From 3b46af7da0c9af604f39661279c0ac68c6129636 Mon Sep 17 00:00:00 2001 From: Dan Lag Date: Thu, 14 Nov 2024 10:37:23 -0500 Subject: [PATCH 1/4] Add ApplicationSecret to multiple resources --- .../MSFT_AADAccessReviewPolicy.psm1 | 14 ++++++++++++++ .../MSFT_AADAccessReviewPolicy.schema.mof | Bin 1077 -> 2504 bytes ...MSFT_AADCustomAuthenticationExtension.psm1 | 13 +++++++++++++ ...ADCustomAuthenticationExtension.schema.mof | Bin 3371 -> 7142 bytes .../MSFT_AADEnrichedAuditLogs.psm1 | 14 ++++++++++++++ .../MSFT_AADEnrichedAuditLogs.schema.mof | Bin 1185 -> 2722 bytes .../MSFT_AADFederationConfiguration.psm1 | 14 ++++++++++++++ ...MSFT_AADFederationConfiguration.schema.mof | Bin 2196 -> 4754 bytes .../MSFT_AADFilteringPolicy.psm1 | 14 ++++++++++++++ .../MSFT_AADFilteringPolicy.schema.mof | Bin 1268 -> 2892 bytes .../MSFT_AADFilteringPolicyRule.psm1 | 14 ++++++++++++++ .../MSFT_AADFilteringPolicyRule.schema.mof | Bin 1617 -> 3606 bytes .../MSFT_AADFilteringProfile.psm1 | 14 ++++++++++++++ .../MSFT_AADFilteringProfile.schema.mof | Bin 1887 -> 4152 bytes ...eLifecycleWorkflowCustomTaskExtension.psm1 | 14 ++++++++++++++ ...ycleWorkflowCustomTaskExtension.schema.mof | Bin 3492 -> 7390 bytes ...T_AADIdentityProtectionPolicySettings.psm1 | 14 ++++++++++++++ ...dentityProtectionPolicySettings.schema.mof | Bin 1078 -> 2506 bytes .../MSFT_AADLifecycleWorkflowSettings.psm1 | 14 ++++++++++++++ ...FT_AADLifecycleWorkflowSettings.schema.mof | Bin 2066 -> 4486 bytes ...MSFT_AADNetworkAccessForwardingPolicy.psm1 | 14 ++++++++++++++ ...ADNetworkAccessForwardingPolicy.schema.mof | Bin 1557 -> 3486 bytes ...NetworkAccessSettingConditionalAccess.psm1 | 14 ++++++++++++++ ...kAccessSettingConditionalAccess.schema.mof | Bin 1121 -> 2590 bytes ...NetworkAccessSettingCrossTenantAccess.psm1 | 14 ++++++++++++++ ...kAccessSettingCrossTenantAccess.schema.mof | Bin 1139 -> 2626 bytes ...DOnPremisesPublishingProfilesSettings.psm1 | 14 ++++++++++++++ ...misesPublishingProfilesSettings.schema.mof | Bin 1075 -> 2500 bytes 28 files changed, 195 insertions(+) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADAccessReviewPolicy/MSFT_AADAccessReviewPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADAccessReviewPolicy/MSFT_AADAccessReviewPolicy.psm1 index 226e9f3c22..7697cbcc1a 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADAccessReviewPolicy/MSFT_AADAccessReviewPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADAccessReviewPolicy/MSFT_AADAccessReviewPolicy.psm1 @@ -24,6 +24,10 @@ function Get-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -67,6 +71,7 @@ function Get-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens @@ -111,6 +116,10 @@ function Set-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -171,6 +180,10 @@ function Test-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -291,6 +304,7 @@ function Export-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADAccessReviewPolicy/MSFT_AADAccessReviewPolicy.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_AADAccessReviewPolicy/MSFT_AADAccessReviewPolicy.schema.mof index a5ddb2612b34e8608cb568c6d1a2c5785620e5a7..91e400816fdf8457596ccf361021a3ba4c2b35ad 100644 GIT binary patch literal 2504 zcmc&$ZA;rw7(Jf{`wy3Xae|EP>-MR(ZUk{1YjKE_5t~+vZ4ykYxZz*lcFuE?CM|Jj zB8-sazC5qzp65ya{60qy3xvpconnd`zUN2~;|)4^kGFWYxjWd$0USP2YEIc05q0nJ zh5Ad*rP1Zp=RM&yHLKtFzBTzfe5K_D#}jJF+8D3#inAgDhZ78Ge}o^;u;lQ8Q4OdY zQ18&PnL>Uu`dc$v#Uf9??CB`2>m0{izqg$FCOxstQmiT%449{~bj%{O=%dYeO)W>+ zjL$usnT`>lr0N zzLnv}o$S7w?ut7)wZ}6IFyp>FDN@N^axCOhjuYI`zGsG`A9>UJhHD|Ugn-tB%F;$5 z_5Ete0%!6C4}_OER`sN{6|Sf$ti4x{q>wn|int@6(i0Y+H&G5YF$(9Hw;~WHW7<5j zl?&63a+Jh|k_S&ks%Ke5x!pPaEbQ!)96?3z7)wIAYwjhKh{z1(*5znvr&qA!i1Q0- zM7;FeJx|qBSr2u-eGNHdLCKRk$>!Y9xo+pz#ZRj$<*G_owcJ|feU8KntqB92q7bKy5LG=xQ6 zwjPnk@*Gucw#jZtJHBcaTbmPYpQU=t%d!6{yr^d1lpiDVbZs@8lH2OaZIP_64c{;R z#TE5mb!1h{Y^!Q~Re9#M<6W=TLmdW9@vQc0RY|~al(UXleDRuA(C*h_+mouO=r=3& isHX8(|8jgkyEeNoRryu>BUY@pp7FnBoX7l-zyAW`>#~dh literal 1077 zcma)5-D}%05P$byarh-El+wK}Pj1o>}-TPSJHFN39}AgshuhxXI!fPdkY8wkGP=+?WY z26wP*1V~{)dK3XcSOt}^V#}XNKKP`cz}c>dAndS>rOa^!cg`8)`jWoImb2J#ni^DS z!@U)2gKCuho6^{$;!G_JV=%oP!om4hk;6QV;9MQaP-n|;>k?{Xg+4BpfQM*JR^rq9zJ}|XUn2pZ` zX9hi{bnBv^oWL66LiedZ?c1@aOuG}>p7z}_<`KT4?QMOUW!n2iOsC~)l)aC#KOuE@ AV*mgE diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADCustomAuthenticationExtension/MSFT_AADCustomAuthenticationExtension.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADCustomAuthenticationExtension/MSFT_AADCustomAuthenticationExtension.psm1 index 8cb16f56e8..63f67975f9 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADCustomAuthenticationExtension/MSFT_AADCustomAuthenticationExtension.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADCustomAuthenticationExtension/MSFT_AADCustomAuthenticationExtension.psm1 @@ -61,6 +61,10 @@ function Get-TargetResource [System.String] $ApplicationId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $TenantId, @@ -273,6 +277,10 @@ function Set-TargetResource [System.String] $ApplicationId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $TenantId, @@ -458,6 +466,10 @@ function Test-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -606,6 +618,7 @@ function Export-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADCustomAuthenticationExtension/MSFT_AADCustomAuthenticationExtension.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_AADCustomAuthenticationExtension/MSFT_AADCustomAuthenticationExtension.schema.mof index 6382d10037ad2b1f414625007916bfce0d2b39cb..3f44be987f4306ff56d7436c0a52ca2294ab2ff0 100644 GIT binary patch literal 7142 zcmdUzU2hvz5QgU(iT|+jO{s(`3O9&exlV#22vo#rFCv5-+f7%so!}2rQ}wR{?{mh- zyWZ|D$$HI)EPK~y&(4|ed1wCozdk)&FnMl*i(CAUu?e}du%`3 zr}l{rx9=o&X6JTdef!0_`W%VgN;HwaV} z^ky3N_W~cU_3v7A=DBy_;eFsFG5=iJEA2=F#m}{NB+3h&$J*`oOl0B-G-qK)qG#~O zb*-J;-ROC?4u>N>iCiV33jbw%xrP#HWEoDLiStB~?o#M)PI}g|1b5TuTc>?HWkBTWJRC7J2`EyRRE|y$W=)Gk(~d(6%h|V4a&__hFFW zTC(x~wiUU4D$xISOZ`w1EyVj(iBBf7!bmbTwa|G5-BVF*+bT<0doI5j%fFLgn@I`h zZ}fB->{N`Mav$sGs9uQvWW)D|&6Q~XFXbuEn5iP`Bt%1Bzi*|JnQ~uMW;jH~@+=G= z(TB)t9?z++9z$drs^m5m3^t-p{S892D*a>kVO(IlUGIFChu_~p1jgOIJpRXQDgmo86D*D^B;+J ztjJ_1=N~O{E*Jpq&GpOLSZk@CkhShZ*Jbmaa6JwjgO^;Q$Om5Fx^XlE*7;3qRS|cj z=b5FWottKB*I2Y9)r4FG4`38DU-Y1^p6+^xBPPd1c!FcVD*g{qTXwyAAb+Srj)`O{ zV#f@>Rq@;$m$re|KE|R&o9xPuN8Kl?tE2F#qVVeqKmY&4VazY}F<4&LK>8o+y=jy| zt*mdT_tffMA@kUB?(2G|YMjxAueK|tqmVq3CquOvcGfES;Yx$`#ZHd@>Z{j zsp{lAX#fxKYC}BkBk@_Fh<;c4V)u-0+j16rmpWOI32b*PuD}eVP=g&ygVew}pb;?c zzcDX~I6x+_ zU6j75xAy{n8Tv*h??3YM#5kp60ymHr9)&$!-BBZEAwNFco6F9Q-nJ`g+0LdCQ)y!i zM}O(s?;9^lWJ7vC?}g|v(x4&M=*hfSW%fuu$j^rHK03*AY?bdeFs&0TDqD@BL(){FO^v---1_VMTcp*Pxf{v;19Ft{!+H<{pZq57U$)D zk(a({EcBHxK_yr6XFo5iZ*9hg=ZiXDp<2@Q6M0}%k1V3bqsl!mtFv{qs^Y6xdP12F zn(C8EfM>_4%c=5*cY`r!H;tg@$}Km_Ipc5wld=3sM3Gk*D%ZO444vHP6DVo`n)exT UTallq-``SSXi^?=L7de71!p(uv;Y7A literal 3371 zcmcInOK;ma5Wf3Y418${7{RuCSu`irP6}h!+oExjLl6`+HMWUTB$tmSZqfhVAuYv} zkxFW?O#;}E=Kc8Q%k5M$=dRH@q1DOw)#)Gccl`2h#N!KCTwW|c6~$~CoYz$m{1%lL zoOu#IfAFZH-nlA2XrcU6tF_n!o8FGTjeve`Z>;b*ff+h(g^7A6;~B1nLI-3G{LUcg zb^4B~G|>?7+!93tm);7s0rHdtmZWqx%>KQ$pVv~~gJKoJTHEAF>W$#QjLD4u6Q32v z+|(NXlEOeI7M%{3BW$b=rr*`aTK-)W{{=rTtRBkO`BRwEqbO#;Yxwgu z@GY~9dqM_~npTggSW_-TiEyO^*YtUiN%}9+;(A8*onf37oVLvweb)i`c2mu=; zOlX!H?!?Vr6g%vC4UipuZuRfg>%X#s|CR>EVL57FwqhCF4@91$lC~~DDr;uFeTP~& z(Oc8Q<>~ZDxUolcQ4Vw5Ebj18l7uKnrw+WRPzN8;s}fQQ+Gwpx7elz3D^GhlO=|6& z_ezUQVPMhuQ!!NRfnbvW1bh50*n_A-^>Hsd&}DN;j&J+~&Z`xcB@!+>&lD$^eLnlh zde(4;R>=kiOAYW5L()}o`;!jRB(95RB` zKwlH}5p{V9wJ19`0k&$%2%0`e15oKNSQ3^^;F`&R3ueBJizGUpjBCT=@AX^v)Vn)y z4Q-3=J8C|)m@u13x*2;e7cUqK=JhCkXU9C0fm>X~EHDjD$7wdUUszNwU-1avQ3Z zA@-aGIWq44RH^1|pTN<^i%P_w7`u+4^+Yy3C>$c_=){647MZ|&Mu#O*{jTiaYAuoY jO06_cv*ULi<_k`AgyugjZV^l_5K} zl)X3hmi?Ff*N!I7fwfta%)ri>PnnzZ&TM9Hz&=BVu=@7U9w1Zd4|Zr>(0lgjk8y&% zz@j5|cG$J=OosLztp%FqSTSHMJ>UEtkk)fzubIDbJ_jy6aEm9{xa5BX4>1gO1@efM z^lm(7S74^#y=NaCV-H`IUOM(2k~(BGL4RW*)v#OFyObzaR{LOfu|z%`Yl z1ZIc%0*QpL7`|L#_rdqhSW(2bGizi5Wufi!6wPNxzxd~ z0FNrarhWCEp^R5$$P-sEPz7b~AItgqiFbto2D}$LLBiZR+t^9B@l@89n7gp+f}`#|blY}`=&&WkGhy7|!~8|PlL6Z{xE-oL1g*e`yUE5T2rDUr;`E!`kgS*n^?RWb8+ z%exkM>l!xspsqi4;w!Ut)~U;M=pVs5qI|3Kylw^UQ*XJS!qT7{Q&p3ysO&d0dQ@He j%UgkNh0*gDj$7aE)l81J4&nFU6VVH9W&MTCw~OyjefP zRvY|7Ncui~l5V#&g6IxCX=mr@>#JAsPA@Lu#%r|7wC_cQ^EAs=YwNWvQDu$N;hj5C zda+Mr42RA3rnvu;3%r5bO@4nZ2tOjZ#!F0|65wn17TZf$AxW?6(1G7t)54=LTE%CB zpb2K5k!Dws&s{WaME#VqDSaLcH2m&i8@#qB$Z5+jgSn+3ti(l+_Q~sjzu{$4VjXZm zBM=?|tvDDqIS)!x_s!@(v#-C(QrOcAXWfzPb7z(7?U70UF}=AG!Z$sLbOWvgkY~(TcLE z4mD3?`1ev-^ItJRq7VAm*UdUGwZAZ1jsYWs2~jq}iWAqHui$`jeWt3vcFv%%Fa+h@ g?1XkAecUiU9)f#7JDGY|-rm26?zG!4lIKP89pez1D*ylh diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADFederationConfiguration/MSFT_AADFederationConfiguration.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADFederationConfiguration/MSFT_AADFederationConfiguration.psm1 index 4834867c3f..d5c9a56bd8 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADFederationConfiguration/MSFT_AADFederationConfiguration.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADFederationConfiguration/MSFT_AADFederationConfiguration.psm1 @@ -53,6 +53,10 @@ function Get-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -127,6 +131,7 @@ function Get-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens @@ -200,6 +205,10 @@ function Set-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -324,6 +333,10 @@ function Test-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -446,6 +459,7 @@ function Export-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADFederationConfiguration/MSFT_AADFederationConfiguration.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_AADFederationConfiguration/MSFT_AADFederationConfiguration.schema.mof index 4f1ed6de22f482be79f1e3a9bf95fa6c4269dd03..fbd365b73f7b37e0a848062b95d8e5ae5a046ebd 100644 GIT binary patch literal 4754 zcmc(jZEqV@5QXP668~Z4FMw3aivX$RlbZy|qJ{{kFH(e%V>_*d?O5JT(t!Hcf%DAl z&92?u5Z0}bW$)X)bLX5nGk4a1|8;5ywy?3~`aHLpZFHR5g{|yU>)BWK(7wF=_Utoz zV43}(QFD!5*;I3H>?h4%>Y5pSeGWBZre|0iTT$9OaI5FKdS#bePq6!|eQY1us84_rZvuWU6kWS!Z5U__JzF=s?SS)GCM2%nriIa8C&@} zg*?b)cOyGj<&%x#kO|GoZ4!Y(J}~p#$1NLd9Pe02JUkQzIM3uw;rLdHN~Xxw@uawZ zzr)ZApTX*=p`E3HxXHyeI>_vq*dOS)&CI!D*j7rWS=_nu-+xD)JL?NYdn11HlHFbG zZJ6s`K67MU@irqQGYWY))t6(Y>o-#0Yn{V7I*MFci<`Ob6}ofj97J?4oWHT|g`Pqq z6So(+TGs%|z_+~hn2nS)7w;)!;i{?& zp~0lj(B$u$wGvb89ifG~s?%=Nq}!(5hrXcD`qZE0Rt(#`WA~sI#SCVryuuq)lilvc z-`O|1!e2B(w}7s4&7guswr%efYoSLo@Bub^cfowmM*VNey-GgzwNvgiqIgD3bz)Sm9-P9v>Turh4+AXDCtZlbSSse^DTk5L8 zr}7y76PKYNa(M38g2kz$9qS%SYxDDPYt*TFjqr+&tLnAx+et(PqMk-}gv!Yn>T1Ps z_{1)Ys$yq-Q=-bfTNx`p?RJP5H6EMTUJ3s9eOV7QLTnLTdRMh>#eNzv`$Yt z3*W-yp1t+etGW5T=h3BYXT^~-ALzTr`oR4o>!O;d_ppisJ#*F1H?5ue(QTwnBfBCd`*-p6?GLZJD5WpOkiWz`I$!6Zux{I#Jv2-v8Thp44pagKp$; zAv#s9N_*RXi|GC+sR-{+{Uaf&cE4s_)X{g<2ff&(=PaEXRdZh^n{y-TMRR7PH8^Q~Y~r9RpX>x=3vY8&nStJlqdS0G-W$4R&=XZ3I_R0Nz&l5MC9)`0 kaQ-vs>OZxQIMA2ZJIU^T?<%>nenyMT$l@L<>wp2)XvPwMgv9c3L{bf8Sk_wt+zq zTKm#Em;1i^zPs~vFBRTjqVw9Co#@m40e_?2E}S@xMy0EtBEy|1j{7I5(1}2CJ!__V zR#bnY-J6c&BrqJEjBj5LghTi>Om2^b$8+?ya1uKY9iY$k4_tMjk6t>RGr&$Xo+Bvj z^Hi+B5CgDN2y`}zho>K}MtejCCX`8mR%n6_E6AN)&>y!CiJ7C*fgVns%{CEdbpSKi zC)zLyPMaC@D;zHLsN!?QZ$D#{cweA{i}Pg7Wx5drJi5gT$X;aWFL&jM?HarZT&28l zx&^j@mthb}1Oa$2=fcbo$e`S66QE!vrq+QdNF~xkmPS?eJ1yrRQ?fIF$n&&*=>HMw z4Z6b`e^A4}O+3s+fF(}$Dyu3E9)x3a9ZI$+SXdHe@Ooz04Q=>nsHL;sP6G@~aH14g zOMExyGipq|z!4=+OgrH-hf{QpC_NLA8Y@_7(|zEs%q?Y{qzDU<7FZT@2urrO3oPJ! zRo%eGPpqSUDM4FWqgN1H@>HS=ddjY1)d-{?t4TWEq4AKD29?k}L0e_Flaq=-&68CH zHq&X(U6qNzP6;X&czC{jq0W<5(V4GCsGiQem{50-L`2A%XLCZ)i8}k>D_R@Bn{dJ? z$O<1|f*@^{Qxmh&OC9Fr^#A^P@V&RK_A_-g)z%y-Hk!Jq5!52!sU|3*PC2a9B%cCh zGoj6sl>O@H`sS$f`gR}}J$pfV7xc4aOL>AYlE(C&fP5Fk9k&>;e@P(S=KH zsiDXpqPPr=x>21tdaR%Nm!93MeHfJREhYD;zlo<7sbAZ(wC*moLXk7E%Cuo3gKUC| z{7vc-cA|2*Z{OziS$n@dY{5;`8ZQ1r0zoVTjU}yK-U8OGnv03&zcGT9|4ozQ?Gj7W z|9}QG;`Qy>gdCTVt!U$Ukxg>CQOcg;QG2^o(!5bA&rEY1NC#T%FYNUuvqr0L8MKHp z6h_Q=7W*`1yl`K+J4%dWYf}^k>X(xGu5C#lOWM-w8E;EnU%plRxZG4cVvk3izoC-| AsQ>@~ diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicy/MSFT_AADFilteringPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicy/MSFT_AADFilteringPolicy.psm1 index 5727a13f23..1a447cc253 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicy/MSFT_AADFilteringPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicy/MSFT_AADFilteringPolicy.psm1 @@ -37,6 +37,10 @@ function Get-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -109,6 +113,7 @@ function Get-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens @@ -166,6 +171,10 @@ function Set-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -259,6 +268,10 @@ function Test-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -380,6 +393,7 @@ function Export-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicy/MSFT_AADFilteringPolicy.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicy/MSFT_AADFilteringPolicy.schema.mof index eebd9161aefc817b1059b19f44c45be862d19852..0c4b92db7f97e8d8eb02b9987c9ca93e751e9857 100644 GIT binary patch literal 2892 zcmb`J&2H0B5QS%r#5-JN14yWXEv(YCND(SjG?YaZp)^U0)%;N>lz{r`z<1`xwUat1 zwJR&JeLZ*PoS8Xe|NV1jEgM>;?Fn~T>|jTB!oH4u-N{F=Hz4`Q zt~NXNox#vP5iupw0)&0872~)62ds6R*?ZQP&f~zX`_5(t+MIXBDB$aYU32?}ZLnE^ z#omfX0QcN|h-bLV#@mg!U))AHQ4Y7q{!G3S`wj<1Ovte^Ep!+BRG})U+W4u8s2pnm z&(zU8Bs=B4sv>Jr<*aUD)x}fR60Vi$0lB*2P6!`X#iHkkPQ8?O(XQ1zCPV7USi|7w z)caGbIVPzj1!s@5I#-rIL9VsbJEmvnTy66sj_MZqRKzj0`N4UBdNbXg;(g?Ob;Q*S zWk|2N*9LJKD7A>VVYePV-<$5duL~C8*R+V*ICPd$=df}&wtRQ43ULzab*0{TZ(i|i z3fF->bDJhtV@H$a=yA%BAeKT}y>mB>Biq>bTx6tEt|N1+yyf2FE zt7@S`pDtXpGxDgpqAJ(PWVtrty!c%O808{_++yDRo literal 1268 zcma)6!EW0y488j+2w#>0MzLL&lbbYvF=Q*&tUCljp-4-cZPA?>`-5&?gb^R57~eN{sq$brSiJfPxr7H}i#4ws^R z%F9@q7kLkyKli8ZUuPR|M>gGN0Xm3n5 z8ybcQ5>70I7I&<-n!^^uL{UcKjg$UrLGm&GF_QbrQP&bR6qfq1>%E J)9iVg{RZw)w~PP) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicyRule/MSFT_AADFilteringPolicyRule.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicyRule/MSFT_AADFilteringPolicyRule.psm1 index 861197e4f2..32c6f7d07e 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicyRule/MSFT_AADFilteringPolicyRule.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicyRule/MSFT_AADFilteringPolicyRule.psm1 @@ -41,6 +41,10 @@ function Get-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -122,6 +126,7 @@ function Get-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens @@ -183,6 +188,10 @@ function Set-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -316,6 +325,10 @@ function Test-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -477,6 +490,7 @@ function Export-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicyRule/MSFT_AADFilteringPolicyRule.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_AADFilteringPolicyRule/MSFT_AADFilteringPolicyRule.schema.mof index 7a35e431600f5e05fa5d32a9d9a85da26bf7917f..1e403ae94bc622f28e71c66e9199a5cdc77b5ec8 100644 GIT binary patch literal 3606 zcmb_fO>fgc6ntkS{=+I4KtdH<;gqJ06hTWNp&Y8J3bET-O&Sv?Edlkf12b>Ewv(=D zy{@dr?t1rq?aaLO-#;hPlc|g)!*wjNEO1X`F4yu>I`UR_Si`>N8za{U5w45Mv5HOh@G0?Nb5wBw^u%6#e8Bix!mzQ((O8EDhpBBewDD=VHb*{*B0t717)g<( z<49dJRUU0e^jMaB#jYpvBgf@HeQ%@lp{j6IsQ(f6DpgKcmOkXm>4jSt>h~kErrtPp z@b7|OD>AIQRSmktljHDaT5oi|QI9h);|4Y&^dV-< zN*@>6dVr@CJ%h?sTJ2y~2Ysg+aYyd9)@F}h$3DTF*okbP*so+CipieFN35`-RD-Ej za&e)zHci!!F--XO8(YqYu9VHjncKxm67vwWcjvI z&ahWFy&j`(_p`Mpsk%Hz6`O6c8^R7xVKE|bn(CCX*^ai)vbpy9FzwJkL`Egg{kW)R zAIgOhaJtftk>>u|R?^Q6s~7*niqY=0K;8+k#dEr2jb)WZUOU|NfRy_ld^HHICp!Vz zasf|d$pHFcv>!Xo4rS0Tw1ua$SUvEIr|O9;a(c6bMuo;t?c*tdUt(6zuGFppO4u#i SGQVnngnX>^>bbyuSNsD{x@j^1 literal 1617 zcma)6O;6iE5WV|XjC^S-S*X1>CleFNf=~)6Jwy@O>`urEXV=|bhq{RW-r0?*4I&%t zi{<%x^XAPgCKa>x7LAo!jnc0tU;LYXUMAcdV0JT|-{pBRm6byy)%}&OByX>q3JbJO zD&{CKc}jqu#V;crWF z?B65l`i}?FL^PMop@2HfVVGqQMyf-YnMBNv+W9nKv62|nBp|3k127Ws)0W3Vo8!XDA6l}7L@~3wxQ2} zM0SM%{}6ba0b9NDkq)EZddhu4$HbiPPuKYTvUh!S2`KER>JX zI58*)r(~6V*{DZt9xBbmCkwgQO67qZ;I5DMBy~0WpOLzxm~MgdzeEt^+{qn6Aq{e; zO$)59=_-U%08RsIXxRxT{lPHXp-l7MH!8QIMI9gILzHj1zpdCRr=>vKMkx9&$V)xW5O%Ms&$1- iK^Ig8?YK6QKIa_i=sW#@Dw?`G+fgc6ntkS{=+I4KtdHCH#ntfD@C+`Xj%?cg+gM2)uaw_LJ3v>IxzD#+qIod z6|aM=#P-_zK4#y{TmSuYAsrb@UveDhlE@6_R5H1ir_z#_vL`R@e=T_?m-1L1$>4sD zkrO$UBk9Q(Y2!G+b&98RwUxroNIt@9Cf{^C!Ci*uDQqm|80TxbQk%E>Z^RxK@)@&I zweuWf2e6l84#%b#^)Vj9-Ux^FW$@M<`Ov?C&kQpR?!N22%`=0YboI^(N=a(cOtXv*PRWgf)AltD9hLhN$?ZIO}BAc3jyF&&M_z4Pi|n79mlJAXx+)GLulDo;4suG9;%Krnm#I; zoTO6hqQ8cFnpZyZCWppd78I|3C+0fSj^(4#bFTWrQI7^Ybuml6`D?WfxvEVcsBE@F zbjf_$q{j)k&1xEAr@~B$>^U$Tt45sQY6@ke=6b6wyw%cP=_78*U1e^*^*rtvm=pWC z-7y?$mQ>dyT2(qa+bbM%V%Fu}cZ2&Gc2Q%T`#|A|zSG9lM5A$-)T_3TZ&ydW+c2jp~2kkcL8O?L0PO;xI7XysQ8RF;my?uS?5dIv&ADOq;-OkG+Kp!L zZ+BUqHI`Mj@|x9M2bHq!A%sCJp6mo<%Ltyxk}mYaX#aJZ9m}A7XbZn;6ZODv;-V+A m$mz`-8WkHqwU4_3eydwOyHdNmVt&zn5BXT@#eISMBKilb=*MCJ literal 1887 zcma)7O^@0z5WVMDjB@E#idOx&l~WcLDJrz6u-gMdE0YXh5$x1<*ru!f?;V?@2^Ba? zF36sFZ)V=icsb0O){m$(m*OV;c>BSA;rmsP+6$P@$BU;p9*uc!P;s%HDY@Y}&ScKh zYQn`ncnN@h%b$uHj9`R1RlG0`ZX&l^@&Rp_LD)zIW`{tyGUarVLE&I-i4W$+!b9yc zw;qG*$TP(y5mq2K9?XYCn9rY}G4|j&K0jC;U|(e4*a6=JbSj}W9|W(1AXr|JB7(8v zD6+h=wm0DgHTv~}FYtYuJl!#kKTyk3rPv7f6|4Vbt2G8ed|ho$v0hdCLGWKC0?$ww zzTv3;DPEkKri+zi9yK~m)Rgi9M90d5b*AhEls-M1=7AiKm|slk?QJ&U+SrU}gihmB zPk<}6?oP%tH#^taZO9SaAJ&*D3~gTjM6Vn#AY@W}EKr>uAhV`myhVGSI<*0=i7-HMilTLkxx z-XrW#q3bl3>!wMbrP}9`W$!e^*?|ii$d#J4-nKwBXM5=3O|phA{zC_IFa| k$OP0*iR&FxdEnzTMS22_+@tV9*Du4#eqqhsh|yC23k{`k diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension.psm1 index 7837cbb294..f607e9aacf 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension.psm1 @@ -45,6 +45,10 @@ function Get-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -148,6 +152,7 @@ function Get-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens @@ -213,6 +218,10 @@ function Set-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -349,6 +358,10 @@ function Test-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -491,6 +504,7 @@ function Export-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension/MSFT_AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension.schema.mof index 28ae9aea3095e6193adec6b5872118d477d90df8..49c055d21ae4d2adeb3ef5e0303d2e6d70eef2e0 100644 GIT binary patch literal 7390 zcmd^^+fEx-6o%JzrM|<6o3>IFg+{Ha_R7JKqBaQ%kX}TnGPVH=e5h?gX_Z$``+s|R zdB(#`fN@f#jVze)%--vK_}BK|Z(rG#U0BCv`npGJpJew@{q5XlK>0Kr%I^v#5w^iDic8t>dfn-6Nnbvm`-=6L> zQ9DbrV5vdkG1l|3B%SN+wsy~xw3#f|){`r(Ml$xEXx&uTj{c@e#z~?K58h7oZKykV z@T9-6&{R}Al7^iVeKI@NJEz7v=x5?^CT*NkPn52bCPB+}7-?TuYuu6#v@0y~I&m1t zBFKhkPm>H-!1>KZv9AyI`9?AHP*>Km!@u)nDB4w)gBN}|(Vk1KK;kOv!)-HBCrUj= zGdq+uvFsyp!af7>=}SlS!jEs9xhX~@P^FjrTx1}cJ#qsWJ^Q{d0zBRL~Fb! zN~g+wqMoSpSoDmY)%waa4S!+57uuQI%)Rr*{7PQ`cWW1!-;=$^vJa8^Ve1$5fDDLO z3?ET#Pm_njKY0%AFDy@HXYzflY^5kESL|mC4(n!6%l?$-sdiEG$lB>5hE8?IcWPR$ zQ#tZ-S#Q(It7^{S$&&uM`V{*hU5Q*MTfe9)*>|iQEO(*23*6slbu^K!shf1s2&AB73fH-`jWUi&XgNe>XcQ z9ik5ufGLVSo+t1$!RZPlY{1X*FlC06jF&Alm1+sw*7=g;t@@yZXJZriNeK ze{FFq;?|}a3c5z>$WiaR_#rChD*6b2x;EgzhyuLk6_Q?z-$0^s{RfX{@)OmV*kN{{ zkI^Y&2bir+b1)rV!S4fAd^mbvnW?8Atx+GCRzQIum7PQ#1lm(XU0c+2ko~_ut$cj* zQ)WNNO3#&FyPDq~C%^U+=3+vLu3I%f{Vb1N-!eP3Qyh}Z9j(oyFXA$KM={It8780d z>SAb>e)zU&)*LEI2KKwOCeG=QWjSNIx?Qq$`fK$p+FX`udQGiVoVYV(e%;KS*X!`| zP3uLLZmYJ?OM3e7pPEeliqitJ_2WNfh{VBOxv(?e@b2dK_gZ5DM5`@gjN>so6eCDYt-b5#rU=t=mr@A3N8#>K#+2Yxo#690T zyYs#y>5ER_F2`%z1?`*1JMvM#vFJdWT!>4#Yh5M0cdmD1t?1boX-!LaoC1!PHo0F% z*h;opp_9$I@;|gzu=vG zW{L`MKaZ}jB~#1$i~d!6RmVk9`=+^YplI~-ZYDx9d0k6Z=Z4pdcf|?_h-sc|;-nzY z8qX?^y!GO4tCB;N4Vv1MPC&NsiwardzYKwqqh>eFpvS5$W7Xe&;=pfGMNVW<)Ej=g jYbt-7C~+#_^^D&wsBKN~w8x+ncu7F+)BshS52 z2|FZ_EptKYuIhS!U(NkQ3-8~f^U9iw{^f8q9QA*E=%suN^V{pi$MJZYNHjr(-D~@Z z&Ips@8oNbZo&8bndR5=jg}1@P-gO44pkDMc0xrtHWN*pWw}l>{fuilja1g)O3i z7o!mfBl&-HD{&Zor0e2EThM)3uw z@cCTiV#BxgIP~#NGKBX+N4ld&MnJi`1VNebu_&wyD2I?_V4~K8QdQQ`a8@~s9^Io# zk&{SO_3fajW-5>QyUMex-j}Oh@BSOM)y&Aks{hznM&!t$b1d4fRLYT*QQT5O&8j*a z7e&+0e~`kN%8Wln${=-|jgC^YayAxF8fvn3(o&=Fn&r=!sRl1oRq@&R%BYXa{p6IL z|7=`s$wYQUbmw$uf}+#kzP1yg^-`ppe+?RqLOEJMv&E>9+`ffhejZ&`hYg+#VVtH| zP_G}K`*IMP3D49c!H_aBG;`z-VNE6WL%61Cz$cLxn!xL3@zcD_{gDcz!_DI5Z*^5# z%86Mc!=9|LDJ=o>0G6jBZ#QU-9n%^eJ1Y4``M{;54)8nHpOvdl&Cxj!yN`-6V{aQ{nv>rdT1fUj76R+{fhy2Em} z6}sGv*v&0%wAu>!gNLysCg_-f$zGdtRogrqcGx`tK}G0e+C7PQrpnP4YTd3{w9;~E zX0T=i<{g|)$U_y@Z3rSz)_g-OX(E11$Xv{}a}VPyGeOVT97aYr}$*SDS{*@^49 z(AkAyVqahBN;*1{oIk%W(8de{B)rZs#){8tEHKAwwD1ml*x&qGc!ReHIHcA!b>|rI z>>WPw{0-lABI4CSOo`-c>aD5K<%tDXV+?Ii_PgAfQ9h*njFPoU=D1`8^3=yG>`%2Rdx?5 z31m`}R-HH5be6ityUHhVv$|_ndZ@}l-F)inrf#{UCv{28uT8Lt=wGY)9aR2iJoZ%n pe^NJo%|7vUx39);&{tu}*ZX2Ghme^63*9a09bx{&cGdACP<%G$!u}$hG=`^(9P@bg*Tl8m2Q> z)bOGTYvQv)umpqONQ0}W_A!R0s(eo+lzy}UYCqSo;2;_yr-i%<%pI|E8b=M=uV5Mf z;>)+dp^|7t7$8{MM@C(s3TVJPD8=fl4+a7fvZz?Yt@rZZ3C&MQdXSuPgP*y1ix#8E zqvYSbV<{gStqKA!8g>Z6vM;y*Cw3~X;1k~Ym`IEevhuV^l6qy{4&C6wH_rOqvQ_-6?uXH diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADLifecycleWorkflowSettings/MSFT_AADLifecycleWorkflowSettings.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADLifecycleWorkflowSettings/MSFT_AADLifecycleWorkflowSettings.psm1 index 94f4ab10ca..1dcb3368d5 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADLifecycleWorkflowSettings/MSFT_AADLifecycleWorkflowSettings.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADLifecycleWorkflowSettings/MSFT_AADLifecycleWorkflowSettings.psm1 @@ -32,6 +32,10 @@ function Get-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -77,6 +81,7 @@ function Get-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens @@ -134,6 +139,10 @@ function Set-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -209,6 +218,10 @@ function Test-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -329,6 +342,7 @@ function Export-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADLifecycleWorkflowSettings/MSFT_AADLifecycleWorkflowSettings.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_AADLifecycleWorkflowSettings/MSFT_AADLifecycleWorkflowSettings.schema.mof index aade9737444c781b2240169217a14c3407de5daa..9fdcac19d4ca9a0a43a0879327cc65d1d1a48946 100644 GIT binary patch literal 4486 zcmc(jU2hvz5QgU(iT|+5O+Z2jTCU*ANg81_rYLqBP!%D^b`q=plGjceQ2#pZ`^@;{ ztnEz+4id7~yL--@Gav6ebH@Jo_gg!(k#()q=Zy_)uKUoYHnFd4&%U>B?YsMH&%U;A ztgvHA4JA9VzSiE^FIqp=J1ZLc9NCHHFE!HBY)>)+JJX(Xd#BNno^GwJv4uWE?Q$iZ z?0s%u+7~V#_7v8V+_81+kDd1|>_=JrN;@^R%Yl13uv2L-WyexB_4JJ1zx=z9G@rNj zQsZ~-?~zOQ-0PX!oZ|CJ))RrkZnX1A-t_OEms(Y5q}2Dm{qB40E0!sWZ+rz(Ej`Vo ze{UtVXCGW|mMAx7&$VY;mVg8CE970Nk$5BCO^uh5=<1G#KW%t-=4%(40nvv&Y|Aom z1Wz!>n}uELsgSQz;ofzvG1}E!A(?BB?Z~5X;j&AO4*dPrS5I6nIFx)Ctack|ZlWDv z2U>g5!81`W6~RJ`xYj$itlKaaqIg|cXuXk6VidN64Y~^LG}lVzuzPwhpR7d3ncF?r zcTW;yXE=k07$Au}&?aTO)U006Z(Eijt;jr&ax$qe{P7ZQTU+Jo^=U~OjzVw*o z%9^wBF*Tf+Kctn~5j-X9sVY=HR-{_ek_4ynRMx`)5X)8v?~^Q5ex~_gN*aBPwQ#h# ziXz!jwcwv^k8_AhMC~P)F5O}noUEv3RYGF!SoEFqobObxYQMCeIaQugrP0G_8NEr^ z5Idk1Oz9mGuOGt@YQ}-qL?s4&tg8BdqJ4ue=~RP93-691zr%u@GY48R)xOkYEPm}? z9%^hXtQfo7(iyoyzm_|-$M!OZvWFZ52bhmf)Vy_0q^by$x{?k=8hVNfl=?SL0V3P? z9s64y7u|5~U+Z*7&kMHIPOeUJ*NV`TZJYizl=<|%@VKG;ArkaSbRI(=XN*cgUmINt zy+gGNODv*N28$!2A;VtjgkAII=||@O($7GbKTF5 zvkfjU#E{*+ql2KPLwdlWhhLSI7 zx7vrb0bh8TIdjgL(cRQw2%pFY?d2-|%6PeZ9m$Hxyj$6%D=*fM0j-s2RbGg7SJB z6PORyH1LQ<=ki$-=m2M5D4dN2-zQmG;P(5Fmxe#Oh0y)Ihh_8(4zjT1FGHCP5v`(& zHruV&k$%ay+>+9TrU0=d$X$in@=uHqN>`g4)&zB+9CjsH2+WQoAUEB{;o)}c-PUW2 z1he^ z*O@qgudNldNo=m1EZS4agDNSn4GSlg(i16$j~E?sM5c1(u?72St2fLl)juZM3A66ye!-B4OwzQm0KjH578c$td9nd_X!RW%(CE z&|L0AwfV1w7il!|v61=10g^D6&Kcss9|KLfLC`k)n-_yWPnfBvoNUx+!k!25p>ddV z8IzpdBctuAT2s#S?`PKeFb&q@ZRv>6&bQ-Yj|;MVpKkK4=B}Hls2_Q5XztbMd;>g9 zOgFuRAFNpd#>w-HQs1BU;N*BV%l}W(uG7*;mDW1RD*biR_N%0HZ?;ugS8JY!+`65^ z{<~D>{CQ4LtaCfZ#jI)k_9L4fFB}o{kg`CF8*Z#@#T_Eo<(S$8Q*-ib|5_=!@) a&*A8#QTjr6PsjHBN{)xS`-{Pki@{H#sn~x2 diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessForwardingPolicy/MSFT_AADNetworkAccessForwardingPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessForwardingPolicy/MSFT_AADNetworkAccessForwardingPolicy.psm1 index 7669ab915d..9d9f749d13 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessForwardingPolicy/MSFT_AADNetworkAccessForwardingPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessForwardingPolicy/MSFT_AADNetworkAccessForwardingPolicy.psm1 @@ -24,6 +24,10 @@ function Get-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -76,6 +80,7 @@ function Get-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens @@ -120,6 +125,10 @@ function Set-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -235,6 +244,10 @@ function Test-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -383,6 +396,7 @@ function Export-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessForwardingPolicy/MSFT_AADNetworkAccessForwardingPolicy.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessForwardingPolicy/MSFT_AADNetworkAccessForwardingPolicy.schema.mof index 78c92d17478e1b27641104cd421a466ddadcefcc..61dc5b0a64fac084f044eb84d4f16fd121545435 100644 GIT binary patch literal 3486 zcmc&%O>fgc6r3{>|6$b&Afbwn8=TUVpa=?88_FR<$TTjsnl{098ilHV9hlk8OWbq= zjg3H7Y-h9k-oEk7Jm=?+KH3-}LBZn)DRN#jjBtU6*uqn6hn%@$Paf)}0TVl%b9A{{8-Z4j%vE#?4oR?$32p9N@eU1%% zv>6UC;eG1!Uiq^_IQsa=H5uckc+9a~A5lBVn6u>BYN*C@i-?Z9N^s6q+gyFX>o?}g zxIX1hLbZ<7l|G{OwOsMC=1x?(?abkl`G?G@9mMlh=N~O**UjF;jL4*{L(gZ4L_D`4 zZ>#ENeM?LWR&81JG;)3~Dph|#mruULb3Eg`<%~WVS2yoIvy2#XM9jq}M|Kl{YuBGTUzOOPN&?(fXK`iN|54P zJa!u>HekEnCz{50c)<$Z({H+TogE@t5MSw6zB6HE@)qU4T2bj6j?ez!73K-X){^ce z#hfs9P6w;{l%txKP8H{r#rs=a%IAJqa8JRr#qZ4XO1|Yh<8?muy1UEHgZqdVujq$g zSnq&`&QhhAoA4@B#gBjG_;Ea|UTzLmPy^-@dhVNdh&G?C>Xjm-JNbkV4nAodu>LjV zc*5Ba{G1l=&b_uxU7Mj8%Wbs_d-b!>ePT1~@~X>Suh!SXcdsAu-8#=DF;Q;~eNo*@ zI+$@xoqbH4)b*FHX8cPSDc}|m4RaK0$`$%$eb0-<)qek9t$N3hcdHi1%H%l0FSvrR zh*cZjK-SgStHf+l-67-Xtw(QI&7NrUDmV9#7^jW>H@jjh%C~Cub@|aF8z4C>;!=arK1jX9{KOaE}bub7k7 zRnQJmP{&Pu2L1bxCM}axWDZ`^qw4Oz`u`*#f9B&F{!Nu%jo)KEA$qlo+56ou<1<)? literal 1557 zcmbtUO>f&U487-95V@=af}q=O>&Z=)!PwFTY1SQrqEIBJ5$Z^uBscJe{r8e`5_=z2 zhRsKsO4)N)h^?{Cm~ZOvK#)$n|H-hX-9lN^TW^<;53)zVpS*WtYr<>m^*&bo(8 zO7wnW-A*{A&Hc<4TGsQbz~1*B(6{{Jbie_O(MzYx5ZgCdz-e$Lwm5`2eyy}aMVN3M z9CeC6E}rj^N$v%YqNs4#DQn_498Od(>Jq`OBZW>eGvZ%~%8%LyuAEsHd<6cSoABm! z6Ik9RN@vanD{TRhT?h8?BT;*RRp^5@f@g2g_iB;8$2gPtanb87|FBeE>i{NBqftf8 z;-B@iY@A#tG3^@RR64wcPt*MFQh1!Bx0RDeGkn1M7b`FWmNRS+)<+vb8GY1|i1YqJ z9!CrGK%TWyi+~D(rPkX2-kVl8fOp#!DupUHJ_sX8i+{0thi2=4&s%ujz9TX_nxIAD z599Ma6;`Mh9x}DnCPA>RW^CUaOdCuHm8%0>_N{UVd@hd&V>&(=tgAtkC7p0I7>g$= z+6?ie2*OT>%}=-1=H}{uKm!_K0#u$hMlR^0lF_@6i>KV9M1p% diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessSettingConditionalAccess/MSFT_AADNetworkAccessSettingConditionalAccess.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessSettingConditionalAccess/MSFT_AADNetworkAccessSettingConditionalAccess.psm1 index 4b80f2f5c9..e95c5f25b9 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessSettingConditionalAccess/MSFT_AADNetworkAccessSettingConditionalAccess.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessSettingConditionalAccess/MSFT_AADNetworkAccessSettingConditionalAccess.psm1 @@ -24,6 +24,10 @@ function Get-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -62,6 +66,7 @@ function Get-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens @@ -106,6 +111,10 @@ function Set-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -164,6 +173,10 @@ function Test-TargetResource [System.String] $TenantId, + [Parameter()] + [System.Management.Automation.PSCredential] + $ApplicationSecret, + [Parameter()] [System.String] $CertificateThumbprint, @@ -266,6 +279,7 @@ function Export-TargetResource Credential = $Credential ApplicationId = $ApplicationId TenantId = $TenantId + ApplicationSecret = $ApplicationSecret CertificateThumbprint = $CertificateThumbprint ManagedIdentity = $ManagedIdentity.IsPresent AccessTokens = $AccessTokens diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessSettingConditionalAccess/MSFT_AADNetworkAccessSettingConditionalAccess.schema.mof b/Modules/Microsoft365DSC/DSCResources/MSFT_AADNetworkAccessSettingConditionalAccess/MSFT_AADNetworkAccessSettingConditionalAccess.schema.mof index d547a01e5f14fbfa69f3bde8f27de6bc5bd24e01..d2b386ed96f87f2cd7369d927ec966e6112011d7 100644 GIT binary patch literal 2590 zcmc&$U2EGw5S-^i|HI)IClE^e+CDjU3Z|ri+N6|Vf?~_5h+~;ZYDi1|dfS;jpQFff zp^_mS*2mr6?#|roT7Q0DppOM2WE|&+amRat6iXbSgLim?x0_!Fhd6@6M_MJcU1G+) z5BSXew|v)*9>;()F>>6~&mC?!Gv$aa#>iH3?qA}Xu@z~?H_hldqQ|nmVovZHujnD< z>2Qh>vl!!Y@9`Yo6X6*n4C(#Yn2GVlvQJSEkB}&zUv_o0*0{hY&OaDG1GAnQOREhs zv2#X*V$9)(Ax(%qJQv*M$U??z7vIcBm)r-|&uxdSPWiNA{Lb2{gGY<|WRX=?C-gaD zCOS9q?uahqjDK6u=aBOmEh659@IwXNSKFI&MGDxB@Pzv#ToI+v^m#stoG_+8+Yo)WhtBN3|+e+4sX%30rXn^|tE1EE#UDdxQ9_->hpY7zqxGwzyAk59M8 zQ_#r?->U8S&?M}2kN_D3FssDMutk*>ueN%mmsm8);c10f5@!B$3 zUmLz({7Wn9uj;z0nEA7+@l~ZBry6RbyMAqiIu4rhseeaR%QYjZ%M95+oOQ(TZ{l%i z?f;M*v$v$|&9Oz$S4cUMswniEoIR>({^hS9-_LH$@4hO(?0-x=-h0L`n8`Zl$MyX$ D#b&~o literal 1121 zcmbtTUu)Yi5P#37IQ$X^O4wePCpSsKjI=O^juAppq)Q^INJe+g$V$KaPH|did+-Xg z!N$kk@88L*sZ&Ic7|8~oXP?KP(w&WN;4WJ9#+~lf0rRXVX7|WHLwqi@MxqLtt=~<9 zHBc4%}bD&*l45+%M(HK%HHRDAofr~-t>=nWbX-#|&z-$&%YAd$)Us3lxK+vgPfpMn*=}3kl7mS5hq7rm&?)E% zWud&WE>ZWvEly`DH0rDfLC~dm(_28Lma{3Ev=TcO)%%) zTfFD~8$N5th-1u|7+d_HpAEioCgO-K#?)4}+@D~<*c;j?cEI_BeiH7h+biY_&+&{N z$~+y;Fl812zC3z7hu1`S&Il8FKQ?A!e6;LSxg< z=aiY~+{C*hx{NdaX+@tC&S$jH2?*hv2D(qScgqzi;9-QP+#lkK*o3Bjs;*$sXAxDr z2=BEi#X-BZ9$JQDUJsZ}O17lTGIuez;+hnpGZBYkWK9HzWXx3x68mw3W5o;UP5F7v z`E2DydUdqdDU>MY#To2#cwgloxFe$4rTl>R3l5*Lm=F2O>9s4bsuUqn#!{3x5R#PK zInI3LimNJ4yo9tKn$3uJHriZ^wwm)!ym>~wjc0LbE57#j&wXTC zYx-5bPlr`HFZ-u6rFq?#l@)SsAFXHPA)NKY9K33&}ID_fEoW ZyXM_g^6rZ*ARg~M<5$kC$oa1L{|jk%%2EIT literal 1139 zcmbu8(Q6t(5XRsAD~5YfAxQdKpDt?PC?=&!N)ZX;?x>6F?y<9Hu_6C^XYVf6_Td`H z38xOb^ZmYWc2^UN%uf{9csIyCjc(H?8{WWuFyyp7Kj4uDS)NZHDE{=}kSj&Z3yRUW z-6VMCB{_7lsb|A=Poky%+Hn0_4EzCX;oCxJA%XwWkFEyO)Rnwj;e`wY208kaJf z9XF&k={NI(te)0ocj8DkC8$fWL$?qcja>e#5^uTWb0V0UKq~rhPB~bkFr^0316G12 zoKg`&6ZhB7^UK;oe?&Ca2NNoml+&cHRE6VOvYBnC+HzkVH>E@p-)~hi|63Cjg=n^o zZ^=Q>{zEpoY`73~gfd5mJMk;$aYJc-UGDF^w}cMbO+|fn;<=-JbIWCf2XdXQ+iTXW OU#8`}T913L2$ZZw=+At^1r{A=wgZpIj?gh$oNb##|&@K!Uw#=`^~R~1H47RF|AVC&Jc6& zExvI7PrhqMhgT1$Tsxyx!ugaQ6aLPy!WHfH{)6`!uFYnS3E!q>GvIy6%U5&yJHQC9 z@e1QjlmRCgFoq$%Kl5n;ABpai{`>TOXsjgoYLU$uea0vfi{{Smf!4Y%@tO0t#!b(x z$HvgYkQ7{s6R{QWi=M?pycw^!D{v;~y^Ra=(I)Q&RNw&I8fqobfmD-sgNyi-=Dl{IrGco9$h4McLnt@QC{(%dzqusGz#BrbAoh6|>q~+X{BqWZr8dJPR zCOwt8dn&pv&rEopbT5S}hb77-H7zU!hAAV7Xx%oO4o9kl*(Re$e7`b(@)$qLfoiGL zdEMDw8-f0-xvjHonoqG?WU;{4!5^yxVeMFUQtDZ6J>nBXMaHCbX?0;*A9F0$R1JZn zxvj1^5^v6^+c=A>%zv=YNgSI_CTJ^FRH0vf2Ou literal 1075 zcma)*QES^U5XayBDGt9Rg;KWH<;hJ_Fe6J?LdOW9$kL?|l_jH-GrZF8zLT7gFgCX~ z*w%4(|NrkKZ>L5OJ)$S=>^T2?_bJ}_%`H55jaHfNo2YS|7sYI8R~~CkNUOFonhx4N zue{r9gS5sFcuD!qE|ak%EY=U3rw>-a7g#RJr+Y#89m%y`V)mK=U)!(P-NFn>dfkL% zacNBlM`5&z&lW)wjD8}G?xO3*7+Q$tHRn+Nb_&pGxr24^>=Q~_^UGjqDF`cZ(yRUO zI^bV=b1Nz)1h)sJssC=gK8k=~F~Be9UqCu*Q3mG;w1v41UO=hX(GKpNGbk)e_MOxu z`@h)Kqe2_BFi9{RF!eW1s1ZS-YHcIsysl6wRA>9+JdOKO9fhe!y#xm!OBMN|T=Bd0 z{FFf-5oX#ast!cc7%fHI0tgO7%em~6BkWLzLqa_bx47h%Oq=%cUz2@TG@unWKuf4# z@BFnY`?!|eq|8CJ&7rL;-Z*afVN{;^6=`Ib=!4$(+&l-i_KvgZrQqUVU?>Y=#WVAk uGpH~g)gk)x**X=K>Fk7VpnV}F^4}TU3);cf=e From 2e061a04f19636b9f7c81e8792008a6b563e8e34 Mon Sep 17 00:00:00 2001 From: Dan Lag Date: Wed, 20 Nov 2024 12:37:52 -0500 Subject: [PATCH 2/4] Updated Changelog.md --- CHANGELOG.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 3380151965..754d43817c 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,6 +2,8 @@ # UNRELEASED +* AAD - Added ApplicationSecret auth method to multiple resources + * PR #5409 * AADRoleEligibilityScheduleRequest * Adds support for custom role assignments at app scope. * IntuneFirewallRulesHyperVPolicyWindows10 From ca3526456fe108a05ccaeb6b51d0a3266aa08793 Mon Sep 17 00:00:00 2001 From: Dan Lag Date: Wed, 20 Nov 2024 12:43:32 -0500 Subject: [PATCH 3/4] Updated Changelog.md --- CHANGELOG.md | 78 +++++++++++++++++++++++++++++++++++++++++++++++----- 1 file changed, 71 insertions(+), 7 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 754d43817c..ebde2a7d8c 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,10 +4,81 @@ * AAD - Added ApplicationSecret auth method to multiple resources * PR #5409 +* AADAdminConsentRequestPolicy + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicyAuthenticator + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicyEmail + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicyExternal + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicyFido2 + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicyHardware + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicySms + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicySoftware + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicyTemporary + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicyVoice + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADAuthenticationMethodPolicyX509 + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADConditionalAccessPolicy + * Fixed bug where a null value was passed in the request for the + excludePlatforms parameter when just values were assigned to includePlatforms, which throws an error. + * Fixed bug where a null value was passed in the request for the + sessionControl parameter when there are no session controls, which throws an error. + * Fixed bug where a null value was passed in the request for the + applicationEnforcedRestrictions parameter when value was set to false, which throws an error. +* AADDeviceRegistrationPolicy + * Added error handling to Group display name retrieval to prevent errors + when an assigned group no longer exists. +* AADRoleAssignmentScheduleRequest + * Initial release. * AADRoleEligibilityScheduleRequest * Adds support for custom role assignments at app scope. +* AADRoleSettings + * Fixing issue where the ActivateApprover parameter isn't processed correctly + when an approver does not exist. + FIXES [#5423](https://github.com/microsoft/Microsoft365DSC/issues/5423) + FIXES [#5415](https://github.com/microsoft/Microsoft365DSC/issues/5415) +* ADOSecurityPolicy + * Fixed an error in the export when using a Service Principal to authenticate. +* AzureBillingAccountPolicy + * Initial release. +* IntuneDeviceConfigurationPolicyAndroidDeviceOwner + * Fixed issue when properties `DetailedHelpText`, + `DeviceOwnerLockScreenMessage` or `ShortHelpText` were defined but the + request was not being sent correctly + FIXES [#5411](https://github.com/microsoft/Microsoft365DSC/issues/5411) +* IntuneDiskEncryptionPDEPolicyWindows10 + * Initial release. * IntuneFirewallRulesHyperVPolicyWindows10 * Initial release. +* IntuneFirewallRulesPolicyWindows10ConfigMgr + * Initial release. +* IntuneMobileAppConfigurationPolicyIOS + * Initial release. +* SCPolicyConfig + * Fixed an issue extracting empty groups properties. +* TeamsUpdateManagementPolicy + * Added conversion of the UpdateTimeOfDay parameter to the local culture format + so that the comparison will work consistently. + FIXES [#5424](https://github.com/microsoft/Microsoft365DSC/issues/5424) * M365DSCDRGUtil * Improve CIM instance detection for specific Intune resources. @@ -35,13 +106,6 @@ * IntuneAntivirusPolicyWindows10SettingCatalog * Update properties to be upper-case. Fixes [#5373](https://github.com/microsoft/Microsoft365DSC/issues/5373) -* IntuneDeviceConfigurationCustomPolicyWindows10 - * Fixed issue where `Value`, from `OmaSettings`, could not be compared - correctly if it was boolean and set to `$False` - FIXES [#5384](https://github.com/microsoft/Microsoft365DSC/issues/5384) -* IntuneEndpointDetectionAndResponsePolicyWindows10 - * Remove changed property name from export. - FIXES [#5300](https://github.com/microsoft/Microsoft365DSC/issues/5300) * IntuneSecurityBaselineMicrosoftEdge * Deprecate property `authschemes` and replace with `AuthSchemes_AuthSchemes` * M365DSCDRGUtil From edc9625b866a0e2c7f8a177cbb80255f8d99eee8 Mon Sep 17 00:00:00 2001 From: Dan Lag Date: Wed, 20 Nov 2024 12:52:08 -0500 Subject: [PATCH 4/4] Updated Changelog.md --- CHANGELOG.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 7269142354..ebde2a7d8c 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,6 +2,8 @@ # UNRELEASED +* AAD - Added ApplicationSecret auth method to multiple resources + * PR #5409 * AADAdminConsentRequestPolicy * Added error handling to Group display name retrieval to prevent errors when an assigned group no longer exists.