You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Updated DSC Module throws error when performing Test-DscConfiguration, when evaluating AADRoleEligibilityScheduleRequest.
Microsoft 365 DSC Version
1.24.1120.1
Which workloads are affected
Azure Active Directory (Entra ID)
The DSC configuration
# https://microsoft365dsc.com/resources/azure-ad/AADRoleEligibilityScheduleRequest/
AADRoleEligibilityScheduleRequest 'RoleElevation' {
DependsOn =@(
'[AADRoleSetting]f28a1f50-f6e7-4571-818b-6a12f2af6b6c'
)
Principal ='sg-group'### L1|Group that is assigned to eligible assignment
RoleDefinition ='SharePoint Administrator'### L1|Role that is being targetted for eligible assignment
PrincipalType ='Group'### L3|Represents the type of principal to assign the request to. Accepted values are: Group and User.
DirectoryScopeId ="/"; ### L3|Identifier of the directory object representing the scope of the role eligibility.# Id# AppScopeId
Action ='AdminAssign'### L2|Represents the type of operation on the role eligibility request.# IsValidationOnly
Justification ='Assigning permanent eligibility for Pentesters for SharePoint Admin'### L3|A message provided by users and administrators when create they create the unifiedRoleEligibilityScheduleRequest object.
IsValidationOnly =$false
ScheduleInfo = MSFT_AADRoleEligibilityScheduleRequestSchedule {
startDateTime ='2023-09-01T02:40:44Z'
expiration = MSFT_AADRoleEligibilityScheduleRequestScheduleExpiration {
type ='noExpiration'
}
}
# TicketInfo
Ensure ='Absent'
ApplicationId =$ApplicationId
TenantId =$TenantId
CertificateThumbprint =$Thumbprint
}
AADRoleSetting 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' {
Id ='f28a1f50-f6e7-4571-818b-6a12f2af6b6c'
Displayname ='SharePoint Administrator'# Activation
ActivationMaxDuration ='PT6H'### L1|Activation maximum duration.
ActivationReqMFA =$true### L1|Require MFA on activation.
ActivationReqJustification =$true### L1|Require justification on activation.
ActivationReqTicket =$true### L2|Require ticket information on activation.
ApprovaltoActivate =$false### L2|Require approval to activate.
ActivateApprover =@()
# Assignment
PermanentEligibleAssignmentisExpirationRequired =$false### L1|permanent eligible assignment enablement.
ExpireEligibleAssignment ='P365D'### L2|Expire eligible assignments after.
PermanentActiveAssignmentisExpirationRequired =$true### L1|permanent active assignment enablement.
ExpireActiveAssignment ='P1D'### L1|Expire active assignments after.
AssignmentReqMFA =$true### L1|Require Azure Multi-Factor Authentication on active assignment.
AssignmentReqJustification =$true### L1|Require justification on active assignment.
ElegibilityAssignmentReqMFA =$false### L1|Do not require MFA on eligible assignment. This blocks pipeline from being able to perform eligible assignments.
ElegibilityAssignmentReqJustification =$true### L1|Require justification on eligible assignment.# Send notifications when members are assigned as eligible to this role:
EligibleAlertNotificationDefaultRecipient =$false### L1|Send notifications when members are assigned as eligible to this role: Role assignment alert, default recipient.
EligibleAlertNotificationAdditionalRecipient =@()
EligibleAlertNotificationOnlyCritical =$false### L2|Send notifications when members are assigned as eligible to this role: Role assignment alert, only critical Email.
EligibleAssigneeNotificationDefaultRecipient =$true### L2|Send notifications when members are assigned as eligible to this role: Notification to the assigned user (assignee), default recipient.
EligibleAssigneeNotificationAdditionalRecipient =@()
EligibleAssigneeNotificationOnlyCritical =$true### L2|Send notifications when members are assigned as eligible to this role: Notification to the assigned user (assignee), only critical Email.
EligibleApproveNotificationDefaultRecipient =$false### L2|Send notifications when members are assigned as eligible to this role: Request to approve a role assignment renewal/extension, default recipient.
EligibleApproveNotificationAdditionalRecipient =@()
EligibleApproveNotificationOnlyCritical =$false### L2|Send notifications when members are assigned as eligible to this role: Request to approve a role assignment renewal/extension, only critical Email.# Send notifications when members are assigned as active to this role:
ActiveAlertNotificationDefaultRecipient =$false### L1|Send notifications when members are assigned as active to this role: Role assignment alert, default recipient.
ActiveAlertNotificationAdditionalRecipient =@()
ActiveAlertNotificationOnlyCritical =$false### L2|Send notifications when members are assigned as active to this role: Role assignment alert, only critical.
ActiveAssigneeNotificationDefaultRecipient =$true### L2|Send notifications when members are assigned as active to this role: Notification to the assigned user (assignee), default recipient.
ActiveAssigneeNotificationAdditionalRecipient =@()
ActiveAssigneeNotificationOnlyCritical =$true### L2|Send notifications when members are assigned as active to this role: Notification to the assigned user (assignee), only critical Email.
ActiveApproveNotificationDefaultRecipient =$false### L2|Send notifications when members are assigned as active to this role: Request to approve a role assignment renewal/extension, default recipient.
ActiveApproveNotificationAdditionalRecipient =@()
ActiveApproveNotificationOnlyCritical =$false### L2|Send notifications when members are assigned as active to this role: Request to approve a role assignment renewal/extension, only critical Email.# Send notifications when eligible members activate this role:
EligibleAssignmentAlertNotificationDefaultRecipient =$false### L2|Send notifications when eligible members activate this role: Role assignment alert, default recipient.
EligibleAssignmentAlertNotificationAdditionalRecipient =@()
EligibleAssignmentAlertNotificationOnlyCritical =$false### L2|Send notifications when eligible members activate this role: Role assignment alert, only critical Email.
EligibleAssignmentAssigneeNotificationDefaultRecipient =$true### L2|Send notifications when eligible members activate this role: Notification to activated user (requestor), default recipient.
EligibleAssignmentAssigneeNotificationAdditionalRecipient =@()
EligibleAssignmentAssigneeNotificationOnlyCritical =$true### L2|Send notifications when eligible members activate this role: Notification to activated user (requestor), only critical Email.
ApplicationId =$ApplicationId
TenantId =$TenantId
CertificateThumbprint =$Thumbprint
}
Description of the issue
Updated DSC Module throws error when performing
Test-DscConfiguration
, when evaluatingAADRoleEligibilityScheduleRequest
.Microsoft 365 DSC Version
1.24.1120.1
Which workloads are affected
Azure Active Directory (Entra ID)
The DSC configuration
Verbose logs showing the problem
Environment Information + PowerShell Version
The text was updated successfully, but these errors were encountered: