v-atulyadav
|
6c6d8540d4
|
playbooks commit
|
2022-10-26 18:11:24 +05:30 |
Tong Zhang
|
4499b1a92c
|
discard source.name field in contents
|
2022-10-18 12:48:41 -07:00 |
Tong Zhang
|
b4ced61c74
|
update source kind to community with name standalone
|
2022-10-18 12:13:33 -07:00 |
v-rucdu
|
84fea32da8
|
Added standalone metadata for few files
|
2022-10-14 18:10:38 +05:30 |
v-sabiraj
|
28041a04c4
|
Removed Standalone folder from GitHub (#6123)
|
2022-09-08 18:02:34 +05:30 |
v-amolpatil
|
4f1718748e
|
Create New Playbook Solution for Standalone (#5705)
* initial changes
* Updated playbooks for Standalone
* updated review comments
* minor change- removed empty entities tag
|
2022-07-27 20:13:36 +05:30 |
Lior Tamir
|
aad48299ca
|
Update playbook trigger names
|
2022-02-22 17:02:56 +02:00 |
Lior Tamir
|
cdb42b580c
|
NamedLocation-AdaptToGallery
Add prerequisite, update title to no spaces, add hidden tag
|
2021-08-15 16:33:49 +03:00 |
Brian Delaney
|
897a22241f
|
Delete readme.md
|
2021-08-12 15:45:09 -04:00 |
Brian Delaney
|
9daa2f246b
|
Add files via upload
|
2021-08-12 15:43:05 -04:00 |
Brian Delaney
|
3e12704a03
|
Create readme.md
|
2021-08-12 15:42:34 -04:00 |
Brian Delaney
|
7075200e63
|
Update AddApiPermissions.ps1
|
2021-08-12 15:41:54 -04:00 |
Brian Delaney
|
c465ea773f
|
Create AddApiPermissions.ps1
# This script grants the necessary Microsoft Graph API permissions to the Service Principal.
# Before running, change the $TenantID (line5) to your AAD Tenant ID and the $DisplayNameofMSI (line6) to the name of your Logic App
# This script requires the AzureAD Powershell Module, Install-Module AzureAD
$TenantID="" #AAD Tenant Id
$DisplayNameOfMSI="Add-IP-Entity-To-Named-Location" # Name of the managed identity
Connect-AzureAD -TenantId $TenantID
$MSI = (Get-AzureADServicePrincipal -Filter "displayName eq '$DisplayNameOfMSI'")
Start-Sleep -Seconds 5
#Microsoft Graph API - Policy.Read.All
$GraphAppId = "00000003-0000-0000-c000-000000000000"
$PermissionName = "Policy.Read.All"
$GraphServicePrincipal = Get-AzureADServicePrincipal -Filter "appId eq '$GraphAppId'"
$AppRole = $GraphServicePrincipal.AppRoles | Where-Object {$_.Value -eq $PermissionName -and $_.AllowedMemberTypes -contains "Application"}
New-AzureAdServiceAppRoleAssignment -ObjectId $MSI.ObjectId -PrincipalId $MSI.ObjectId -ResourceId $GraphServicePrincipal.ObjectId -Id $AppRole.Id
Start-Sleep -Seconds 5
#Microsoft Graph API - Policy.ReadWrite.ConditionalAccess
$GraphAppId = "00000003-0000-0000-c000-000000000000"
$PermissionName = "Policy.ReadWrite.ConditionalAccess"
$GraphServicePrincipal = Get-AzureADServicePrincipal -Filter "appId eq '$GraphAppId'"
$AppRole = $GraphServicePrincipal.AppRoles | Where-Object {$_.Value -eq $PermissionName -and $_.AllowedMemberTypes -contains "Application"}
New-AzureAdServiceAppRoleAssignment -ObjectId $MSI.ObjectId -PrincipalId $MSI.ObjectId -ResourceId $GraphServicePrincipal.ObjectId -Id $AppRole.Id
# Disconnect-AzureAD
|
2021-08-12 15:40:25 -04:00 |
Brian Delaney
|
cec2d15a0b
|
Create azuredeploy.json
|
2021-08-12 15:40:00 -04:00 |
Brian Delaney
|
6effabbd25
|
Create readme.md
New Playbook to add IPs to Named Location
|
2021-08-12 15:37:39 -04:00 |