/Set-CippApiAuth.ps1

+4-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
function Set-CippApiAuth {
22
[CmdletBinding(SupportsShouldProcess)]
3-
Param(
3+
param(
44
[string]$RGName,
55
[string]$FunctionAppName,
66
[string]$TenantId,
@@ -9,7 +9,9 @@ function Set-CippApiAuth {
99

1010
if ($env:MSI_SECRET) {
1111
Disable-AzContextAutosave -Scope Process | Out-Null
12-
$Context = (Connect-AzAccount -Identity).Context
12+
$null = Connect-AzAccount -Identity
13+
$SubscriptionId = $ENV:WEBSITE_OWNER_NAME -split '\+' | Select-Object -First 1
14+
$Context = Set-AzContext -SubscriptionId $SubscriptionId
1315
} else {
1416
$Context = Get-AzContext
1517
}

Modules/CIPPCore/Public/Authentication/Test-CIPPAccess.ps1

+12-5
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,14 @@ function Test-CIPPAccess {
1212
# Check help for role
1313
$APIRole = $Help.Role
1414

15-
$AnyTenantAllowedFunctions = @('ListTenants', 'ListUserSettings', 'ListUserPhoto', 'GetCippAlerts', 'GetVersion')
15+
if ($APIRole -eq 'Public') {
16+
return $true
17+
}
18+
19+
# Get default roles from config
20+
$CIPPCoreModuleRoot = Get-Module -Name CIPPCore | Select-Object -ExpandProperty ModuleBase
21+
$CIPPRoot = (Get-Item $CIPPCoreModuleRoot).Parent.Parent
22+
$BaseRoles = Get-Content -Path $CIPPRoot\Config\cipp-roles.json | ConvertFrom-Json
1623

1724
if ($Request.Headers.'x-ms-client-principal-idp' -eq 'aad' -and $Request.Headers.'x-ms-client-principal-name' -match '^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}$') {
1825
# Direct API Access
@@ -108,7 +115,7 @@ function Test-CIPPAccess {
108115
}
109116

110117
if ($APIAllowed) {
111-
$TenantFilter = $Request.Query.tenantFilter ?? $Request.Body.tenantFilter ?? $env:TenantID
118+
$TenantFilter = $Request.Query.tenantFilter ?? $Request.Body.tenantFilter ?? $Request.Query.tenantId ?? $Request.Body.tenantId ?? $env:TenantID
112119
# Check tenant level access
113120
if (($Role.BlockedTenants | Measure-Object).Count -eq 0 -and $Role.AllowedTenants -contains 'AllTenants') {
114121
$TenantAllowed = $true
@@ -132,15 +139,15 @@ function Test-CIPPAccess {
132139
}
133140
}
134141
}
142+
135143
if (!$APIAllowed) {
136-
throw "Access to this CIPP API endpoint is not allowed, the '$($Role.Role)' custom role does not have the required permission: $APIRole"
144+
throw "Access to this CIPP API endpoint is not allowed, you do not have the required permission: $APIRole"
137145
}
138-
if (!$TenantAllowed -and $AnyTenantAllowedFunctions -notcontains $Request.Params.CIPPEndpoint) {
146+
if (!$TenantAllowed -and $Help.Functionality -notmatch 'AnyTenant') {
139147
throw 'Access to this tenant is not allowed'
140148
} else {
141149
return $true
142150
}
143-
144151
} else {
145152
# No permissions found for any roles
146153
if ($TenantList.IsPresent) {

Modules/CIPPCore/Public/Clear-CippDurables.ps1

+11-9
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,16 @@ function Clear-CippDurables {
1919
}
2020
}
2121

22+
Remove-AzDataTable @InstancesTable
23+
Remove-AzDataTable @HistoryTable
24+
$BlobContainer = '{0}-largemessages' -f $FunctionName
25+
if (Get-AzStorageContainer -Name $BlobContainer -Context $StorageContext -ErrorAction SilentlyContinue) {
26+
Write-Information "- Removing blob container: $BlobContainer"
27+
if ($PSCmdlet.ShouldProcess($BlobContainer, 'Remove Blob Container')) {
28+
Remove-AzStorageContainer -Name $BlobContainer -Context $StorageContext -Confirm:$false -Force
29+
}
30+
}
31+
2232
$QueueTable = Get-CippTable -TableName 'CippQueue'
2333
$CippQueue = Invoke-ListCippQueue
2434
$QueueEntities = foreach ($Queue in $CippQueue) {
@@ -45,15 +55,7 @@ function Clear-CippDurables {
4555
}
4656
}
4757

48-
Remove-AzDataTable @InstancesTable
49-
Remove-AzDataTable @HistoryTable
50-
$BlobContainer = '{0}-largemessages' -f $FunctionName
51-
if (Get-AzStorageContainer -Name $BlobContainer -Context $StorageContext -ErrorAction SilentlyContinue) {
52-
Write-Information "- Removing blob container: $BlobContainer"
53-
if ($PSCmdlet.ShouldProcess($BlobContainer, 'Remove Blob Container')) {
54-
Remove-AzStorageContainer -Name $BlobContainer -Context $StorageContext -Confirm:$false -Force
55-
}
56-
}
5758
$null = Get-CippTable -TableName ('{0}History' -f $FunctionName)
5859
Write-Information 'Durable Orchestrators and Queues have been cleared'
60+
return $true
5961
}

0 commit comments

Comments
 (0)