Skip to content

Commit

Permalink
Merge pull request #3881 from NikCharlebois/Fixes-for-Invalid-Intune-…
Browse files Browse the repository at this point in the history
…Schema

Fixes invalid Intune Schema
  • Loading branch information
NikCharlebois authored Nov 12, 2023
2 parents ee375ca + f16dd66 commit 9d06d75
Show file tree
Hide file tree
Showing 8 changed files with 16 additions and 16 deletions.
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
[ClassVersion("1.0.0.0")]
class MSFT_DeviceManagementConfigurationPolicyAssignments
class MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments
{
[Write, Description("The type of the target assignment."), ValueMap{"#microsoft.graph.groupAssignmentTarget","#microsoft.graph.allLicensedUsersAssignmentTarget","#microsoft.graph.allDevicesAssignmentTarget","#microsoft.graph.exclusionGroupAssignmentTarget","#microsoft.graph.configurationManagerCollectionAssignmentTarget"}, Values{"#microsoft.graph.groupAssignmentTarget","#microsoft.graph.allLicensedUsersAssignmentTarget","#microsoft.graph.allDevicesAssignmentTarget","#microsoft.graph.exclusionGroupAssignmentTarget","#microsoft.graph.configurationManagerCollectionAssignmentTarget"}] String dataType;
[Write, Description("The type of filter of the target assignment i.e. Exclude or Include. Possible values are:none, include, exclude."), ValueMap{"none","include","exclude"}, Values{"none","include","exclude"}] String deviceAndAppManagementAssignmentFilterType;
Expand All @@ -14,7 +14,7 @@ class MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy : OMI
[Key, Description("Identity of the account protection local administrator password solution policy.")] String Identity;
[Required, Description("Display name of the account protection local administrator password solution policy.")] String DisplayName;
[Write, Description("Description of the account protection local administrator password solution policy.")] String Description;
[Write, Description("Assignments of the account protection local administrator password solution policy."), EmbeddedInstance("MSFT_DeviceManagementConfigurationPolicyAssignments")] String Assignments[];
[Write, Description("Assignments of the account protection local administrator password solution policy."), EmbeddedInstance("MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments")] String Assignments[];
[Write, Description("Configures which directory the local admin account password is backed up to. 0 - Disabled, 1 - Azure AD, 2 - AD"), ValueMap{"0", "1", "2"}, Values{"0", "1", "2"}] UInt32 BackupDirectory;
[Write, Description("Configures the maximum password age of the managed local administrator account for Azure AD. Minimum - 7, Maximum - 365")] UInt32 PasswordAgeDays_AAD;
[Write, Description("Configures the maximum password age of the managed local administrator account for Active Directory. Minimum - 1, Maximum - 365")] UInt32 PasswordAgeDays;
Expand Down
Binary file not shown.
Binary file not shown.
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ Configuration Example
Ensure = "Present";
Credential = $credsGlobalAdmin
Assignments = @(
MSFT_DeviceManagementConfigurationPolicyAssignments{
MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments{
deviceAndAppManagementAssignmentFilterType = 'none'
dataType = '#microsoft.graph.allLicensedUsersAssignmentTarget'
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ Configuration Example
Ensure = "Present";
Credential = $credsGlobalAdmin
Assignments = @(
MSFT_DeviceManagementConfigurationPolicyAssignments{
MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments{
deviceAndAppManagementAssignmentFilterType = 'none'
dataType = '#microsoft.graph.allLicensedUsersAssignmentTarget'
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
BeforeAll {
$testParams = @{
Assignments = @(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
CollectionId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
} -ClientOnly)
Expand Down Expand Up @@ -121,7 +121,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
BeforeAll {
$testParams = @{
Assignments = [CimInstance[]]@(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
CollectionId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
} -ClientOnly)
Expand Down Expand Up @@ -189,7 +189,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
Ensure = 'Present'
Identity = '619bd4a4-3b3b-4441-bd6f-3f4c0c444870'
Assignments = [CimInstance[]]@(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
CollectionId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
} -ClientOnly)
Expand Down Expand Up @@ -236,7 +236,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
BeforeAll {
$testParams = @{
Assignments = @(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
CollectionId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
} -ClientOnly)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
BeforeAll {
$testParams = @{
Assignments = @(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
DeviceAndAppManagementAssignmentFilterType = 'none'
GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
Expand Down Expand Up @@ -113,7 +113,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
BeforeAll {
$testParams = @{
Assignments = [CimInstance[]]@(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
DeviceAndAppManagementAssignmentFilterType = 'none'
GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
Expand Down Expand Up @@ -238,7 +238,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
Ensure = 'Present'
Identity = '619bd4a4-3b3b-4441-bd6f-3f4c0c444870'
Assignments = [CimInstance[]]@(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
DeviceAndAppManagementAssignmentFilterType = 'none'
GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
Expand Down Expand Up @@ -342,7 +342,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
BeforeAll {
$testParams = @{
Assignments = @(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionLocalUserGroupMembershipPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
DeviceAndAppManagementAssignmentFilterType = 'none'
GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
BeforeAll {
$testParams = @{
Assignments = @(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
deviceAndAppManagementAssignmentFilterType = 'none'
groupId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
Expand Down Expand Up @@ -131,7 +131,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
BeforeAll {
$testParams = @{
Assignments = [CimInstance[]]@(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
deviceAndAppManagementAssignmentFilterType = 'none'
groupId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
Expand Down Expand Up @@ -194,7 +194,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
Ensure = 'Present'
Identity = '619bd4a4-3b3b-4441-bd6f-3f4c0c444870'
Assignments = [CimInstance[]]@(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
deviceAndAppManagementAssignmentFilterType = 'none'
GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
Expand Down Expand Up @@ -232,7 +232,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture {
BeforeAll {
$testParams = @{
Assignments = @(
(New-CimInstance -ClassName MSFT_DeviceManagementConfigurationPolicyAssignments -Property @{
(New-CimInstance -ClassName MSFT_IntuneAccountProtectionPolicyAssignments -Property @{
DataType = '#microsoft.graph.exclusionGroupAssignmentTarget'
deviceAndAppManagementAssignmentFilterType = 'none'
GroupId = '26d60dd1-fab6-47bf-8656-358194c1a49d'
Expand Down

0 comments on commit 9d06d75

Please sign in to comment.