-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
⭐️ extend microsoft entra id application resource to search for expiring credentials #4516
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This comment has been minimized.
This comment has been minimized.
chris-rock
force-pushed
the
chris-rock/ms-entra-apps
branch
from
August 9, 2024 19:28
46654c2
to
8418a8c
Compare
Test Results3 097 tests 3 096 ✅ 1m 27s ⏱️ Results for commit 8418a8c. |
afiune
approved these changes
Aug 9, 2024
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
tas50
reviewed
Aug 9, 2024
tas50
reviewed
Aug 9, 2024
That would require us to mock the azure api. Seems like azure does not have this. |
Co-authored-by: Tim Smith <tsmith84@gmail.com>
Co-authored-by: Tim Smith <tsmith84@gmail.com>
tas50
reviewed
Aug 9, 2024
tas50
reviewed
Aug 9, 2024
tas50
reviewed
Aug 9, 2024
misterpantz
reviewed
Aug 9, 2024
misterpantz
reviewed
Aug 9, 2024
misterpantz
reviewed
Aug 9, 2024
chris-rock
commented
Aug 9, 2024
chris-rock
commented
Aug 9, 2024
chris-rock
commented
Aug 9, 2024
Co-authored-by: Tim Smith <tsmith84@gmail.com> Co-authored-by: Letha <letha@mondoo.com>
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR adds a new applicability to quickly identify expiring credentials for Microsoft Entra ID Application Registrations.
First we connect to our Microsoft 365 account via shell
cnspec shell ms365 --tenant-id bb22a034-d544-4b9e-a222-6a166840f64c
Quickly see all application in Entra ID
Just type
microsoft.applications
and you see an overview of all applications and if the application has expired credentials.Verify an specific application has no expired credentials
For applications it is essential that attached credentials are valid. This can easily be tested via:
List all application with expired credentials
For operations, it is important to see easily all applications that have expired credentials. This can easily be achieved via:
Ensure no client secrets are used
To verify that no applications use client secrets run the following queries:
Application details
We extended the details for applications: