Skip to content

Commit

Permalink
Merge pull request #1 from microsoft/Dev
Browse files Browse the repository at this point in the history
Update
  • Loading branch information
MKlingner authored Nov 16, 2023
2 parents 4b425f4 + 433af4d commit 3daa065
Show file tree
Hide file tree
Showing 64 changed files with 7,004 additions and 126 deletions.
73 changes: 72 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,78 @@
# Change log for Microsoft365DSC

# UNRELEASED
# 1.23.1115.1

* AADApplication
* Added support for the IsFallbackPublicClient property.
FIXES [#3906](https://github.com/microsoft/Microsoft365DSC/issues/3906)
* AADServicePrincipal
* Added support to define members.
FIXES [#3902](https://github.com/microsoft/Microsoft365DSC/issues/3902)
* EXOCASMailboxPlan
* Fixes an issue where we are not able to set the settings of a CAS
Mailbox Plan by specifying the Identity without the GUID in the name.
FIXES [#3900](https://github.com/microsoft/Microsoft365DSC/issues/3900)

# 1.23.1108.3

* AADRoleEligibilityScheduleRequest
* Fixed incorrect subclass MSFT_AADRoleEligibilityScheduleRequestScheduleRecurrenceRange
for range property
FIXES [#3847](https://github.com/microsoft/Microsoft365DSC/issues/3847)
* Fixes issue where creating an entry that was previously removed threw an error
complaining that the role eligibility already existed.
* IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy
* Initial release
FIXES [#3034](https://github.com/microsoft/Microsoft365DSC/issues/3034) 3/3
* IntuneAccountProtectionLocalUserGroupMembershipPolicy
* Initial release
FIXES [#3034](https://github.com/microsoft/Microsoft365DSC/issues/3034) 2/3
* IntuneAccountProtectionPolicy
* Initial release
FIXES [#3034](https://github.com/microsoft/Microsoft365DSC/issues/3034) 1/3
* IntuneDeviceConfigurationAdministrativeTemplatePolicyWindows10
* Fixes typo in Get-TargetResource
FIXES [#3869](https://github.com/microsoft/Microsoft365DSC/issues/3869)
* IntuneDeviceConfigurationEndpointProtectionPolicyWindows10
* Fix an issue where the firewall settings were not populate correctly
FIXES [#3851](https://github.com/microsoft/Microsoft365DSC/issues/3851)
* IntuneDeviceEnrollmentStatusPageWindows10
* Fix typo in the catch of Update-DeviceEnrollmentConfigurationPriority
FIXES [#3442](https://github.com/microsoft/Microsoft365DSC/issues/3442)
* M365DSCDRGUTIL
* Fix an issue where temporary parameters were not renamed during recursive call causing a Model Validation
error during creation or update of a Graph resource
FIXES [#3582](https://github.com/microsoft/Microsoft365DSC/issues/3582)
* MISC
* Added a QA check to test if all used subclasses actually exist in the MOF schema.
* DEPENDENCIES
* Updated Microsoft. Graph dependencies to version 2.9.0.

# 1.23.1108.1

* AADExternalIdentityPolicy
* Initial release.
* O365OrgSettings
* Force register the Office on the Web ServicePrincipal is it is not present.
FIXES [#3842](https://github.com/microsoft/Microsoft365DSC/issues/3842)
* TeamsTeam
* Fixes incomplete import due to error "Cannot index into a null array"
FIXES: [#3759](https://github.com/microsoft/Microsoft365DSC/issues/3759)

# 1.23.1101.1

* AADRoleEligibilityScheduleRequest
* Fixes how the Get method retrieves existing instances for Groups.
FIXES [#3787](https://github.com/microsoft/Microsoft365DSC/issues/3787)
* SCSecurityFilter
* Fixes an issue because Region could be empty
FIXES: [#3854](https://github.com/microsoft/Microsoft365DSC/issues/3854)
* SPOSharingSettings
* Fixes parameter validation of ExternalUserExpireInDays and ExternalUserExpirationRequired.
FIXES [#3856](https://github.com/microsoft/Microsoft365DSC/issues/3856)
* TeamsComplianceRecordingPolicy
* Fix an issue where the Compliance Application ID wasn't properly retrieved.
FIXES [#3848](https://github.com/microsoft/Microsoft365DSC/issues/3848)

# 1.23.1025.1

Expand Down Expand Up @@ -44,6 +112,9 @@
* IntuneAntivirusPolicyWindows10SettingCatalog
* Added "-All" parameter to retrieve all settings from a template.
FIXES [#3722](https://github.com/microsoft/Microsoft365DSC/issues/3722)
* IntuneDeviceCleanupRule
* Initial release.
FIXES [#3599](https://github.com/microsoft/Microsoft365DSC/issues/3599)
* TeamsGroupPolicyAssignment
* Fixes the export of CsGroup, when the display name of a group is included in
another display name.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,10 @@ function Get-TargetResource
[System.String[]]
$IdentifierUris,

[Parameter()]
[System.Boolean]
$IsFallbackPublicClient,

[Parameter()]
[System.String]
$LogoutURL,
Expand Down Expand Up @@ -177,12 +181,18 @@ function Get-TargetResource
}
}

$IsFallbackPublicClientValue = $false
if ($AADApp.IsFallbackPublicClient)
{
$IsFallbackPublicClientValue = $AADApp.IsFallbackPublicClient
}
$result = @{
DisplayName = $AADApp.DisplayName
AvailableToOtherTenants = $AvailableToOtherTenantsValue
GroupMembershipClaims = $AADApp.GroupMembershipClaims
Homepage = $AADApp.web.HomepageUrl
IdentifierUris = $AADApp.IdentifierUris
IsFallbackPublicClient = $IsFallbackPublicClientValue
KnownClientApplications = $AADApp.Api.KnownClientApplications
LogoutURL = $AADApp.web.LogoutURL
PublicClient = $isPublicClient
Expand Down Expand Up @@ -259,6 +269,10 @@ function Set-TargetResource
[System.String[]]
$KnownClientApplications,

[Parameter()]
[System.Boolean]
$IsFallbackPublicClient,

[Parameter()]
[System.String]
$LogoutURL,
Expand Down Expand Up @@ -680,6 +694,10 @@ function Test-TargetResource
[System.String[]]
$IdentifierUris,

[Parameter()]
[System.Boolean]
$IsFallbackPublicClient,

[Parameter()]
[System.String[]]
$KnownClientApplications,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ class MSFT_AADApplication : OMI_BaseResource
[Write, Description("A bitmask that configures the groups claim issued in a user or OAuth 2.0 access token that the application expects. The bitmask values are: 0: None, 1: Security groups and Azure AD roles, 2: Reserved, and 4: Reserved. Setting the bitmask to 7 will get all of the security groups, distribution groups, and Azure AD directory roles that the signed-in user is a member of.")] String GroupMembershipClaims;
[Write, Description("The URL to the application's homepage.")] String Homepage;
[Write, Description("User-defined URI(s) that uniquely identify a Web application within its Azure AD tenant, or within a verified custom domain.")] string IdentifierUris[];
[Write, Description("Specifies the fallback application type as public client, such as an installed application running on a mobile device. The default value is false, which means the fallback application type is confidential client such as web app. There are certain scenarios where Microsoft Entra ID cannot determine the client application type (for example, ROPC flow where it is configured without specifying a redirect URI). In those cases, Microsoft Entra ID will interpret the application type based on the value of this property.")] Boolean IsFallbackPublicClient;
[Write, Description("Client applications that are tied to this resource application.")] string KnownClientApplications[];
[Write, Description("The logout url for this application.")] string LogoutURL;
[Write, Description("Specifies whether this application is a public client (such as an installed application running on a mobile device). Default is false.")] Boolean PublicClient;
Expand Down
Loading

0 comments on commit 3daa065

Please sign in to comment.