-
Notifications
You must be signed in to change notification settings - Fork 260
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Perform hands-on prototyping of how the existing AAD 7.6 through 7.9 policy configurations affect users assigned to roles via PIM for Groups #792
Comments
Prototyping ResultsThe addition of PIM for Groups into the scope of AAD policies 7.6 through 7.9 requires additional configurations of the respective settings at the "group" level - we currently only support the settings applied at the "role" level. See the discussion of gaps and conclusions below. Policies 7.6, 7.8 and 7.9 were tested together because they are all related to "activation", whereas 7.7 is related to "assignment". Spreadsheet with detailed test results is attached. Terminology
AAD 7.6 - Activation of the Global Administrator role SHALL require approval. The following gaps in the existing ScubaGear code (and policy configuration in the baseline) were noted based on the testing:
Conclusions
|
💡 Summary
Currently, in AAD policies 7.6 through 7.9 are related to security configurations in the PIM portal that are associated with "roles". Now that we have enhanced AAD to consider PIM for Groups, we need to test the AAD policies above and see how they affect users that are assigned to roles via membership in a PIM group. Two outcomes can occur from this testing:
Implementation notes
The text was updated successfully, but these errors were encountered: