@Alex_T_Weinert @odata This should enumerate direct user assignment and users who are a member of a role assigned group
I also left the code in there for those who were curious about service principals and maybe just wanted to trim the synced part and generate a full report
So we create a security group named "Salesforce Admins" and add our admins to the group
Then we configure the claims rule in our Identity Provider to send the role value of System Administrator for members of a group with the display name of "Salesforce Admin" 🚩
Unfortunately, display names are almost never unique, so anyone that can create or modify a group to match the display name can now add admins by adding them to this group
In Entra, ANYONE can create a group by default or owners of groups can modify them, no admin roles needed
That doc is a long but valuable read, especially since CAE affects things you probably don't realize
To start, CAE aware tokens are only supported for Exchange, SharePoint, Teams, and Graph
While any 3rd party can integrate and use CAE, I am not aware of any vendor who did so
Access tokens are typically good for 60-90 minutes, but CAE aware tokens are good for 28 hours because they can be better revoked by risk/location/user changes
Apps that don't support CAE will still get 60-90 minute access tokens
Second, defaults now contain Send and MailItemsAccessed, but still no SearchQueryInitiated* nor a bunch of other records :(
We can and should add them, but it's important to know this means we now need to monitor for new record types since we won't inherit them from defaults
And there it is - Passkey in Microsoft Authenticator!
If you'd like to set up Passkeys in Microsoft Authenticator, follow along. I'll provide a script to grab all existing AAGUIDs from your environment so we can configure this for testing without breaking existing keys :)
Before we being, it's very important to call out that the Preview requires we set "Enforce attestation" to No, and for this reason, we NEED to restrict use to specific keys
In this case, we want to use the Allow option so that only those explicitly on the list can be registered
The query below can be used to identify all AAGUIDs currently in use in your environment
Add those along with these two :)
Authenticator for Android: de1e552d-db1d-4423-a619-566b625cdc84
Authenticator for iOS: 90a3ccdf-635c-4729-a248-9b709135078f