Skip to content

Latest commit

 

History

History
95 lines (81 loc) · 12.4 KB

README.md

File metadata and controls

95 lines (81 loc) · 12.4 KB

PSGallery Version PSGallery Downloads PSGallery Platform

The Microsoft Identity Tools PowerShell module provides various tools for performing enhanced Identity administration activities. It is intended to address more complex business scenarios that can't be met solely with the use of MS Graph PowerShell SDK module.

What is contained in the MSIdentityTools module?

A collection of cmdlets that use the MS Graph SDK PowerShell module to simplify common tasks for administrators of Azure AD tenants.

How do I install the module?

The module can be found and installed from the PowerShell gallery at PowerShell Gallery: MSIdentity Tools or can be downloaded from the releases page on this repo.

What are the cmdlets in this module?

View the latest list of cmdlets on the cmdlet summary page.

Command Synopsys
Add-MsIdServicePrincipal Create service principal for existing application registration
Confirm-MsIdJwtTokenSignature Validate the digital signature for JSON Web Token.
ConvertFrom-MsIdAadcAadConnectorSpaceDn Convert Azure AD connector space object Distinguished Name (DN) in AAD Connect
ConvertFrom-MsIdAadcSourceAnchor Convert Azure AD Connect metaverse object sourceAnchor or Azure AD ImmutableId to sourceGuid.
ConvertFrom-MsIdJwtToken Convert Msft Identity token structure to PowerShell object.
ConvertFrom-MsIdSamlMessage Convert SAML Message structure to PowerShell object.
ConvertFrom-MsIdUniqueTokenIdentifier Convert Azure AD Unique Token Identifier to Request Id.
Expand-MsIdJwtTokenPayload Extract Json Web Token (JWT) payload from JWS structure to PowerShell object.
Find-MsIdUnprotectedUsersWithAdminRoles Find Users with Admin Roles that are not registered for MFA
Get-MsIdAdfsSamlToken Initiates a SAML logon request to and AD FS server to generate log activity and returns the user token.
Get-MsIdAdfsSampleApp Returns the list of availabe sample AD FS relyng party trust applications available in this module. These applications do NOT use real endpoints and are meant to be used as test applications.
Get-MsIdAdfsWsFedToken Initiates a Ws-Fed logon request to and AD FS server to generate log activity and returns the user token.
Get-MsIdAdfsWsTrustToken Initiates a Ws-Trust logon request to and AD FS server to generate log activity and returns the user token.
Get-MsIdApplicationIdByAppId Lookup Application Registration by AppId
Get-MsIdAuthorityUri Build Microsoft Identity Provider Authority URI
Get-MsIdAzureIpRange Get list of IP ranges for Azure
Get-MsIdCrossTenantAccessActivity Gets cross tenant user sign-in activity
Get-MsIdGroupWithExpiration Return groups with an expiration date via lifecycle policy.
Get-MsIdGroupWritebackConfiguration Gets the group writeback configuration for the group ID
Get-MsIdHasMicrosoftAccount Returns true if the user's mail is a Microsoft Account
Get-MsIdInactiveSignInUser Retrieve Users who have not had interactive sign ins since XX days ago
Get-MsIdIsViralUser Returns true if the user's mail domain is a viral (unmanaged) Azure AD tenant.
Get-MsIdMsftIdentityAssociation Parse Microsoft Identity Association Configuration for a Public Domain (such as published apps)
Get-MsIdO365Endpoints Get list of URLs and IP ranges for O365
Get-MsIdOpenIdProviderConfiguration Parse OpenId Provider Configuration and Keys
Get-MsIdProvisioningLogStatistics Get Statistics for Set of Azure AD Provisioning Logs
Get-MsIdSamlFederationMetadata Parse Federation Metadata
Get-MsIdServicePrincipalIdByAppId Lookup Service Principal by AppId
Get-MsIdSigningKeyThumbprint Get signing keys used by Azure AD.
Get-MsIdUnmanagedExternalUser Returns a list of all the external users in the tenant that are unmanaged (viral users).
Get-MsIdUnredeemedInvitedUser Retrieve Users who have not had interactive sign ins since XX days ago
Import-MsIdAdfsSampleApp Imports a list availabe sample AD FS relyng party trust applications available in this module, the list is created by the Get-MsIdAdfsSampleApps cmdlet. These applications do NOT use real endpoints and are meant to be used as test applications.
Import-MsIdAdfsSamplePolicy Imports the 'MsId Block Off Corp and VPN' sample AD FS access control policy. This policy is meant to be used as test policy.
Invoke-MsIdAzureAdSamlRequest Invoke Saml Request on Azure AD.
New-MsIdClientSecret Generate Random Client Secret for application registration or service principal in Azure AD.
New-MsIdSamlRequest Create New Saml Request.
New-MsIdTemporaryUserPassword Generate Random password for user in Azure AD.
New-MsIdWsTrustRequest Create a WS-Trust request.
Reset-MsIdExternalUser Resets the redemption state of an external user.
Resolve-MsIdAzureIpAddress Lookup Azure IP address for Azure Cloud, Region, and Service Tag.
Resolve-MsIdTenant Resolve TenantId or DomainName to an Azure AD Tenant
Revoke-MsIdServicePrincipalConsent Revoke Existing Consent to an Azure AD Service Principal.
Set-MsIdServicePrincipalVisibleInMyApps Toggles whether application service principals are visible when launching myapplications.microsoft.com (MyApps)
Set-MsIdWindowsTlsSettings Set TLS settings on Windows OS to use more secure TLS protocols.
Show-MsIdJwtToken Show Json Web Token (JWT) decoded in Web Browser using diagnostic web app.
Show-MsIdSamlToken Show Saml Security Token decoded in Web Browser using diagnostic web app.
Split-MsIdEntitlementManagementConnectedOrganization Split elements of a connectedOrganization
Test-MsIdAzureAdDeviceRegConnectivity Test connectivity on Windows OS for Azure AD Device Registration
Test-MsIdCBATrustStoreConfiguration Test & report for common mis-configuration issues with the Entra ID Certificate Trust Store
Update-MsIdApplicationSigningKeyThumbprint Update a Service Princpal's preferredTokenSigningKeyThumbprint to the specified certificate thumbprint
Update-MsIdGroupWritebackConfiguration Update an Azure AD cloud group settings to writeback as an AD on-premises group

Support

For issues, questions, and feature requests please review the guidance on the Support page for this project for filing issues.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.