Skip to content

Commit 2e86d93

Browse files
Merge pull request #6373 from microsoft/Dev
Release 1.25.723.2
2 parents f6e2bbe + 641b669 commit 2e86d93

File tree

7 files changed

+65
-58
lines changed

7 files changed

+65
-58
lines changed

CHANGELOG.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,14 @@
11
# Change log for Microsoft365DSC
22

3+
# Release 1.25.723.2
4+
5+
* AADConditionalAccessPolicy
6+
* Remove the ValidateSet from the ProtocolFlows property.
7+
* AADCrossTenantAccessPolicyConfigurationDefault
8+
* Fixed the return values from the Get-TargetResource method.
9+
* AADUser
10+
* Fixed an issue when fetching a property from an empty array.
11+
312
# 1.25.723.1
413

514
* AADApplication

Modules/Microsoft365DSC/DSCResources/MSFT_AADConditionalAccessPolicy/MSFT_AADConditionalAccessPolicy.psm1

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,6 @@ function Get-TargetResource
236236
$ServicePrincipalRiskLevels,
237237

238238
[Parameter()]
239-
[ValidateSet("implicitAccessTokenAndGetResponseMode","implicitIdTokenAndGetResponseMode","implicitAccessTokenAndPostResponseMode","implicitIdTokenAndPostResponseMode","authorizationCodeWithoutPkce","authorizationCodeWithPkce","clientCredentials","refreshTokenGrant","encryptedAuthorizeResponse","password","directUserGrant","saml20","kerberos","prtGrant","seamlessSso","prtBrokerBased","prtNonBrokerBased","onBehalfOf","samlOnBehalfOf","deviceCodeFlow","authenticationTransfer")]
240239
[System.String[]]
241240
$ProtocolFlows,
242241

@@ -1020,7 +1019,6 @@ function Set-TargetResource
10201019
$ServicePrincipalRiskLevels,
10211020

10221021
[Parameter()]
1023-
[ValidateSet("implicitAccessTokenAndGetResponseMode","implicitIdTokenAndGetResponseMode","implicitAccessTokenAndPostResponseMode","implicitIdTokenAndPostResponseMode","authorizationCodeWithoutPkce","authorizationCodeWithPkce","clientCredentials","refreshTokenGrant","encryptedAuthorizeResponse","password","directUserGrant","saml20","kerberos","prtGrant","seamlessSso","prtBrokerBased","prtNonBrokerBased","onBehalfOf","samlOnBehalfOf","deviceCodeFlow","authenticationTransfer")]
10241022
[System.String[]]
10251023
$ProtocolFlows,
10261024

@@ -2248,7 +2246,6 @@ function Test-TargetResource
22482246
$ServicePrincipalRiskLevels,
22492247

22502248
[Parameter()]
2251-
[ValidateSet("implicitAccessTokenAndGetResponseMode","implicitIdTokenAndGetResponseMode","implicitAccessTokenAndPostResponseMode","implicitIdTokenAndPostResponseMode","authorizationCodeWithoutPkce","authorizationCodeWithPkce","clientCredentials","refreshTokenGrant","encryptedAuthorizeResponse","password","directUserGrant","saml20","kerberos","prtGrant","seamlessSso","prtBrokerBased","prtNonBrokerBased","onBehalfOf","samlOnBehalfOf","deviceCodeFlow","authenticationTransfer")]
22522249
[System.String[]]
22532250
$ProtocolFlows,
22542251

Modules/Microsoft365DSC/DSCResources/MSFT_AADConditionalAccessPolicy/MSFT_AADConditionalAccessPolicy.schema.mof

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ class MSFT_AADConditionalAccessPolicy : OMI_BaseResource
5353
[Write, Description("Authentication context class references.")] String AuthenticationContexts[];
5454
[Write, Description("Insider risk levels conditions."), ValueMap{"minor", "moderate", "elevated", "unknownFutureValue"}, Values{"minor", "moderate", "elevated", "unknownFutureValue"}] String InsiderRiskLevels[];
5555
[Write, Description("Service principal risk levels included in the policy."), ValueMap{"low", "medium", "high", "none", "unknownFutureValue"}, Values{"low", "medium", "high", "none", "unknownFutureValue"}] String ServicePrincipalRiskLevels[];
56-
[Write, Description("Specifies the protocol flows to block."), ValueMap{"implicitAccessTokenAndGetResponseMode","implicitIdTokenAndGetResponseMode","implicitAccessTokenAndPostResponseMode","implicitIdTokenAndPostResponseMode","authorizationCodeWithoutPkce","authorizationCodeWithPkce","clientCredentials","refreshTokenGrant","encryptedAuthorizeResponse","password","directUserGrant","saml20","kerberos","prtGrant","seamlessSso","prtBrokerBased","prtNonBrokerBased","onBehalfOf","samlOnBehalfOf","deviceCodeFlow","authenticationTransfer"}, Values{"implicitAccessTokenAndGetResponseMode","implicitIdTokenAndGetResponseMode","implicitAccessTokenAndPostResponseMode","implicitIdTokenAndPostResponseMode","authorizationCodeWithoutPkce","authorizationCodeWithPkce","clientCredentials","refreshTokenGrant","encryptedAuthorizeResponse","password","directUserGrant","saml20","kerberos","prtGrant","seamlessSso","prtBrokerBased","prtNonBrokerBased","onBehalfOf","samlOnBehalfOf","deviceCodeFlow","authenticationTransfer"}] String ProtocolFlows[];
56+
[Write, Description("Specifies the protocol flows to block.")] String ProtocolFlows[];
5757
[Write, Description("Specify if the Azure AD CA Policy should exist or not."), ValueMap{"Present","Absent"}, Values{"Present","Absent"}] String Ensure;
5858
[Write, Description("Credentials for the Microsoft Graph delegated permissions."), EmbeddedInstance("MSFT_Credential")] string Credential;
5959
[Write, Description("Id of the Azure Active Directory application to authenticate with.")] String ApplicationId;

Modules/Microsoft365DSC/DSCResources/MSFT_AADCrossTenantAccessPolicyConfigurationDefault/MSFT_AADCrossTenantAccessPolicyConfigurationDefault.psm1

Lines changed: 46 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -98,24 +98,65 @@ function Get-TargetResource
9898
$B2BCollaborationInboundValue = $null
9999
if ($null -ne $getValue.B2BCollaborationInbound)
100100
{
101-
$B2BCollaborationInboundValue = $getValue.B2BCollaborationInbound
101+
$B2BCollaborationInboundValue = @{
102+
Applications = @{
103+
AccessType = $getValue.B2BCollaborationInbound.Applications.AccessType
104+
Targets = [System.String[]] $getValue.B2BCollaborationInbound.Applications.Targets
105+
}
106+
UsersAndGroups =@{
107+
AccessType = $getValue.B2BCollaborationInbound.UsersAndGroups.AccessType
108+
Targets = [System.String[]] $getValue.B2BCollaborationInbound.UsersAndGroups.Targets
109+
}
110+
}
102111
}
103112
if ($null -ne $getValue.B2BCollaborationOutbound)
104113
{
105-
$B2BCollaborationOutboundValue = $getValue.B2BCollaborationOutbound
114+
$B2BCollaborationOutboundValue = @{
115+
Applications = @{
116+
AccessType = $getValue.B2BCollaborationOutbound.Applications.AccessType
117+
Targets = [System.String[]] $getValue.B2BCollaborationOutbound.Applications.Targets
118+
}
119+
UsersAndGroups =@{
120+
AccessType = $getValue.B2BCollaborationOutbound.UsersAndGroups.AccessType
121+
Targets = [System.String[]] $getValue.B2BCollaborationOutbound.UsersAndGroups.Targets
122+
}
123+
}
106124
}
107125
if ($null -ne $getValue.B2BDirectConnectInbound)
108126
{
109-
$B2BDirectConnectInboundValue = $getValue.B2BDirectConnectInbound
127+
$B2BDirectConnectInboundValue = @{
128+
Applications = @{
129+
AccessType = $getValue.B2BDirectConnectInbound.Applications.AccessType
130+
Targets = [System.String[]] $getValue.B2BDirectConnectInbound.Applications.Targets
131+
}
132+
UsersAndGroups =@{
133+
AccessType = $getValue.B2BDirectConnectInbound.UsersAndGroups.AccessType
134+
Targets = [System.String[]] $getValue.B2BDirectConnectInbound.UsersAndGroups.Targets
135+
}
136+
}
110137
}
111138
if ($null -ne $getValue.B2BDirectConnectOutbound)
112139
{
113-
$B2BDirectConnectOutboundValue = $getValue.B2BDirectConnectOutbound
140+
$B2BDirectConnectOutboundValue = @{
141+
Applications = @{
142+
AccessType = $getValue.B2BDirectConnectOutbound.Applications.AccessType
143+
Targets = [System.String[]] $getValue.B2BDirectConnectOutbound.Applications.Targets
144+
}
145+
UsersAndGroups =@{
146+
AccessType = $getValue.B2BDirectConnectOutbound.UsersAndGroups.AccessType
147+
Targets = [System.String[]] $getValue.B2BDirectConnectOutbound.UsersAndGroups.Targets
148+
}
149+
}
114150
}
115151
if ($null -ne $getValue.InboundTrust)
116152
{
117-
$InboundTrustValue = $getValue.InboundTrust
153+
$InboundTrustValue = @{
154+
IsCompliantDeviceAccepted = $getValue.InboundTrust.IsCompliantDeviceAccepted
155+
IsHybridAzureADJoinedDeviceAccepted = $getValue.InboundTrust.IsHybridAzureADJoinedDeviceAccepted
156+
IsMfaAccepted = $getValue.InboundTrust.IsMfaAccepted
157+
}
118158
}
159+
119160
$results = @{
120161
IsSingleInstance = 'Yes'
121162
B2BCollaborationInbound = $B2BCollaborationInboundValue

Modules/Microsoft365DSC/DSCResources/MSFT_AADUser/MSFT_AADUser.psm1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ function Get-TargetResource
222222
}
223223

224224
# return membership of static groups only
225-
[array]$currentMemberOf = ($batchResponse | Where-Object -FilterScript { $_.id -eq 'MemberOf' }).body.value | Select-Object -ExpandProperty DisplayName
225+
[array]$currentMemberOf = ($batchResponse | Where-Object -FilterScript { $_.id -eq 'MemberOf' }).body.value.DisplayName
226226

227227
$userPasswordPolicyInfo = $user | Select-Object UserprincipalName, @{
228228
N = 'PasswordNeverExpires'; E = { $_.PasswordPolicies -contains 'DisablePasswordExpiration' }

Modules/Microsoft365DSC/Microsoft365DSC.psd1

Lines changed: 7 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@
33
#
44
# Generated by: Microsoft Corporation
55
#
6-
# Generated on: 2025-07-23
6+
# Generated on: 2025-07-25
77

88
@{
99

1010
# Script module or binary module file associated with this manifest.
1111
# RootModule = ''
1212

1313
# Version number of this module.
14-
ModuleVersion = '1.25.723.1'
14+
ModuleVersion = '1.25.723.2'
1515

1616
# Supported PSEditions
1717
# CompatiblePSEditions = @()
@@ -151,52 +151,12 @@
151151
IconUri = 'https://github.com/microsoft/Microsoft365DSC/blob/Dev/Modules/Microsoft365DSC/Dependencies/Images/Logo.png?raw=true'
152152

153153
# ReleaseNotes of this module
154-
ReleaseNotes = '* AADApplication
155-
* Reduced export time by up to 75%.
156-
* AADConditionalAccessPolicy
157-
* Added support for the ProtocolFlows property.
158-
* AADGroup
159-
* Reduced export time by up to 60%.
160-
* AADPIMGroupSettings
161-
* Reduced export time by 80%.
162-
* AADGroupEligibilitySchedule
163-
* Reduced export time by 80%.
164-
* AADGroupEligibilityScheduleSettings
165-
* Reduced export time by 90%.
166-
* AADPasswordRuleSettings
167-
* Updated creation of new DirectorySetting object to explicitly use default values to avoid exception
168-
* AADRoleEligibilityScheduleRequest
169-
* Reduced export time by up to 50%.
170-
* AADRoleSetting
171-
* Reduced export time by 80%.
172-
* AADServicePrincipal
173-
* Reduced export time by 70%.
154+
ReleaseNotes = '* AADConditionalAccessPolicy
155+
* Remove the ValidateSet from the ProtocolFlows property.
156+
* AADCrossTenantAccessPolicyConfigurationDefault
157+
* Fixed the return values from the Get-TargetResource method.
174158
* AADUser
175-
* Reduced export time by 25%.
176-
* IntuneDeviceCleanupRuleV2
177-
* Initial release.
178-
* IntuneMobileAppsBuiltInStoreApp
179-
* Initial release.
180-
* IntuneMobileAppsManagedGooglePlayApp
181-
* Initial release.
182-
* IntuneMobileAppsBundleMacOS
183-
* Initial release.
184-
* IntuneMobileAppsStoreApp
185-
* Initial release.
186-
* IntuneMobileAppsSystemAppAndroid
187-
* Initial release.
188-
* IntuneMobileAppsWin32AppWindows10
189-
* Initial release.
190-
* IntuneSettingCatalogASRRulesPolicyWindows10
191-
* Added new options to `EnableControlledFolderAccess` property.
192-
FIXES [#6353](https://github.com/microsoft/Microsoft365DSC/issues/6353)
193-
* IntuneSettingCatalogCustomPolicyWindows10
194-
* Add `RoleScopeTagIds` property to functions.
195-
FIXES [#6348](https://github.com/microsoft/Microsoft365DSC/issues/6348)
196-
* M365DSCDRGUtil
197-
* Added new function `Invoke-M365DSCIntuneMobileAppInitialUpload` for initial mobile app content upload.
198-
* MISC
199-
* Fixed log messages from being out of order for AAD resource'
159+
* Fixed an issue when fetching a property from an empty array.'
200160

201161
# Flag to indicate whether the module requires explicit user acceptance for install/update
202162
# RequireLicenseAcceptance = $false

Tests/Unit/Microsoft365DSC/Microsoft365DSC.AADCrossTenantAccessPolicyConfigurationDefault.Tests.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -283,7 +283,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
283283
}
284284
B2BDirectConnectInbound = @{
285285
applications = @{
286-
accessType = 'blocked'
286+
accessType = 'allowed'
287287
targets = @(
288288
@{
289289
target = 'AllApplications'

0 commit comments

Comments
 (0)