EntraAuth.Graph.Application.psm1
function ConvertFrom-Application { <# .SYNOPSIS Converts raw App Registration objects from the Graph API to a more user-friendly format. .DESCRIPTION Converts raw App Registration objects from the Graph API to a more user-friendly format. .PARAMETER InputObject The raw App Registration object to convert. .PARAMETER Raw Actually, don't convert the object after all. .EXAMPLE PS C:\> Invoke-EntraRequest -Path "applications/$ObjectId" | ConvertFrom-Application Converts the raw App Registration object to a more user-friendly format. #> [CmdletBinding()] param ( [Parameter(ValueFromPipeline = $true)] $InputObject, [switch] $Raw ) begin { $scopeTypeMap = @{ $true = 'Delegated' $false = 'Application' } } process { if ($Raw) { return $InputObject } $scopes = foreach ($resource in $InputObject.requiredResourceAccess) { foreach ($access in $resource.resourceAccess) { [PSCustomObject]@{ PSTypeName = 'EntraAuth.Graph.Scope' ApplicationId = $InputObject.appId ApplicationName = $InputObject.DisplayName Resource = $resource.resourceAppId ResourceName = $script:cache.ServicePrincipalByAppID."$($resource.resourceAppId)".displayName Type = $scopeTypeMap[($access.type -eq 'Scope')] Scope = $access.id ScopeName = $script:cache.ScopesByID."$($access.id)".value ConsentRequired = $null HasConsent = $null PrincipalName = $null PrincipalID = $null } } } [PSCustomObject]@{ PSTypeName = 'EntraAuth.Graph.Application' Id = $InputObject.id AppID = $InputObject.AppID DisplayName = $InputObject.DisplayName Scopes = $scopes Object = $InputObject } } } function Invoke-TerminatingException { <# .SYNOPSIS Throw a terminating exception in the context of the caller. .DESCRIPTION Throw a terminating exception in the context of the caller. Masks the actual code location from the end user in how the message will be displayed. .PARAMETER Cmdlet The $PSCmdlet variable of the calling command. .PARAMETER Message The message to show the user. .PARAMETER Exception A nested exception to include in the exception object. .PARAMETER Category The category of the error. .PARAMETER ErrorRecord A full error record that was caught by the caller. Use this when you want to rethrow an existing error. .EXAMPLE PS C:\> Invoke-TerminatingException -Cmdlet $PSCmdlet -Message 'Unknown calling module' Terminates the calling command, citing an unknown caller. #> [CmdletBinding()] Param ( [Parameter(Mandatory = $true)] $Cmdlet, [string] $Message, [System.Exception] $Exception, [System.Management.Automation.ErrorCategory] $Category = [System.Management.Automation.ErrorCategory]::NotSpecified, [System.Management.Automation.ErrorRecord] $ErrorRecord ) process { if ($ErrorRecord -and -not $Message) { $Cmdlet.ThrowTerminatingError($ErrorRecord) } $exceptionType = switch ($Category) { default { [System.Exception] } 'InvalidArgument' { [System.ArgumentException] } 'InvalidData' { [System.IO.InvalidDataException] } 'AuthenticationError' { [System.Security.Authentication.AuthenticationException] } 'InvalidOperation' { [System.InvalidOperationException] } } if ($Exception) { try { $newException = $Exception.GetType()::new($Message, $Exception) } catch { $newException = [System.Exception]::new($Message, $Exception) } } elseif ($ErrorRecord) { try { $newException = $ErrorRecord.Exception.GetType()::new($Message, $ErrorRecord.Exception) } catch { $newException = [System.Exception]::new($Message, $Exception) } } else { $newException = $exceptionType::new($Message) } $record = [System.Management.Automation.ErrorRecord]::new($newException, (Get-PSCallStack)[1].FunctionName, $Category, $Target) $Cmdlet.ThrowTerminatingError($record) } } function Resolve-Application { <# .SYNOPSIS Returns the App Registration object identified by the provided identifier. .DESCRIPTION Returns the App Registration object identified by the provided identifier. This is an internal extension of the Get-EAGAppRegistration command, enabling caching of results for repeated resolutions of the same identifiers during a single instance of the calling command. Hence this helper can be called repeatedly from the same caller and it will resolve the same App Registration only once. This command always returns an obbject with the following properties: - Success: A boolean indicating if the resolution was successful. - Result: The resolved App Registration object(s). - Message: A message indicating the result of the resolution. The caller is responsible for handling error cases. Scopes Needed: Application.Read.All .PARAMETER DisplayName DisplayName of the App Registration to resolve. .PARAMETER ApplicationId ApplicationId (ClientID) of the App Registration to resolve. .PARAMETER ObjectId ObjectId of the App Registration to resolve. .PARAMETER Cache A hashtable used as cache for resolved App Registrations. The content of that hashtable will be updated by the results of this command. Provide it repeatedly to new calls to this command to avoid repeated resolutions. .PARAMETER Unique Whether ambiguous results should be considered an error. .PARAMETER Services A hashtable mapping which EntraAuth service should be called for Graph requests. Example: @{ Graph = 'GraphBeta' } Generally, this parameter should receive a passed through -ServiceMap parameter from a public command. .EXAMPLE PS C:\> Resolve-Application -DisplayName "MyWebApp" -Unique Resolves the App Registration with the display name "MyWebApp", will fail if multiple apps with that name exist. #> [CmdletBinding()] param ( [AllowEmptyString()] [AllowNull()] [string] $DisplayName, [Alias('AppId', 'ClientID')] [AllowEmptyString()] [AllowNull()] [string] $ApplicationId, [Alias('Id')] [AllowEmptyString()] [AllowNull()] [string] $ObjectId, [hashtable] $Cache = @{ }, [switch] $Unique, [hashtable] $Services = @{} ) process { $appIdentifier = "$($DisplayName)|$($ApplicationId)|$($ObjectId)" $result = [PSCustomObject]@{ Success = $false Result = $null Message = '' } if ($Cache.Keys -contains $appIdentifier) { $result.Result = $Cache[$appIdentifier] } else { $param = @{ ServiceMap = $Services } if ($DisplayName) { $param.DisplayName = $DisplayName } if ($ApplicationId) { $param.ApplicationId = $ApplicationId } if ($ObjectId) { $param.ObjectId = $ObjectId } $result.Result = Get-EAGAppRegistration @param $Cache[$appIdentifier] = $result.Result } if (-not $result.Result) { $result.Message = "No application found! (Name: $DisplayName | AppID: $ApplicationId | ID: $ObjectId)" return $result } if ($result.Result.Count -gt 1 -and $Unique) { $names = @($result.Result).ForEach{ '+ {0} (Created: {1:yyyy-MM-dd} | ID: {2} | AppID: {3})' -f $_.DisplayName, $_.Object.createdDateTime, $_.Id, $_.AppID } $result.Message = "Ambiguous Application: More than one App Registration was found to add Scopes to:`n$($names -join "`n")`nPlease provide a unique identifier and try again." return $result } $result.Success = $true $result } } function Resolve-Scope { <# .SYNOPSIS Resolves scopes, from either name or ID, into a standardized object. .DESCRIPTION Resolves scopes, from either name or ID, into a standardized object. These scopes are cached for performance reasons. Scope Needed: Application.Read.All .PARAMETER Scope Name or ID of the scope to resolve. .PARAMETER Resource The resource (API) to which the permissions/scopes apply. This can be specified as a display name, application ID, object ID or Service Principal Name. Examples: + 'Microsoft Graph' + '00000003-0000-0000-c000-000000000000' + 'https://graph.microsoft.com' .PARAMETER Type Type of the scope to resolve. Valid Options: - Delegated: Permissions that apply to interactive sessions, where the application acts on behalf of the signed-in user. - Application: Permissions that apply to unattended sessions, where the application acts as itself. .PARAMETER Services A hashtable mapping which EntraAuth service should be called for Graph requests. Example: @{ Graph = 'GraphBeta' } Generally, this parameter should receive a passed through -ServiceMap parameter from a public command. .EXAMPLE PS C:\> Resolve-Scope -Scope "User.Read.All" -Resource "Microsoft Graph" -Type Application Resolves the User.Read.All application permission for Microsoft Graph. #> [CmdletBinding()] param ( [string] $Scope, [string] $Resource, [ValidateSet('Delegated', 'Application')] [string] $Type, [hashtable] $Services = @{} ) process { $identity = "$Scope|$Resource|$Type" if ($script:cache.ResolvedScopes[$identity]) { return $script:cache.ResolvedScopes[$identity] } $filter = "serviceprincipalNames/any(x:x eq '$Resource')" if ($Resource -as [Guid]) { $filter = "id eq '$Resource' or appId eq '$Resource' or serviceprincipalNames/any(x:x eq '$Resource')" } $servicePrincipal = Get-EAGServicePrincipal -ServiceMap $Services -Filter $filter if (-not $servicePrincipal) { $script:cache.ResolvedScopes[$identity] = [PSCustomObject]@{ ID = '00000000-0000-0000-0000-000000000000' Value = '<not identified>' ConsentRequired = $null Resource = '00000000-0000-0000-0000-000000000000' ResourceName = 'Unknown' Type = 'Unknown' } return $script:cache.ResolvedScopes[$identity] } if ($servicePrincipal.Count -gt 1) { if ($servicePrincipal | Where-Object Id -EQ $Resource) { $servicePrincipal = $servicePrincipal | Where-Object Id -EQ $Resource } elseif ($servicePrincipal | Where-Object AppId -EQ $Resource) { $servicePrincipal = $servicePrincipal | Where-Object AppId -EQ $Resource } else { $servicePrincipal = $servicePrincipal | Select-Object -First 1 } } foreach ($scopeEntry in $servicePrincipal.Scopes.Delegated) { $entry = [PSCustomObject]@{ ID = $scopeEntry.id Value = $scopeEntry.value ConsentRequired = $scopeEntry.type -eq 'Admin' Resource = $servicePrincipal.Id ResourceName = $servicePrincipal.DisplayName Type = 'Delegated' } $script:cache.ResolvedScopes["$($entry.ID)|$Resource|Delegated"] = $entry $script:cache.ResolvedScopes["$($entry.Value)|$Resource|Delegated"] = $entry $script:cache.ResolvedScopes["$($entry.ID)|$($servicePrincipal.Id)|Delegated"] = $entry $script:cache.ResolvedScopes["$($entry.Value)|$($servicePrincipal.Id)|Delegated"] = $entry $script:cache.ResolvedScopes["$($entry.ID)|$($servicePrincipal.AppId)|Delegated"] = $entry $script:cache.ResolvedScopes["$($entry.Value)|$($servicePrincipal.AppId)|Delegated"] = $entry } foreach ($scopeEntry in $servicePrincipal.Scopes.Application) { $entry = [PSCustomObject]@{ ID = $scopeEntry.id Value = $scopeEntry.value ConsentRequired = $true Resource = $servicePrincipal.Id ResourceName = $servicePrincipal.DisplayName Type = 'Application' } $script:cache.ResolvedScopes["$($entry.ID)|$Resource|Application"] = $entry $script:cache.ResolvedScopes["$($entry.Value)|$Resource|Application"] = $entry $script:cache.ResolvedScopes["$($entry.ID)|$($servicePrincipal.Id)|Application"] = $entry $script:cache.ResolvedScopes["$($entry.Value)|$($servicePrincipal.Id)|Application"] = $entry $script:cache.ResolvedScopes["$($entry.ID)|$($servicePrincipal.AppId)|Application"] = $entry $script:cache.ResolvedScopes["$($entry.Value)|$($servicePrincipal.AppId)|Application"] = $entry } if ($script:cache.ResolvedScopes[$identity]) { return $script:cache.ResolvedScopes[$identity] } # Case: Scope not found $script:cache.ResolvedScopes[$identity] = [PSCustomObject]@{ ID = '00000000-0000-0000-0000-000000000000' Value = '<not identified>' ConsentRequired = $null Resource = '00000000-0000-0000-0000-000000000000' ResourceName = 'Unknown' Type = 'Unknown' } return $script:cache.ResolvedScopes[$identity] } } function Resolve-ScopePrincipal { <# .SYNOPSIS Resolves the identity of a user that consented to a scope. .DESCRIPTION Resolves the identity of a user that consented to a scope. These identities are cached for performance reasons. Scopes Needed: User.ReadBasic.All (Delegated), User.Read.All (Application) .PARAMETER ID The ObjectID of the user to resolve. .PARAMETER Services A hashtable mapping which EntraAuth service should be called for Graph requests. Example: @{ Graph = 'GraphBeta' } Generally, this parameter should receive a passed through -ServiceMap parameter from a public command. .EXAMPLE PS C:\> Resolve-ScopePrincipal -ID "11111111-1111-1111-1111-111111111111" Resolves the user with the ObjectID "11111111-1111-1111-1111-111111111111". #> [CmdletBinding()] param ( [AllowNull()] [string] $ID, [hashtable] $Services = @{} ) process { if (-not $ID) { [PSCustomObject]@{ Name = '' ID = '' } return } if ($script:cache.Principals[$ID]) { return $script:cache.Principals[$ID] } try { $user = Invoke-EntraRequest -Service $Services.Graph -Path "users/$ID" -Query @{ '$select' = 'id', 'displayName' } -WarningAction SilentlyContinue -ErrorAction Stop $script:cache.Principals[$ID] = [PSCustomObject]@{ Name = $user.displayName ID = $user.id } } catch { $script:cache.Principals[$ID] = [PSCustomObject]@{ Name = '' ID = $ID } } $script:cache.Principals[$ID] } } function Resolve-ServicePrincipal { <# .SYNOPSIS Resolves Service Principals, based on an identifiable property. .DESCRIPTION Resolves Service Principals, based on an identifiable property. These Service Principals are cached for performance reasons. Valid identifiers: - DisplayName - Client ID (App ID) - Object ID - Service Principal Name This command always returns an obbject with the following properties: - Success: A boolean indicating if the resolution was successful. - Result: The resolved App Registration object(s). - Message: A message indicating the result of the resolution. The caller is responsible for handling error cases. Scopes Needed: Application.Read.All .PARAMETER Identity The identifier of the Service Principal to resolve. Valid identifiers: - DisplayName - Client ID (App ID) - Object ID - Service Principal Name .PARAMETER Properties Specific properties to retrieve from the Service Principal objects. Will always include 'id', 'appid', 'displayName', and 'servicePrincipalNames', no matter what is specified. .PARAMETER Cache A hashtable used as cache for resolved Service Principals. The content of that hashtable will be updated by the results of this command. Provide it repeatedly to new calls to this command to avoid repeated resolutions. .PARAMETER Unique Whether ambiguous results should be considered an error. .PARAMETER Services A hashtable mapping which EntraAuth service should be called for Graph requests. Example: @{ Graph = 'GraphBeta' } Generally, this parameter should receive a passed through -ServiceMap parameter from a public command. .EXAMPLE PS C:\> Resolve-ServicePrincipal -Identity "Microsoft Graph" -Cache $spns Resolves the Service Principal with the display name "Microsoft Graph". .EXAMPLE PS C:\> Resolve-ServicePrincipal -Identity "https://graph.microsoft.com" -Cache $spns Resolves the Service Principal with the specified Service Principal Name. #> [CmdletBinding()] param ( [string] $Identity, [string[]] $Properties = @('id', 'appid', 'displayName', 'servicePrincipalType', 'servicePrincipalNames', 'appRoles', 'oauth2PermissionScopes', 'resourceSpecificApplicationPermissions'), [hashtable] $Cache = @{}, [switch] $Unique, [hashtable] $Services = @{} ) process { if ($Properties -notcontains 'id') { $Properties = @($Properties) + 'id' } if ($Properties -notcontains 'appid') { $Properties = @($Properties) + 'appid' } if ($Properties -notcontains 'displayName') { $Properties = @($Properties) + 'displayName' } if ($Properties -notcontains 'servicePrincipalNames') { $Properties = @($Properties) + 'servicePrincipalNames' } $result = [PSCustomObject]@{ Success = $false Result = $null Message = '' } if ($cache.Keys -contains $Identity) { $result.Result = $cache[$Identity] } else { $filter = "serviceprincipalNames/any(x:x eq '$Identity') or displayName eq '$Identity'" if ($Identity -as [guid]) { $filter = "id eq '$Identity' or appId eq '$Identity' or serviceprincipalNames/any(x:x eq '$Identity') or displayName eq '$Identity'" } $result.Result = Get-EAGServicePrincipal -Filter $filter -Properties $Properties -ServiceMap $services # De-Ambiguate to unique identifiers in case of multiple results if ($result.Result.Count -gt 1) { if ($result.Result.id -contains $Identity) { $result.Result = $result.Result | Where-Object id -EQ $Identity } elseif ($result.Result.appId -contains $Identity) { $result.Result = $result.Result | Where-Object appId -EQ $Identity } elseif ($result.Result.servicePrincipalNames -contains $Identity) { $result.Result = $result.Result | Where-Object servicePrincipalNames -Contains $Identity } } $cache[$Identity] = $result.Result } if (-not $result.Result) { $result.Message = "Resource not found: $Identity" return $result } if ($servicePrincipal.Count -gt 1 -and $Unique) { $names = @($servicePrincipal).ForEach{ '+ {0} (ID: {1} | AppID: {2})' -f $_.DisplayName, $_.Id, $_.AppID } $result.Message = "Ambiguous Resource: More than one Service Principal was found for the specified name:`n$($names -join "`n")`nPlease provide a unique identifier and try again." return $result } $result.Success = $true $result } } function Add-EAGAppScope { <# .SYNOPSIS Adds API permissions (scopes) to an app registration. .DESCRIPTION Adds API permissions (scopes) to an app registration. This allows the app to access specific APIs with the granted permissions, once consent has been granted,. Scopes Needed: Application.Read.All, AppRoleAssignment.ReadWrite.All .PARAMETER DisplayName Display name of the app registration to add scopes to. .PARAMETER ApplicationId Application ID (Client ID) of the app registration to add scopes to. .PARAMETER ObjectId Object ID of the app registration to add scopes to. .PARAMETER Scope Permission scopes to add to the app registration. .PARAMETER Type Type of the permission scopes to add. Valid Options: - Delegated: Permissions that apply to interactive sessions, where the application acts on behalf of the signed-in user. - Application: Permissions that apply to unattended sessions, where the application acts as itself. .PARAMETER Resource The resource (API) to which the permissions/scopes apply. This can be specified as a display name, application ID, object ID or Service Principal Name. Examples: + 'Microsoft Graph' + '00000003-0000-0000-c000-000000000000' + 'https://graph.microsoft.com' .PARAMETER Consent Indicates whether to automatically grant consent for the added scopes. .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .EXAMPLE PS C:\> Add-EAGAppScope -DisplayName "MyWebApp" -Resource "Microsoft Graph" -Scope "User.Read.All" -Type Application Adds the User.Read.All application permission for Microsoft Graph to the app registration named "MyWebApp". #> [CmdletBinding(SupportsShouldProcess = $true, DefaultParameterSetName = 'Filter')] param ( [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $DisplayName, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(Mandatory = $true, ParameterSetName = 'Identity', ValueFromPipelineByPropertyName = $true)] [Alias('Id')] [string] $ObjectId, [Parameter(Mandatory = $true)] [string[]] $Scope, [Parameter(Mandatory = $true)] [ValidateSet('Delegated','Application')] [string] $Type, [Parameter(Mandatory = $true)] [string] $Resource, [switch] $Consent, [hashtable] $ServiceMap ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet $filter = "serviceprincipalNames/any(x:x eq '$Resource') or displayName eq '$Resource'" if ($Resource -as [guid]) { $filter = "id eq '$Resource' or appId eq '$Resource' or serviceprincipalNames/any(x:x eq '$Resource') or displayName eq '$Resource'" } $servicePrincipal = Get-EAGServicePrincipal -Filter $filter -Properties id, appid, displayName, servicePrincipalType, appRoles, oauth2PermissionScopes, resourceSpecificApplicationPermissions -ServiceMap $ServiceMap if (-not $servicePrincipal) { Invoke-TerminatingException -Cmdlet $PSCmdlet -Message "Resource not found: $Resource" -Category ObjectNotFound } if ($servicePrincipal.Count -gt 1) { $names = @($servicePrincipal).ForEach{ '+ {0} (ID: {1} | AppID: {2})' -f $_.DisplayName, $_.Id, $_.AppID } Invoke-TerminatingException -Cmdlet $PSCmdlet -Message "Ambiguous Resource: More than one Service Principal was found for the specified name:`n$($names -join "`n")`nPlease provide a unique identifier and try again." -Category LimitsExceeded } $resolvedScopes = foreach ($entry in $Scope) { $scopeEntry = Resolve-Scope -Scope $entry -Resource $servicePrincipal.ID -Type $Type -Services $services if ($scopeEntry.ScopeName -eq '<not identified>') { Write-Error "Scope $entry of type $Type not found on Service Principal $($servicePrincipal.DisplayName) ($($servicePrincipal.ID) | $Resource)" continue } $scopeEntry } if (-not $resolvedScopes) { Invoke-TerminatingException -Cmdlet $PSCmdlet -Message "No valid scopes found! Use 'Get-EAGScopeDefinition' to find the valid scopes for the resource and try again." } } process { #region Resolve Application Data # Note: Can't cache, since previous process blocks might have affected the same object $result = Resolve-Application -DisplayName $DisplayName -ApplicationId $ApplicationId -ObjectId $ObjectId -Unique -Services $services if (-not $result.Success) { Write-Error $result.Message return } $application = $result.Result #endregion Resolve Application Data $body = @{ requiredResourceAccess = @() } $newAccess = [PSCustomObject]@{ resourceAppId = $servicePrincipal.AppId resourceAccess = @() } foreach ($access in $application.object.requiredResourceAccess) { if ($access.resourceAppId -ne $servicePrincipal.AppId) { $body.requiredResourceAccess += $access continue } foreach ($entry in $access.resourceAccess) { $newAccess.resourceAccess += $entry } } foreach ($scopeEntry in $resolvedScopes) { if ($newAccess.resourceAccess.id -contains $scopeEntry.ID) { continue } $accessEntry = [PSCustomObject]@{ id = $scopeEntry.ID type = 'Scope' } if ($scopeEntry.Type -ne 'Delegated') { $accessEntry.type = 'Role' } $newAccess.resourceAccess += $accessEntry } $body.requiredResourceAccess += $newAccess Write-Verbose ($body | ConvertTo-Json -Depth 99) if (-not $PSCmdlet.ShouldProcess($application.Id, "Adding scopes $($resolvedScopes.Value -join ', ')")) { return } try { $null = Invoke-EntraRequest -Method PATCH -Path "applications/$($application.Id)" -Body $body -Header @{ 'content-type' = 'application/json' } } catch { $PSCmdlet.WriteError($_) return } if (-not $Consent) { return } Grant-EAGScopeConsent -ApplicationID $application.AppID -Scope $Scope -Type $Type -Resource $Resource } } function Add-EAGMsiScope { <# .SYNOPSIS Adds API permissions (scopes) to a Managed Service Identity. .DESCRIPTION The Add-EAGMsiScope cmdlet adds application permissions (scopes) to a Managed Service Identity (MSI). This allows the MSI to access specific APIs with the granted permissions. Scopes Needed: Application.Read.All, AppRoleAssignment.ReadWrite.All .PARAMETER DisplayName The display name of the Managed Service Identity to add permissions to. .PARAMETER ApplicationId The Application ID (Client ID) of the Managed Service Identity to add permissions to. .PARAMETER ObjectId The Object ID of the Managed Service Identity to add permissions to. .PARAMETER Scope The permission scopes to add to the Managed Service Identity. These are the API permissions that will be granted. .PARAMETER Resource The resource (API) to which the permissions/scopes apply. This can be specified as a display name, application ID, object ID or Service Principal Name. Examples: + 'Microsoft Graph' + '00000003-0000-0000-c000-000000000000' + 'https://graph.microsoft.com' .PARAMETER ServiceMap %SERVCICEMAP% .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .EXAMPLE PS C:\> Add-EAGMsiScope -DisplayName "MyWebApp" -Resource "Microsoft Graph" -Scope "User.Read.All" Adds the User.Read.All application permission for Microsoft Graph to the MSI named "MyWebApp". .EXAMPLE PS C:\> Add-EAGMsiScope -ApplicationId "11111111-1111-1111-1111-111111111111" -Resource "00000003-0000-0000-c000-000000000000" -Scope "User.Read.All", "Group.Read.All" Adds the User.Read.All and Group.Read.All application permissions for Microsoft Graph (identified by its app ID) to the MSI with the specified application ID. #> [CmdletBinding(DefaultParameterSetName = 'Filter', SupportsShouldProcess = $true)] param ( [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $DisplayName, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(Mandatory = $true, ParameterSetName = 'Identity', ValueFromPipelineByPropertyName = $true)] [Alias('Id')] [string] $ObjectId, [Parameter(Mandatory = $true)] [string[]] $Scope, [Parameter(Mandatory = $true)] [string] $Resource, [hashtable] $ServiceMap ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet $filter = "serviceprincipalNames/any(x:x eq '$Resource') or displayName eq '$Resource'" if ($Resource -as [guid]) { $filter = "id eq '$Resource' or appId eq '$Resource' or serviceprincipalNames/any(x:x eq '$Resource') or displayName eq '$Resource'" } $servicePrincipal = Get-EAGServicePrincipal -Filter $filter -Properties id, appid, displayName, servicePrincipalType, appRoles, oauth2PermissionScopes, resourceSpecificApplicationPermissions -ServiceMap $ServiceMap if (-not $servicePrincipal) { Invoke-TerminatingException -Cmdlet $PSCmdlet -Message "Resource not found: $Resource" -Category ObjectNotFound } if ($servicePrincipal.Count -gt 1) { $names = @($servicePrincipal).ForEach{ '+ {0} (ID: {1} | AppID: {2})' -f $_.DisplayName, $_.Id, $_.AppID } Invoke-TerminatingException -Cmdlet $PSCmdlet -Message "Ambiguous Resource: More than one Service Principal was found for the specified name:`n$($names -join "`n")`nPlease provide a unique identifier and try again." -Category LimitsExceeded } $resolvedScopes = foreach ($entry in $Scope) { $scopeEntry = Resolve-Scope -Scope $entry -Resource $servicePrincipal.ID -Type 'Application' -Services $services if ($scopeEntry.ScopeName -eq '<not identified>') { Write-Error "Scope $entry of type $Type not found on Service Principal $($servicePrincipal.DisplayName) ($($servicePrincipal.ID) | $Resource)" continue } $scopeEntry } if (-not $resolvedScopes) { Invoke-TerminatingException -Cmdlet $PSCmdlet -Message "No valid scopes found! Use 'Get-EAGScopeDefinition' to find the valid scopes for the resource and try again." } $servicePrincipals = @{} } process { #region Resolve Application Data $identity = $ObjectId if (-not $identity) { $identity = $ApplicationId } if (-not $identity) { $identity = $DisplayName } if (-not $identity) { Write-Error -Message "Managed Identity not specified! Provide at least one of ObjectId, ApplicationId or DisplayName." return } $result = Resolve-ServicePrincipal -Identity $identity -Properties id, appId, displayName -Cache $servicePrincipals -Unique -Services $services if (-not $result.Success) { Write-Error "Error resolving Managed Identity for $($identity):`n$($result.Message)" return } $appSPN = $result.Result #endregion Resolve Application Data $applicationGrants = Invoke-EntraRequest -Service $services.Graph -Path "servicePrincipals/$($appSPN.id)/appRoleAssignments" foreach ($resolvedScope in $resolvedScopes) { if ($resolvedScope.ID -in $applicationGrants.appRoleId) { Write-Verbose "Skipping Application scope $($resolvedScope.Value) - already added to $($appSPN.DisplayName)" continue } if (-not $PSCmdlet.ShouldProcess("$($appSPN.DisplayName) ($($appSPN.AppID))", "Grant consent for scope $($resolvedScope.Value) of resource $($resolvedScope.ResourceName)")) { continue } Write-Verbose "Processing scope:`n$($resolvedScope | ConvertTo-Json)" $grant = @{ "principalId" = $appSPN.id "resourceId" = $resolvedScope.Resource "appRoleId" = $resolvedScope.ID } Write-Verbose "Adding scope $($resolvedScope.id) ($($resolvedScope.Value))) to Managed Identity $($appSPN.appid) ($($appSPN.displayName))" try { $null = Invoke-EntraRequest -Method POST -Path "servicePrincipals/$($appSPN.id)/appRoleAssignments" -Body $grant -Header @{ 'content-type' = 'application/json' } } catch { Write-Error $_ } } } } function Get-EAGAppRegistration { <# .SYNOPSIS Lists application registrations in the connected Entra ID tenant. .DESCRIPTION Lists application registrations in the connected Entra ID tenant. You can filter the results by display name, application ID, or custom filter. Scopes Needed: Application.Read.All .PARAMETER DisplayName Display name of the app registration to retrieve. .PARAMETER ObjectId Object ID of the app registration to retrieve. .PARAMETER ApplicationId Application ID (Client ID) of the app registration to retrieve. .PARAMETER Filter Additional OData filter expression to apply when searching for app registrations. .PARAMETER Properties Specific properties to retrieve from the app registration objects. .PARAMETER Raw When specified, returns the raw API response objects instead of the formatted PowerShell objects. Useful for accessing detailed properties not exposed at the top level, but less user-friendly. .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .EXAMPLE PS C:\> Get-EAGAppRegistration Retrieves all app registrations in the Entra ID tenant. .EXAMPLE PS C:\> Get-EAGAppRegistration -DisplayName "MyWebApp" Retrieves the app registration with the display name "MyWebApp". .EXAMPLE PS C:\> Get-EAGAppRegistration -DisplayName 'Dept-*' -Properties 'displayName', 'appId' Retrieves all app registrations that start with "Dept-" and returns only the display name and app ID properties. #> [CmdletBinding()] param ( [Parameter(ParameterSetName = 'Filter')] [string] $DisplayName, [Parameter(Mandatory = $true, ParameterSetName = 'Identity')] [Alias('Id')] [string] $ObjectId, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $Filter, [string[]] $Properties, [switch] $Raw, [hashtable] $ServiceMap = @{} ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet } process { $query = @{ } if ($Properties) { $query['$select'] = $Properties } if ($ObjectId) { try { Invoke-EntraRequest -Service $services.Graph -Path "applications/$ObjectId" -Query $query | ConvertFrom-Application -Raw:$Raw } catch { $PSCmdlet.WriteError($_) } return } $filterBuilder = [FilterBuilder]::new() if ($DisplayName -and $DisplayName -ne '*') { $filterBuilder.Add('displayName', 'eq', $DisplayName) } if ($ApplicationId) { $filterBuilder.Add('appId', 'eq', $ApplicationId) } if ($Filter) { $filterBuilder.CustomFilter = $Filter } if ($filterBuilder.Count() -gt 0) { $query['$filter'] = $filterBuilder.Get() } Invoke-EntraRequest -Service $services.Graph -Path 'applications' -Query $query | ConvertFrom-Application -Raw:$Raw } } function Get-EAGManagedIdentity { <# .SYNOPSIS Retrieves Managed Service Identities from Entra ID. .DESCRIPTION The Get-EAGManagedIdentity cmdlet retrieves Managed Service Identities (MSIs) from Entra ID. It allows you to search for MSIs by display name, application ID, or object ID, and filter the results. This cmdlet is a specialized wrapper around Get-EAGServicePrincipal that filters for service principals of type 'ManagedIdentity'. Scopes Needed: Application.Read.All .PARAMETER DisplayName The display name of the Managed Service Identity to retrieve. .PARAMETER ObjectId The Object ID of the Managed Service Identity to retrieve. When specified, returns a single MSI with the exact matching ID. .PARAMETER ApplicationId The Application ID (Client ID) of the Managed Service Identity to retrieve. Also known as AppId or ClientID. .PARAMETER Filter Additional OData filter expression to apply when searching for MSIs. .PARAMETER Properties Specific properties to retrieve from the MSI objects. .PARAMETER Raw When specified, returns the raw API response objects instead of the formatted PowerShell objects. Useful for accessing detailed properties not exposed at the top level, but less user-friendly. .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .EXAMPLE PS C:\> Get-EAGManagedIdentity Retrieves all Managed Service Identities in the Entra ID tenant. .EXAMPLE PS C:\> Get-EAGManagedIdentity -DisplayName "MyWebApp" Retrieves the Managed Service Identity with the display name "MyWebApp". .EXAMPLE PS C:\> Get-EAGManagedIdentity -ApplicationId "11111111-1111-1111-1111-111111111111" Retrieves the Managed Service Identity with the specified application ID. #> [CmdletBinding(DefaultParameterSetName = 'Filter')] param ( [Parameter(ParameterSetName = 'Filter')] [string] $DisplayName, [Parameter(Mandatory = $true, ParameterSetName = 'Identity')] [Alias('Id')] [string] $ObjectId, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $Filter, [string[]] $Properties, [switch] $Raw, [hashtable] $ServiceMap = @{} ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet } process { $common = @{ ServiceMap = $services } if ($Properties) { $common.Properties = $Properties } if ($Raw) { $common.Raw = $Raw } if ($ObjectID) { Get-EAGServicePrincipal @common -ObjectId $ObjectId return } $param = @{ Filter = "servicePrincipalType eq 'ManagedIdentity'" } if ($DisplayName) { $param.DisplayName = $DisplayName } if ($ApplicationId) { $param.ApplicationId = $ApplicationId } if ($Filter) { $param.Filter = $param.Filter, $Filter -join ' and ' } Get-EAGServicePrincipal @common @param } } function Get-EAGScope { <# .SYNOPSIS Lists scopes applied to app registrations, service principals, and managed identities. .DESCRIPTION Lists scopes applied to app registrations, service principals, and managed identities. Scopes Needed: Application.Read.All, User.ReadBasic.All (Delegated), User.Read.All (Application) .PARAMETER Type Filter scopes by type. Valid Options: - All: All scopes (default) - Delegated: Delegated scopes - Application: Application scopes .PARAMETER DisplayName The displayname of the app registration or service principal to filter by. .PARAMETER ApplicationId The Application ID (Client ID) of the app registration or service principal to filter by. .PARAMETER ObjectId The Object ID of the app registration or service principal to filter by. .PARAMETER ClearCache Indicates whether to clear the cache of resolved scopes and principals. This should only be needed when developing an application and modifying/updating scope definitions. .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .EXAMPLE PS C:\> Get-EAGScope -DisplayName "MyWebApp" Retrieves all scopes applied to the app registration or service principal with the display name "MyWebApp". .EXAMPLE PS C:\> Get-EAGScope -ApplicationId "11111111-1111-1111-1111-111111111111" Retrieves all scopes applied to the app registration or service principal with the specified application ID. #> [CmdletBinding(DefaultParameterSetName = 'Filter')] param ( [ValidateSet('All', 'Delegated', 'Application')] [string] $Type = 'All', [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $DisplayName, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(Mandatory = $true, ParameterSetName = 'Identity', ValueFromPipelineByPropertyName = $true)] [Alias('Id')] [string] $ObjectId, [switch] $ClearCache, [hashtable] $ServiceMap = @{} ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet #region Functions function Get-DelegateScope { [CmdletBinding()] param ( [AllowNull()] $Application, $ServicePrincipal, [hashtable] $Services ) $grants = Invoke-EntraRequest -Service $Services.Graph -Path oauth2PermissionGrants -Query @{ '$filter' = "clientId eq '$($ServicePrincipal.Id)'" } #region Process Granted Scopes $scopesProcessed = @{} foreach ($grant in $grants) { $principal = Resolve-ScopePrincipal -ID $grant.principalId -Services $Services foreach ($scope in $grant.scope.Trim() -split ' ') { $scopeData = Resolve-Scope -Scope $scope -Resource $grant.resourceId -Type 'Delegated' -Services $Services [PSCustomObject]@{ PSTypeName = 'EntraAuth.Graph.Scope' ApplicationId = $ServicePrincipal.AppID ApplicationName = $ServicePrincipal.DisplayName Resource = $grant.resourceId ResourceName = $script:cache.ServicePrincipalByID."$($grant.resourceId)".displayName Type = 'Delegated' Scope = $scopeData.Id ScopeName = $scopeData.value ConsentRequired = $scopeData.ConsentRequired HasConsent = $true PrincipalName = $principal.Name PrincipalID = $principal.ID } $scopesProcessed[$scopeData.id] = $scopeData } } #endregion Process Granted Scopes if (-not $Application) { return } #region Process Non-Granted Scopes foreach ($resourceReq in $Application.requiredResourceAccess) { foreach ($resourceEntry in $resourceReq.resourceAccess) { if ($resourceEntry.type -ne 'Scope') { continue } if ($scopesProcessed[$resourceEntry.id]) { continue } $scopeData = Resolve-Scope -Scope $resourceEntry.id -Resource $resourceReq.resourceAppId -Type 'Delegated' -Services $Services [PSCustomObject]@{ PSTypeName = 'EntraAuth.Graph.Scope' ApplicationId = $ServicePrincipal.AppID ApplicationName = $ServicePrincipal.DisplayName Resource = $resourceReq.resourceAppId ResourceName = $scopeData.ResourceName Type = 'Delegated' Scope = $scopeData.Id ScopeName = $scopeData.value ConsentRequired = $scopeData.ConsentRequired HasConsent = $false PrincipalName = $null PrincipalID = $null } } } #endregion Process Non-Granted Scopes } function Get-ApplicationScope { [CmdletBinding()] param ( [AllowNull()] $Application, $ServicePrincipal, [hashtable] $Services ) #region Process Granted Scopes $scopesProcessed = @{} $appRoleAssignments = Invoke-EntraRequest -Service $Services.Graph -Path "servicePrincipals/$($ServicePrincipal.id)/appRoleAssignments" foreach ($roleAssignment in $appRoleAssignments) { $scopeData = Resolve-Scope -Scope $roleAssignment.appRoleId -Resource $roleAssignment.resourceId -Type 'Application' -Services $Services [PSCustomObject]@{ PSTypeName = 'EntraAuth.Graph.Scope' ApplicationId = $ServicePrincipal.AppID ApplicationName = $ServicePrincipal.DisplayName Resource = $roleAssignment.resourceId ResourceName = $roleAssignment.resourceDisplayName Type = 'Application' Scope = $scopeData.Id ScopeName = $scopeData.value ConsentRequired = $true HasConsent = $true PrincipalName = $null PrincipalID = $null } $scopesProcessed[$scopeData.id] = $scopeData } #endregion Process Granted Scopes if (-not $Application) { return } #region Process Non-Granted Scopes foreach ($resourceReq in $Application.requiredResourceAccess) { foreach ($resourceEntry in $resourceReq.resourceAccess) { if ($resourceEntry.type -ne 'Role') { continue } if ($scopesProcessed[$resourceEntry.id]) { continue } $scopeData = Resolve-Scope -Scope $resourceEntry.id -Resource $resourceReq.resourceAppId -Type 'Application' -Services $Services [PSCustomObject]@{ PSTypeName = 'EntraAuth.Graph.Scope' ApplicationId = $ServicePrincipal.AppID ApplicationName = $ServicePrincipal.DisplayName Resource = $resourceReq.resourceAppId ResourceName = $scopeData.ResourceName Type = 'Application' Scope = $scopeData.Id ScopeName = $scopeData.value ConsentRequired = $true HasConsent = $false PrincipalName = $null PrincipalID = $null } } } #endregion Process Non-Granted Scopes } #endregion Functions if ($ClearCache) { $script:cache.ResolvedScopes.Clear() $script:cache.Principals.Clear() } } process { $param = @{} if ($DisplayName) { $param.DisplayName = $DisplayName } if ($ApplicationId) { $param.ApplicationId = $ApplicationId } if ($ObjectId) { $param.ObjectId = $ObjectId } $servicePrincipals = Get-EAGServicePrincipal @param -Properties id, appid, displayName, servicePrincipalType, appRoles, oauth2PermissionScopes, resourceSpecificApplicationPermissions -ServiceMap $ServiceMap foreach ($servicePrincipal in $servicePrincipals) { $application = Get-EAGAppRegistration -ApplicationId $servicePrincipal.AppID -ServiceMap $ServiceMap -Raw if ($Type -in 'All', 'Delegated') { Get-DelegateScope -Application $application -ServicePrincipal $servicePrincipal -Services $services } if ($Type -in 'All', 'Application') { Get-ApplicationScope -Application $application -ServicePrincipal $servicePrincipal -Services $services } } } } function Get-EAGScopeDefinition { <# .SYNOPSIS Retrieves scope definitions from service principals / Enterprise applications. .DESCRIPTION Retrieves scope definitions from service principals / Enterprise applications. This does NOT return assigned or granted scopes on the apps. It provides the scopes provided BY the service in question. .PARAMETER Name The name of the scope to filter by. .PARAMETER Type The type of scopes to retrieve. Valid Options: - All: All scopes (default) - Delegated: Delegated scopes - Application: Application scopes - AppResource: Resource-specific Application scopes .PARAMETER DisplayName Filter by display name of the service principal. .PARAMETER ApplicationId Filter by application ID of the service principal. .PARAMETER ObjectId Filter by object ID of the service principal. .PARAMETER Resource Filter by the resource Identifier of the service. .PARAMETER Force Include disabled scopes. .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .EXAMPLE PS C:\> Get-EAGScopeDefinition -Name "User.Read" Retrieves all scopes with the name "User.Read". .EXAMPLE PS C:\> Get-EAGScopeDefinition -DisplayName 'Microsoft Graph' Retrieves all scopes provided by the service principal with the display name 'Microsoft Graph'. .EXAMPLE PS C:\> Get-EAGScopeDefinition -DisplayName 'Microsoft Graph' -Name User.* Retrieves all scopes with the name starting with 'User.' provided by the service principal with the display name 'Microsoft Graph'. .EXAMPLE PS C:\> Get-EAGScopeDefinition -Resource https://graph.microsoft.com -Name Group.* Retrieves all scopes with the name starting with 'Group.' provided by the service principal with the service principal name 'https://graph.microsoft.com'. #> [CmdletBinding(DefaultParameterSetName = 'Filter')] param ( [string] $Name = '*', [ValidateSet('All', 'Delegated', 'Application', 'AppResource')] [string] $Type = 'All', [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $DisplayName, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(Mandatory = $true, ParameterSetName = 'Identity', ValueFromPipelineByPropertyName = $true)] [Alias('Id')] [string] $ObjectId, [Parameter(Mandatory = $true, ParameterSetName = 'Resource')] [string] $Resource, [switch] $Force, [hashtable] $ServiceMap = @{} ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet function New-ScopeDefinition { [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "")] [CmdletBinding()] param ( [string] $ResourceID, [string] $ResourceName, [string] $Type, [string] $ScopeID, [string] $ScopeName, [string] $Description, [bool] $Consent = $true, [bool] $Enabled, $Object ) if ($Object) { $Enabled = $Object.isEnabled $ScopeID = $Object.id $ScopeName = $Object.value } [PSCustomObject]@{ PSTypeName = 'EntraAuth.Graph.ScopeDefinition' ResourceID = $ResourceID ResourceName = $ResourceName Type = $Type ScopeID = $ScopeID ScopeName = $ScopeName Description = $Description ConsentRequired = $Consent Enabled = $Enabled } } } process { $param = @{} if ($DisplayName) { $param.DisplayName = $DisplayName } if ($ApplicationId) { $param.ApplicationId = $ApplicationId } if ($ObjectId) { $param.ObjectId = $ObjectId } if ($Resource) { $filter = "serviceprincipalNames/any(x:x eq '$Resource')" if ($Resource -as [guid]) { $filter = "id eq '$Resource' or appId eq '$Resource' or serviceprincipalNames/any(x:x eq '$Resource')" } $param.Filter = $filter } $servicePrincipals = Get-EAGServicePrincipal @param -Properties id, appid, displayName, servicePrincipalType, appRoles, oauth2PermissionScopes, resourceSpecificApplicationPermissions -ServiceMap $ServiceMap foreach ($servicePrincipal in $servicePrincipals) { $spnData = @{ ResourceID = $servicePrincipal.ID; ResourceName = $servicePrincipal.displayName } if ($Type -in 'All', 'Delegated') { foreach ($scope in $servicePrincipal.Scopes.Delegated) { if (-not $scope.isEnabled -and -not $Force) { continue } if ($scope.value -notlike $Name) { continue } New-ScopeDefinition @spnData -Object $scope -Type Delegated -Description $scope.adminConsentDescription -Consent ($scope.type -eq 'Admin') } } if ($Type -in 'All', 'Application') { foreach ($scope in $servicePrincipal.Scopes.Application) { if (-not $scope.isEnabled -and -not $Force) { continue } if ($scope.value -notlike $Name) { continue } New-ScopeDefinition @spnData -Object $scope -Type Application -Description $scope.description } } if ($Type -in 'All', 'AppResource') { foreach ($scope in $servicePrincipal.Scopes.AppResource) { if (-not $scope.isEnabled -and -not $Force) { continue } if ($scope.value -notlike $Name) { continue } New-ScopeDefinition @spnData -Object $scope -Type AppResource -Description $scope.description } } } } } function Get-EAGServicePrincipal { <# .SYNOPSIS Lists service principals in the connected Entra ID tenant. .DESCRIPTION Lists service principals in the connected Entra ID tenant. Scope Needed: Application.Read.All .PARAMETER DisplayName The display name of the service principal to filter by. .PARAMETER ObjectId The Object ID of the service principal to filter by. .PARAMETER ApplicationId The Application ID (Client ID) of the service principal to filter by. .PARAMETER Filter Additional OData filter expression to apply when searching for service principals. .PARAMETER Properties Specific properties to retrieve from the service principal objects. .PARAMETER Raw When specified, returns the raw API response objects instead of the formatted PowerShell objects. Useful for accessing detailed properties not exposed at the top level, but less user-friendly. .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .EXAMPLE PS C:\> Get-EAGServicePrincipal Retrieves all service principals in the Entra ID tenant. .EXAMPLE PS C:\> Get-EAGServicePrincipal -DisplayName "MyWebApp" Retrieves the service principal with the display name "MyWebApp". .EXAMPLE PS C:\> Get-EAGServicePrincipal -DisplayName 'Dept-*' -Properties 'displayName', 'appId' Retrieves all service principals that start with "Dept-" and returns only the display name and app ID properties. #> [CmdletBinding()] param ( [Parameter(ParameterSetName = 'Filter')] [string] $DisplayName, [Parameter(Mandatory = $true, ParameterSetName = 'Identity')] [Alias('Id')] [string] $ObjectId, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $Filter, [string[]] $Properties, [switch] $Raw, [hashtable] $ServiceMap = @{} ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet function ConvertFrom-ServicePrincipal { [CmdletBinding()] param ( [Parameter(ValueFromPipeline = $true)] $InputObject, [switch] $Raw ) process { #region Feed the Cache if ($InputObject.AppID) { if (-not $script:cache.ServicePrincipalByAppID[$InputObject.AppID]) { $script:cache.ServicePrincipalByAppID[$InputObject.AppID] = [PSCustomObject]@{ Type = $InputObject.servicePrincipalType Id = $InputObject.id AppID = $InputObject.AppID DisplayName = $InputObject.DisplayName } } else { # Depending on selected we might lose individual properties if we overwrite all $current = $script:cache.ServicePrincipalByAppID[$InputObject.AppID] if ($InputObject.servicePrincipalType) { $current.Type = $InputObject.servicePrincipalType } if ($InputObject.id) { $current.Id = $InputObject.id } if ($InputObject.AppID) { $current.AppID = $InputObject.AppID } if ($InputObject.DisplayName) { $current.DisplayName = $InputObject.DisplayName } } } if ($InputObject.ID) { if (-not $script:cache.ServicePrincipalByID[$InputObject.ID]) { $script:cache.ServicePrincipalByID[$InputObject.ID] = [PSCustomObject]@{ Type = $InputObject.servicePrincipalType Id = $InputObject.id AppID = $InputObject.AppID DisplayName = $InputObject.DisplayName } } else { # Depending on selected we might lose individual properties if we overwrite all $current = $script:cache.ServicePrincipalByID[$InputObject.ID] if ($InputObject.servicePrincipalType) { $current.Type = $InputObject.servicePrincipalType } if ($InputObject.id) { $current.Id = $InputObject.id } if ($InputObject.AppID) { $current.AppID = $InputObject.AppID } if ($InputObject.DisplayName) { $current.DisplayName = $InputObject.DisplayName } } } foreach ($scope in $InputObject.AppRoles) { $script:cache.ScopesByID[$scope.id] = $scope } foreach ($scope in $InputObject.oauth2PermissionScopes) { $script:cache.ScopesByID[$scope.id] = $scope } foreach ($scope in $InputObject.resourceSpecificApplicationPermissions) { $script:cache.ScopesByID[$scope.id] = $scope } #endregion Feed the Cache if ($Raw) { return $InputObject } [PSCustomObject]@{ PSTypeName = 'EntraAuth.Graph.ServicePrincipal' Type = $InputObject.servicePrincipalType Id = $InputObject.id AppID = $InputObject.AppID DisplayName = $InputObject.DisplayName AppDisplayName = $InputObject.AppDisplayName AppOwnerOrg = $InputObject.AppOwnerOrganizationId AssignmentRequired = $InputObject.appRoleAssignmentRequired ServicePrincipalNames = $InputObject.servicePrincipalNames Scopes = @{ Delegated = @($InputObject.oauth2PermissionScopes) Application = @($InputObject.appRoles) AppResource = @($InputObject.resourceSpecificApplicationPermissions) } Object = $InputObject } } } } process { $query = @{ } if ($Properties) { $query['$select'] = $Properties } if ($ObjectId) { try { Invoke-EntraRequest -Service $services.Graph -Path "servicePrincipals/$ObjectId" -Query $query | ConvertFrom-ServicePrincipal -Raw:$Raw } catch { $PSCmdlet.WriteError($_) } return } $filterBuilder = [FilterBuilder]::new() if ($DisplayName -and $DisplayName -ne '*') { $filterBuilder.Add('displayName', 'eq', $DisplayName) } if ($ApplicationId) { $filterBuilder.Add('appId', 'eq', $ApplicationId) } if ($Filter) { $filterBuilder.CustomFilter = $Filter } if ($filterBuilder.Count() -gt 0) { $query['$filter'] = $filterBuilder.Get() } Invoke-EntraRequest -Service $services.Graph -Path 'servicePrincipals' -Query $query | ConvertFrom-ServicePrincipal -Raw:$Raw } } function Grant-EAGScopeConsent { <# .SYNOPSIS Grants consent for a scope on an App Registration. .DESCRIPTION Grants consent for a scope on an App Registration. Consent is required for scopes configured on an app registration to take effect in the tenant. The App Registration is a manifest, the declaration of the application in use. The Enterprise Application / Service Principal is the actual object that represents the application in the tenant. Granting "Admin Consent" to scopes on an App Registration will copy those onto the Enterprise Application / Service Principal, hence making them take effect. Note: Managed Identities are also Service Principals, but they do not have an App Registration. There is no consent of "Consent", as there is no manifest's proposal to consent to. This does not mean that Managed Identities cannot have scopes, but they require a different approach. Use "Add-EAGMsiScope" to add scopes to Managed Identities. Scopes Needed: Application.Read.All, AppRoleAssignment.ReadWrite.All .PARAMETER DisplayName Display name of the app registration whose scopes to grant consent to. .PARAMETER ApplicationId Application ID (Client ID) of the app registration whose scopes to grant consent to. .PARAMETER ObjectId Object ID of the app registration whose scopes to grant consent to. .PARAMETER Scope The permission scopes to grant consent to. .PARAMETER Type Type of the permission scopes to grant consent to. Valid Options: - Delegated: Permissions that apply to interactive sessions, where the application acts on behalf of the signed-in user. - Application: Permissions that apply to unattended sessions, where the application acts as itself. .PARAMETER Resource The resource (API) to which the permissions/scopes apply. This can be specified as a display name, application ID, object ID or Service Principal Name. Examples: + 'Microsoft Graph' + '00000003-0000-0000-c000-000000000000' + 'https://graph.microsoft.com' .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .EXAMPLE PS C:\> Grant-EAGScopeConsent -DisplayName "MyWebApp" -Resource "Microsoft Graph" -Scope "User.Read.All" -Type Application Grants consent for the User.Read.All application permission for Microsoft Graph to the app registration named "MyWebApp". .EXAMPLE PS C:\> Grant-EAGScopeConsent -ApplicationId "11111111-1111-1111-1111-111111111111" -Resource "00000003-0000-0000-c000-000000000000" -Scope "User.Read.All", "Group.Read.All" -Type Delegated Grants consent for the User.Read.All and Group.Read.All delegated permissions for Microsoft Graph (identified by its app ID) to the app registration with the specified application ID. .EXAMPLE PS C:\> Get-EAGAppRegistration -DisplayName MyTaskApp | Grant-EAGScopeConsent -Resource "https://graph.microsoft.com" -Scope "User.ReadBasic.All" -Type Delegated Grants consent for the User.ReadBasic.All delegated permission for Microsoft Graph to the app registration named "MyTaskApp". #> [CmdletBinding(DefaultParameterSetName = 'Filter', SupportsShouldProcess = $true)] param ( [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $DisplayName, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(Mandatory = $true, ParameterSetName = 'Identity', ValueFromPipelineByPropertyName = $true)] [Alias('Id')] [string] $ObjectId, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string[]] $Scope, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [ValidateSet('Delegated','Application')] [string] $Type, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string] $Resource, [hashtable] $ServiceMap ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet $principals = @{ } $applications = @{ } $servicePrincipals = @{ } } process { #region Resolve Scope Data $result = Resolve-ServicePrincipal -Identity $Resource -Cache $principals -Unique -Services $services if (-not $result.Success) { Write-Error -Message $result.Message return } $servicePrincipal = $result.Result $resolvedScopes = foreach ($entry in $Scope) { $scopeEntry = Resolve-Scope -Scope $entry -Resource $servicePrincipal.ID -Type $Type -Services $services if ($scopeEntry.ScopeName -eq '<not identified>') { Write-Error "Scope $entry of type $Type not found on Service Principal $($servicePrincipal.DisplayName) ($($servicePrincipal.ID) | $Resource)" continue } $scopeEntry } if (-not $resolvedScopes) { Write-Error -Message "No valid scopes found! Use 'Get-EAGScopeDefinition' to find the valid scopes for the resource and try again." return } #endregion Resolve Scope Data #region Resolve Application Data $result = Resolve-Application -DisplayName $DisplayName -ApplicationId $ApplicationId -ObjectId $ObjectId -Cache $applications -Unique -Services $services if (-not $result.Success) { Write-Error $result.Message return } $application = $result.Result $result = Resolve-ServicePrincipal -Identity $application.AppID -Properties id -Cache $servicePrincipals -Unique -Services $services if (-not $result.Success) { Write-Error "Error resolving Enterprise Application for $($application.AppID):`n$($result.Message)" return } $appSPN = $result.Result #endregion Resolve Application Data $applicationGrants = Invoke-EntraRequest -Service $services.Graph -Path "servicePrincipals/$($appSPN.id)/appRoleAssignments" $delegatedGrants = Invoke-EntraRequest -Service $services.Graph -Path 'oauth2PermissionGrants' -Query @{ '$filter' = "clientId eq '$($appSPN.id)' and consentType eq 'AllPrincipals'" } $newDelegateGrants = @() foreach ($resolvedScope in $resolvedScopes) { if ($resolvedScope.Type -eq 'Application' -and $resolvedScope.ID -in $applicationGrants.appRoleId) { Write-Verbose "Skipping Application scope $($resolvedScope.Value) - already consented on $($application.DisplayName)" continue } if ($resolvedScope.Type -eq 'Delegated' -and $resolvedScope.Value -in @($delegatedGrants.scope -split ' ').ForEach{$_.Trim()}) { Write-Verbose "Skipping Delegated scope $($resolvedScope.Value) - already consented on $($application.DisplayName)" continue } if (-not $PSCmdlet.ShouldProcess("$($application.DisplayName) ($($application.AppID))", "Grant consent for scope $($resolvedScope.Value) of resource $($resolvedScope.ResourceName)")) { continue } Write-Verbose "Processing scope:`n$($resolvedScope | ConvertTo-Json)" switch ($resolvedScope.Type) { 'Application' { $grant = @{ "principalId" = $appSPN.id "resourceId" = $resolvedScope.Resource "appRoleId" = $resolvedScope.ID } Write-Verbose "Granting Admin consent for scope $($resolvedScope.id) ($($resolvedScope.Value))) on $($appSPN.appid) ($($appSPN.displayName))" try { $null = Invoke-EntraRequest -Method POST -Path "servicePrincipals/$($appSPN.id)/appRoleAssignments" -Body $grant -Header @{ 'content-type' = 'application/json' } } catch { Write-Error $_ } } 'Delegated' { $newDelegateGrants += $resolvedScope } default { Write-Error "Unexpected scope type: $($resolvedScope.Type)" } } } if (-not $newDelegateGrants) { return } $byResource = $newDelegateGrants | Group-Object Resource foreach ($group in $byResource) { $scopeGrant = $group.Group.Value $applicableGrant = $delegatedGrants | Where-Object resourceId -eq $group.Name if ($applicableGrant) { $scopeGrant = @(@($applicableGrant.Scope -split " ").ForEach{ $_.Trim() }) + $scopeGrant } $exampleScope = $group.Group[0] $grant = @{ "clientId" = $appSPN.id "consentType" = "AllPrincipals" "principalId" = $null "resourceId" = $exampleScope.Resource "scope" = $scopeGrant -join " " "expiryTime" = "2299-12-31T00:00:00Z" } Write-Verbose "Granting Admin consent for scope(s) $($group.Group.Value -join ', ') on $($appSPN.appid) ($($appSPN.displayName))" $method = 'POST' $apiPath = 'oauth2PermissionGrants' if ($applicableGrant) { $method = 'PATCH' $apiPath = "oauth2PermissionGrants/$($applicableGrant.id)" $grant = @{ scope = $scopeGrant -join " " } } try { $null = Invoke-EntraRequest -Method $method -Path $apiPath -Body $grant -Header @{ 'content-type' = 'application/json' } } catch { Write-Error $_ } } } } function New-EAGAppRegistration { <# .SYNOPSIS Creates a new App Registration in the connected Entra ID tenant. .DESCRIPTION Creates a new App Registration in the connected Entra ID tenant. By default, it will also create the associated Enterprise Application (service principal). Scopes Needed: Application.ReadWrite.All .PARAMETER DisplayName The display name of the App Registration. .PARAMETER Description The description of the App Registration. .PARAMETER RedirectUri Any redirect URIs to associate with the App Registration. These are needed for Delegated authentication flows, where the application acts on behalf of a user. .PARAMETER Platform When specifying a RedirectUri, what "Platform" should be configured. This determines, how authentication can be performed. Options: - MobileDesktop: This will enable the authentication, where a browser window pops up and asks the user to authenticate. (Authorization Code flow) - Web: This will enable the authentication, where the user is asked to open a specific URL and paste in a code provided, THEN authenticate. (DeviceCode flow) Generally, MobileDesktop is the preferred option, as it is more user-friendly and secure. Defaults to: MobileDesktop .PARAMETER NoEnterpriseApp Do not create the associated Enterprise Application (service principal). By default, the Enterprise Application is created automatically, as without it, the App Registration cannot really be used. .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .EXAMPLE PS C:\> New-EAGAppRegistration -DisplayName "DEPT-AAA-Task1" -RedirectUri "http://Localhost" Creates a new App Registration named "DEPT-AAA-Task1" with the redirect URI "http://Localhost". This could then be used to authenticate to interactively from PowerShell. .LINK https://learn.microsoft.com/en-us/graph/api/application-post-applications?view=graph-rest-1.0&tabs=http #> [CmdletBinding(SupportsShouldProcess = $true)] param ( [Parameter(Mandatory = $true)] [string] $DisplayName, [string] $Description, [string[]] $RedirectUri, [ValidateSet('MobileDesktop', 'Web')] [string] $Platform = 'MobileDesktop', [switch] $NoEnterpriseApp, [hashtable] $ServiceMap = @{} ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet } process { $body = @{ displayName = $DisplayName } if ($RedirectUri) { switch ($Platform) { MobileDesktop { $body["publicClient"] = @{ redirectUris = @($RedirectUri) } } Web { $body["web"] = @{ redirectUris = @($RedirectUri) } } default { Invoke-TerminatingException -Message "Platform not implemented yet: $Platform" -Cmdlet $PSCmdlet -Category NotImplemented } } } if ($Description) { $Body.description = $Description } Write-Verbose "Final Request Body:`n$($body | ConvertTo-Json)" if (-not $PSCmdlet.ShouldProcess($DisplayName, "Create App Registration")) { return } $appRegistration = Invoke-EntraRequest -Service $services.Graph -Method POST -Path applications -Body $body -Header @{ 'content-type' = 'application/json' } $appRegistration | ConvertFrom-Application if ($NoEnterpriseApp) { return } $null = Invoke-EntraRequest -Service $services.Graph -Method POST -Path servicePrincipals -Body @{ appId = $appRegistration.appId } -Header @{ 'content-type' = 'application/json' } } } function Remove-EAGAppRegistration { <# .SYNOPSIS Murders innocent App Registrations. .DESCRIPTION Murders innocent App Registrations. They will be gone, forever. Rest in Pieces. Scopes Needed: Application.ReadWrite.All .PARAMETER Id Object ID of the app registration to slaughter. .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .EXAMPLE PS C:\> Get-EAGAppRegistration -DisplayName "MyWebApp" | Remove-EAGAppRegistration Deletes the app registration with the display name "MyWebApp". #> [CmdletBinding(SupportsShouldProcess = $true)] param ( [Parameter(Mandatory = $true, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [string[]] $Id, [hashtable] $ServiceMap = @{} ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet } process { foreach ($entry in $Id) { if (-not $PSCmdlet.ShouldProcess($entry, "Delete App Registration")) { continue } try { Invoke-EntraRequest -Service $services.Graph -Method DELETE -Path "applications/$entry" } catch { $PSCmdlet.WriteError($_) continue } } } } function Remove-EAGAppScope { <# .SYNOPSIS Removes API permissions (scopes) from an App Registration. .DESCRIPTION Removes API permissions (scopes) from an App Registration. Scopes Needed: Application.Read.All, AppRoleAssignment.ReadWrite.All .PARAMETER DisplayName The display name of the App Registration to remove scopes from. .PARAMETER ApplicationId The Application ID (Client ID) of the App Registration to remove scopes from. .PARAMETER ObjectId The Object ID of the App Registration to remove scopes from. .PARAMETER Scope The permissions (scopes) to remove from the App Registration. .PARAMETER Type The type of the permissions to remove. Valid Options: - Delegated: Permissions that apply to interactive sessions, where the application acts on behalf of the signed-in user. - Application: Permissions that apply to unattended sessions, where the application acts as itself. .PARAMETER Resource The resource (API) to which the permissions/scopes apply. This can be specified as a display name, application ID, object ID or Service Principal Name. Examples: + 'Microsoft Graph' + '00000003-0000-0000-c000-000000000000' + 'https://graph.microsoft.com' .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .EXAMPLE PS C:\> Remove-EAGAppScope -DisplayName "MyWebApp" -Resource "Microsoft Graph" -Scope "User.Read.All" -Type Application Removes the User.Read.All application permission for Microsoft Graph from the App Registration named "MyWebApp". .EXAMPLE PS C:\> Get-EAGAppRegistration -DisplayName D-AAA-Task1 | Get-EAGScope | Remove-EAGAppScope Removes all scopes from the App Registration named "D-AAA-Task1". #> [CmdletBinding(SupportsShouldProcess = $true, DefaultParameterSetName = 'Filter')] param ( [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $DisplayName, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(Mandatory = $true, ParameterSetName = 'Identity', ValueFromPipelineByPropertyName = $true)] [Alias('Id')] [string] $ObjectId, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string[]] $Scope, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [ValidateSet('Delegated','Application')] [string] $Type, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string] $Resource, [hashtable] $ServiceMap ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet $principals = @{ } } process { #region Resolve Scope Data $result = Resolve-ServicePrincipal -Identity $Resource -Cache $principals -Unique -Services $services if (-not $result.Success) { Write-Error -Message $result.Message return } $servicePrincipal = $result.Result $resolvedScopes = foreach ($entry in $Scope) { $scopeEntry = Resolve-Scope -Scope $entry -Resource $servicePrincipal.ID -Type $Type -Services $services if ($scopeEntry.ScopeName -eq '<not identified>') { Write-Error "Scope $entry of type $Type not found on Service Principal $($servicePrincipal.DisplayName) ($($servicePrincipal.ID) | $Resource)" continue } $scopeEntry } if (-not $resolvedScopes) { Write-Error -Message "No valid scopes found! Use 'Get-EAGScopeDefinition' to find the valid scopes for the resource and try again." return } #endregion Resolve Scope Data #region Resolve Application Data # Note: Can't cache, since previous process blocks might have affected the same object $result = Resolve-Application -DisplayName $DisplayName -ApplicationId $ApplicationId -ObjectId $ObjectId -Unique -Services $services if (-not $result.Success) { Write-Error $result.Message return } $application = $result.Result #endregion Resolve Application Data $body = @{ requiredResourceAccess = @() } $newAccess = [PSCustomObject]@{ resourceAppId = $servicePrincipal.AppId resourceAccess = @() } foreach ($access in $application.object.requiredResourceAccess) { if ($access.resourceAppId -ne $servicePrincipal.AppId) { $body.requiredResourceAccess += $access continue } foreach ($entry in $access.resourceAccess) { if ($entry.id -in $resolvedScopes.ID) { continue } $newAccess.resourceAccess += $entry } } if ($newAccess.resourceAccess.Count -gt 0) { $body.requiredResourceAccess += $newAccess } Write-Verbose ($body | ConvertTo-Json -Depth 99) if (-not $PSCmdlet.ShouldProcess($application.Id, "Removing scopes $($resolvedScopes.Value -join ', ')")) { return } try { $null = Invoke-EntraRequest -Method PATCH -Path "applications/$($application.Id)" -Body $body -Header @{ 'content-type' = 'application/json' } } catch { $PSCmdlet.WriteError($_) return } } } function Remove-EAGMsiScope { <# .SYNOPSIS Removes API permissions (scopes) from a Managed Service Identity. .DESCRIPTION The Remove-EAGMsiScope cmdlet removes application permissions (scopes) from a Managed Service Identity (MSI). This is useful when you need to revoke access to specific APIs or reduce the permissions of an MSI. Scopes Needed: Application.Read.All, AppRoleAssignment.ReadWrite.All .PARAMETER DisplayName The display name of the Managed Service Identity to remove permissions from. .PARAMETER ApplicationId The Application ID (Client ID) of the Managed Service Identity to remove permissions from. .PARAMETER ObjectId The Object ID of the Managed Service Identity to remove permissions from. .PARAMETER Scope The permission scopes to remove from the Managed Service Identity. These are the API permissions that will be revoked. .PARAMETER Resource The resource (API) to which the permissions/scopes apply. This can be specified as a display name, application ID, object ID or Service Principal Name. Examples: + 'Microsoft Graph' + '00000003-0000-0000-c000-000000000000' + 'https://graph.microsoft.com' .PARAMETER ServiceMap %SERVCICEMAP% .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .EXAMPLE PS C:\> Remove-EAGMsiScope -DisplayName "MyWebApp" -Resource "Microsoft Graph" -Scope "User.Read.All" Removes the User.Read.All application permission for Microsoft Graph from the MSI named "MyWebApp". .EXAMPLE PS C:\> Remove-EAGMsiScope -ApplicationId "11111111-1111-1111-1111-111111111111" -Resource "00000003-0000-0000-c000-000000000000" -Scope "User.Read.All", "Group.Read.All" Removes the User.Read.All and Group.Read.All application permissions for Microsoft Graph (identified by its app ID) from the MSI with the specified application ID. #> [CmdletBinding(DefaultParameterSetName = 'Filter', SupportsShouldProcess = $true)] param ( [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $DisplayName, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(Mandatory = $true, ParameterSetName = 'Identity', ValueFromPipelineByPropertyName = $true)] [Alias('Id')] [string] $ObjectId, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string[]] $Scope, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string] $Resource, [hashtable] $ServiceMap ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet $principals = @{ } $servicePrincipals = @{} } process { #region Resolve Scope Data $result = Resolve-ServicePrincipal -Identity $Resource -Cache $principals -Unique -Services $services if (-not $result.Success) { Write-Error -Message $result.Message return } $servicePrincipal = $result.Result $resolvedScopes = foreach ($entry in $Scope) { $scopeEntry = Resolve-Scope -Scope $entry -Resource $servicePrincipal.ID -Type 'Application' -Services $services if ($scopeEntry.ScopeName -eq '<not identified>') { Write-Error "Scope $entry of type $Type not found on Service Principal $($servicePrincipal.DisplayName) ($($servicePrincipal.ID) | $Resource)" continue } $scopeEntry } if (-not $resolvedScopes) { Write-Error -Message "No valid scopes found! Use 'Get-EAGScopeDefinition' to find the valid scopes for the resource and try again." return } #endregion Resolve Scope Data #region Resolve Application Data $identity = $ObjectId if (-not $identity) { $identity = $ApplicationId } if (-not $identity) { $identity = $DisplayName } if (-not $identity) { Write-Error -Message "Managed Identity not specified! Provide at least one of ObjectId, ApplicationId or DisplayName." return } $result = Resolve-ServicePrincipal -Identity $identity -Properties id, appId, displayName -Cache $servicePrincipals -Unique -Services $services if (-not $result.Success) { Write-Error "Error resolving Managed Identity for $($identity):`n$($result.Message)" return } $appSPN = $result.Result #endregion Resolve Application Data $applicationGrants = Invoke-EntraRequest -Service $services.Graph -Path "servicePrincipals/$($appSPN.id)/appRoleAssignments" foreach ($resolvedScope in $resolvedScopes) { if ($resolvedScope.ID -notin $applicationGrants.appRoleId) { Write-Verbose "Skipping Application scope $($resolvedScope.Value) - not found on $($appSPN.DisplayName)" continue } if (-not $PSCmdlet.ShouldProcess("$($appSPN.DisplayName) ($($appSPN.AppID))", "Removing scope $($resolvedScope.Value) of resource $($resolvedScope.ResourceName)")) { continue } Write-Verbose "Processing scope:`n$($resolvedScope | ConvertTo-Json)" $grantToKill = $applicationGrants | Where-Object appRoleId -EQ $resolvedScope.ID Write-Verbose "Removing scope $($resolvedScope.id) ($($resolvedScope.Value))) from Managed Identity $($appSPN.appid) ($($appSPN.displayName))" try { $null = Invoke-EntraRequest -Method DELETE -Path "servicePrincipals/$($appSPN.id)/appRoleAssignments/$($grantToKill.id)" -Header @{ 'content-type' = 'application/json' } } catch { Write-Error $_ } } } } function Remove-EAGServicePrincipal { <# .SYNOPSIS Deletes Enterprise Applications / service principals from the connected Entra ID tenant. .DESCRIPTION Deletes Enterprise Applications / service principals from the connected Entra ID tenant. Scopes Needed: Application.ReadWrite.All .PARAMETER Id Object ID of the service principal to delete. .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .EXAMPLE PS C:\> Get-EAGServicePrincipal -DisplayName "MyWebApp" | Remove-EAGServicePrincipal Deletes the service principal with the display name "MyWebApp". #> [CmdletBinding(SupportsShouldProcess = $true)] param ( [Parameter(Mandatory = $true, ValueFromPipeline = $true, ValueFromPipelineByPropertyName = $true)] [string[]] $Id, [hashtable] $ServiceMap = @{} ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet } process { foreach ($entry in $Id) { if (-not $PSCmdlet.ShouldProcess($entry, "Delete Service Principal")) { continue } try { Invoke-EntraRequest -Service $services.Graph -Method DELETE -Path "servicePrincipals/$entry" } catch { $PSCmdlet.WriteError($_) continue } } } } function Revoke-EAGScopeConsent { <# .SYNOPSIS Revokes previously granted consent for scopes on an App Registration. .DESCRIPTION Revokes previously granted consent for scopes on an App Registration. Consent is required for scopes configured on an app registration to take effect in the tenant. Scopes Needed: Application.Read.All, AppRoleAssignment.ReadWrite.All .PARAMETER DisplayName Displayname of the app registration whose scopes to revoke consent for. .PARAMETER ApplicationId Application ID (Client ID) of the app registration whose scopes to revoke consent for. .PARAMETER ObjectId Object ID of the app registration whose scopes to revoke consent for. .PARAMETER Scope The permission scopes to revoke consent for. .PARAMETER Type Type of the permission scopes to revoke consent for. Valid Options: - Delegated: Permissions that apply to interactive sessions, where the application acts on behalf of the signed-in user. - Application: Permissions that apply to unattended sessions, where the application acts as itself. .PARAMETER Resource The resource (API) to which the permissions/scopes apply. This can be specified as a display name, application ID, object ID or Service Principal Name. Examples: + 'Microsoft Graph' + '00000003-0000-0000-c000-000000000000' + 'https://graph.microsoft.com' .PARAMETER ServiceMap Optional hashtable to map service names to specific EntraAuth service instances. Used for advanced scenarios where you want to use something other than the default Graph connection. Example: @{ Graph = 'GraphBeta' } This will switch all Graph API calls to use the beta Graph API. .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .EXAMPLE PS C:\> Revoke-EAGScopeConsent -DisplayName "MyWebApp" -Resource "Microsoft Graph" -Scope "User.Read.All" -Type Application Revokes consent for the User.Read.All application permission for Microsoft Graph from the app registration named "MyWebApp". #> [CmdletBinding(DefaultParameterSetName = 'Filter', SupportsShouldProcess = $true)] param ( [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [string] $DisplayName, [Parameter(ParameterSetName = 'Filter', ValueFromPipelineByPropertyName = $true)] [Alias('AppId', 'ClientID')] [string] $ApplicationId, [Parameter(Mandatory = $true, ParameterSetName = 'Identity', ValueFromPipelineByPropertyName = $true)] [Alias('Id')] [string] $ObjectId, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string[]] $Scope, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [ValidateSet('Delegated', 'Application')] [string] $Type, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string] $Resource, [hashtable] $ServiceMap ) begin { $services = $script:serviceSelector.GetServiceMap($ServiceMap) Assert-EntraConnection -Service $services.Graph -Cmdlet $PSCmdlet $principals = @{ } $applications = @{ } $servicePrincipals = @{ } } process { #region Resolve Scope Data $result = Resolve-ServicePrincipal -Identity $Resource -Cache $principals -Unique -Services $services if (-not $result.Success) { Write-Error -Message $result.Message return } $servicePrincipal = $result.Result $resolvedScopes = foreach ($entry in $Scope) { $scopeEntry = Resolve-Scope -Scope $entry -Resource $servicePrincipal.ID -Type $Type -Services $services if ($scopeEntry.ScopeName -eq '<not identified>') { Write-Error "Scope $entry of type $Type not found on Service Principal $($servicePrincipal.DisplayName) ($($servicePrincipal.ID) | $Resource)" continue } $scopeEntry } if (-not $resolvedScopes) { Write-Error -Message "No valid scopes found! Use 'Get-EAGScopeDefinition' to find the valid scopes for the resource and try again." return } #endregion Resolve Scope Data #region Resolve Application Data $result = Resolve-Application -DisplayName $DisplayName -ApplicationId $ApplicationId -ObjectId $ObjectId -Cache $applications -Unique -Services $services if (-not $result.Success) { Write-Error $result.Message return } $application = $result.Result $result = Resolve-ServicePrincipal -Identity $application.AppID -Properties id -Cache $servicePrincipals -Unique -Services $services if (-not $result.Success) { Write-Error "Error resolving Enterprise Application for $($application.AppID):`n$($result.Message)" return } $appSPN = $result.Result #endregion Resolve Application Data $applicationGrants = Invoke-EntraRequest -Service $services.Graph -Path "servicePrincipals/$($appSPN.id)/appRoleAssignments" $delegatedGrants = Invoke-EntraRequest -Service $services.Graph -Path 'oauth2PermissionGrants' -Query @{ '$filter' = "clientId eq '$($appSPN.id)' and consentType eq 'AllPrincipals'" } $oldDelegateGrants = @() foreach ($resolvedScope in $resolvedScopes) { if ($resolvedScope.Type -eq 'Application' -and $resolvedScope.ID -notin $applicationGrants.appRoleId) { Write-Verbose "Skipping Application scope $($resolvedScope.Value) - no consent found for $($application.DisplayName)" continue } if ($resolvedScope.Type -eq 'Delegated' -and $resolvedScope.Value -notin @($delegatedGrants.scope -split ' ').ForEach{ $_.Trim() }) { Write-Verbose "Skipping Delegated scope $($resolvedScope.Value) - no consent found for $($application.DisplayName)" continue } if (-not $PSCmdlet.ShouldProcess("$($application.DisplayName) ($($application.AppID))", "Revoke consent for scope $($resolvedScope.Value) of resource $($resolvedScope.ResourceName)")) { continue } Write-Verbose "Processing scope:`n$($resolvedScope | ConvertTo-Json)" switch ($resolvedScope.Type) { 'Application' { $toRevoke = $applicationGrants | Where-Object appRoleId -EQ $resolvedScope.ID Write-Verbose "Revoking Admin consent for scope $($resolvedScope.id) ($($resolvedScope.Value))) on $($appSPN.appid) ($($appSPN.displayName))" try { $null = Invoke-EntraRequest -Method DELETE -Path "servicePrincipals/$($appSPN.id)/appRoleAssignments/$($toRevoke.id)" -Header @{ 'content-type' = 'application/json' } } catch { Write-Error $_ } } 'Delegated' { $oldDelegateGrants += $resolvedScope } default { Write-Error "Unexpected scope type: $($resolvedScope.Type)" } } } if (-not $oldDelegateGrants) { return } $byResource = $oldDelegateGrants | Group-Object Resource foreach ($group in $byResource) { $applicableGrant = $delegatedGrants | Where-Object resourceId -eq $group.Name $survivingScopes = @($applicableGrant.Scope -split " ").ForEach{ $_.Trim() } | Where-Object { $_ -notin $group.Group.Value } Write-Verbose "Revoking Admin consent for scope(s) $($group.Group.Value -join ', ') on $($appSPN.appid) ($($appSPN.displayName))" if (-not $survivingScopes) { try { $null = Invoke-EntraRequest -Method DELETE -Path "oauth2PermissionGrants/$($applicableGrant.id)" -Header @{ 'content-type' = 'application/json' } } catch { Write-Error $_ } continue } $grant = @{ scope = $survivingScopes -join " " } try { $null = Invoke-EntraRequest -Method 'PATCH' -Path "oauth2PermissionGrants/$($applicableGrant.id)" -Body $grant -Header @{ 'content-type' = 'application/json' } } catch { Write-Error $_ } } } } class FilterBuilder { [System.Collections.ArrayList]$Entries = @() [string]$CustomFilter [void]Add([string]$Property, [string]$Operator, $Value) { $null = $this.Entries.Add( @{ Property = $Property Operator = $Operator Value = $Value } ) } [int]Count() { $myCount = $this.Entries.Count if ($this.CustomFilter) { $myCount++ } return $myCount } [string]Get() { $segments = foreach ($entry in $this.Entries) { $valueString = $entry.Value -as [string] if ($null -eq $entry.Value) { $valueString = "''" } if ($entry.Value -is [string]) { $valueString = "'$($entry.Value)'" if ($entry.Value -match '\*$' -and $entry.Operator -eq 'eq') { "startswith($($entry.Property), '$($entry.Value.TrimEnd('*'))')" continue } } '{0} {1} {2}' -f $entry.Property, $entry.Operator, $valueString } if ($this.CustomFilter) { if ($segments) { $segments = @($segments) + $this.CustomFilter } else { $segments = $this.CustomFilter } } return $segments -join ' and ' } } class ServiceSelector { [string]GetService([hashtable]$ServiceMap, [string]$Name) { if ($ServiceMap[$Name]) { return $ServiceMap[$Name] } return $script:_services[$Name] } [hashtable]GetServiceMap([hashtable]$ServiceMap) { $map = $script:_services.Clone() if ($ServiceMap) { foreach ($pair in $ServiceMap.GetEnumerator()) { $map[$pair.Key] = $pair.Value } } return $map } } # Graph Request Configuration $script:_services = @{ Graph = 'Graph' GraphBeta = 'GraphBeta' } $script:serviceSelector = [ServiceSelector]::new() # Caches for frequent lookups $script:cache = @{ ServicePrincipalByAppID = @{} ServicePrincipalByID = @{} ScopesByID = @{} ResolvedScopes = @{} Principals = @{} } |