maester icon indicating copy to clipboard operation
maester copied to clipboard

EIDSCA.AP08 test fails when no User Consent is configured.

Open michelderooij opened this issue 1 year ago • 7 comments

Scenario: The ManagePermissionGrantsForSelf is not configured (admin-only consent).

Test: https://graph.microsoft.com/beta/policies/authorizationPolicy .permissionGrantPolicyIdsAssignedToDefaultUserRole | Sort-Object -Descending | select-object -first 1 = 'ManagePermissionGrantsForSelf.microsoft-user-default-low'

EIDSCA.AP08 test fails because permissionGrantPolicyIdsAssignedToDefaultUserRole does not contain ManagePermissionGrantsForSelf and returns something else, in my case:

Your tenant is configured as ManagePermissionGrantsForOwnedResource.microsoft-dynamically-managed-permissions-for-team. The recommended value is 'ManagePermissionGrantsForSelf.microsoft-user-default-low' for policies/authorizationPolicy

If admin-only is configured (more strict), result should be Pass.

michelderooij avatar Apr 25 '24 09:04 michelderooij

@Cloud-Architekt fyi

merill avatar Apr 25 '24 13:04 merill

Hello,

I have the same problem. Only admin are allowed to approve applications with workflow configured.

It seems it has been replace by theses tests:

  • MS.AAD.5.1: Only administrators SHALL be allowed to register applications
  • MS.AAD.5.2: Only administrators SHALL be allowed to consent to applications.
  • MS.AAD.5.3: An admin consent workflow SHALL be configured for applications
  • MS.AAD.5.4: Group owners SHALL NOT be allowed to consent to applications

The 3 first tests succeeds, the fourth fails. The user interface for setting the "group owner ..." has disapeared

If I remember correctly I had disabled that. And last time I saw that parameter MS said they were deprecating it.

JeanPhilippeGeorge avatar May 24 '24 13:05 JeanPhilippeGeorge

And I forget to mention that MS.AAD.5.1: Only administrators SHALL be allowed to register applications. succeeds bcause with the following test result: Your tenant have a conditional policy that "Require MFA for internal users (admins not included) - Basic", which require MFA for all clouds app.

Which seems not related to the title.

JeanPhilippeGeorge avatar May 24 '24 14:05 JeanPhilippeGeorge

While on this topic I also see strange result on MT.1024: Entra Recommendation - Do not allow users to grant consent to unreliable applications. It fails even though we have set up even more strict setting: image

JonesMikael avatar May 27 '24 20:05 JonesMikael

  • MS.AAD.5.4: Group owners SHALL NOT be allowed to consent to applications

The 3 first tests succeeds, the fourth fails. The user interface for setting the "group owner ..." has disapeared

Yes, this is a concern, and it is still unclear how we want to handle alternative checks from those explicitly defined by CISA. (e.g., comment & #194 )

soulemike avatar May 27 '24 23:05 soulemike

In the past, we have decided to follow Microsoft's recommendation to allow consent for low risky classifications in EIDSCA. However, there are valid scenarios for customers to block user consent in general. In that cases, it would be great to have the option to waive or customize the value for this check. This is something we would like to integrate as a feature.

Currently, the only option is to host a customized version of the EIDSCA.json file with the adjusted RecommendValue. You can build customized EIDSCA by providing AadSecConfigUrl parameter in Update-EidscaTests.

Cloud-Architekt avatar May 31 '24 06:05 Cloud-Architekt

Thanks for the clarifications.

I don't remember which security tests i made was recommanding the consent workflow ;-)

JeanPhilippeGeorge avatar Jun 03 '24 13:06 JeanPhilippeGeorge