core/api/EntraID/msgraph/helpers/applications/Get-MonkeyMSGraphAADAPPPermission.ps1
# Monkey365 - the PowerShell Cloud Security Tool for Azure and Microsoft 365 (copyright 2022) by Juan Garrido # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. Function Get-MonkeyMSGraphAADAPPPermission { <# .SYNOPSIS Plugin to get application permissions from Azure AD .DESCRIPTION Plugin to get application permissions from Azure AD .INPUTS .OUTPUTS .EXAMPLE .NOTES Author : Juan Garrido Twitter : @tr1ana File Name : Get-MonkeyMSGraphAADAPPPermission Version : 1.0 .LINK https://github.com/silverhack/monkey365 #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true, ValueFromPipeline = $True)] [Object]$Application, [parameter(Mandatory=$false, HelpMessage="API version")] [ValidateSet("v1.0","beta")] [String]$APIVersion = "v1.0" ) Begin{ if($APIVersion -eq 'beta'){ $consentPath = 'publishedPermissionScopes' } else{ $consentPath = 'oauth2PermissionScopes' } } Process{ try{ $msg = @{ MessageData = ($message.EntraIDAppPermissionInfo -f $Application.appId); callStack = (Get-PSCallStack | Select-Object -First 1); logLevel = 'info'; InformationAction = $O365Object.InformationAction; Verbose = $O365Object.verbose; Tags = @('EntraIDApplicationInfo'); } Write-Information @msg $appRoleAssignment = $Oauth2Grants = $org_consent = $servicePrincipal = $all_permissions = $null $all_permissions = New-Object System.Collections.Generic.List[System.Object] #Search for associated service principal $appId = $Application.appId #Get Service Principal $params = @{ Filter = ("appId eq '{0}'" -f $appId); APIVersion = $APIVersion; InformationAction = $O365Object.InformationAction; Verbose = $O365Object.verbose; Debug = $O365Object.debug; } $servicePrincipal = Get-MonkeyMSGraphAADServicePrincipal @params if($null -ne $servicePrincipal){ #Get Servcice Principal role assignment $params = @{ ServicePrincipalId = $servicePrincipal.id; ElementType = "appRoleAssignments"; APIVersion = $APIVersion; InformationAction = $O365Object.InformationAction; Verbose = $O365Object.verbose; Debug = $O365Object.debug; } $appRoleAssignment = Get-MonkeyMSGraphAADServicePrincipal @params #Get OauthGrants $params = @{ Filter = ("clientId eq '{0}' and consentType eq 'AllPrincipals'" -f $servicePrincipal.id); APIVersion = $APIVersion; InformationAction = $O365Object.InformationAction; Verbose = $O365Object.verbose; Debug = $O365Object.debug; } $Oauth2Grants = Get-MonkeyMSGraphOauth2PermissionGrant @params Start-Sleep -Milliseconds 200 } #Enumerate permissions if($null -ne $Application.PsObject.Properties.Item('requiredResourceAccess')){ foreach($access in $Application.requiredResourceAccess){ $appId = $access.resourceAppId $resourceAccess = $access.resourceAccess #Get Service Principal $params = @{ Filter = ("appId eq '{0}'" -f $appId); APIVersion = $APIVersion; InformationAction = $O365Object.InformationAction; Verbose = $O365Object.verbose; Debug = $O365Object.debug; } $Allowed_ServicePrincipal = Get-MonkeyMSGraphAADServicePrincipal @params #Get permissions if($Allowed_ServicePrincipal){ foreach($rsrc_access in $resourceAccess){ #Create new PsObject $new_permission = New-MonkeyAADAppPermissionObject -Application $Application #Add Service Principal Name $new_permission.ResourceObjectId = $Allowed_ServicePrincipal.id; $new_permission.ResourceDisplayName = $Allowed_ServicePrincipal.appDisplayName; $new_permission.ResourceAppId = $Allowed_ServicePrincipal.appId; $permission = $Allowed_ServicePrincipal.appRoles | Where-Object {$_.id -eq $rsrc_access.Id} if($null -eq $permission){ $new_permission.PermissionType = "Delegated"; #Get consent permission $consent_perm = $Allowed_ServicePrincipal.($consentPath) | Where-Object {$_.id -eq $rsrc_access.Id} if($null -ne $consent_perm){ #Add permission Id $new_permission.PermissionId = $consent_perm.id; if($null -ne $Oauth2Grants){ $org_consent_perm = $Oauth2Grants | Where-Object {$_.scope -eq $consent_perm.value} if($org_consent_perm){ $new_permission.GrantType = ("Granted for {0}" -f $O365Object.Tenant.TenantName); } else{ $new_permission.GrantType = ("Not granted for {0}" -f $O365Object.Tenant.TenantName); } } } } else{ $new_permission.PermissionType = "Application"; $new_permission.PermissionId = $permission.id; if($null -ne $appRoleAssignment){ $org_consent = $appRoleAssignment | Where-Object {$_.appRoleId -eq $permission.Id} } if($org_consent){ $new_permission.GrantType = ("Granted for {0}" -f $O365Object.Tenant.TenantName); } else{ $new_permission.GrantType = ("Not granted for {0}" -f $O365Object.Tenant.TenantName); } } #Get description $published_permission = $Allowed_ServicePrincipal.($consentPath) | Where-Object {$_.id -eq $rsrc_access.id} if($null -ne $published_permission){ $new_permission.PermissionName = $published_permission.value; $new_permission.PermissionDisplayName = $published_permission.adminConsentDisplayName; $new_permission.PermissionDescription = $published_permission.adminConsentDescription; } elseif($null -ne $permission){ $new_permission.PermissionName = $permission.value; $new_permission.PermissionDisplayName = $permission.displayName; $new_permission.PermissionDescription = $permission.description; } #Add permission to array [void]$all_permissions.Add($new_permission) } } } } #Return permissions return $all_permissions } catch{ $msg = @{ MessageData = ($_); callStack = (Get-PSCallStack | Select-Object -First 1); logLevel = 'verbose'; InformationAction = $O365Object.InformationAction; Verbose = $O365Object.verbose; Tags = @('EntraIDApplicationPermissionError'); } Write-Verbose @msg } } End{ #Nothing to do here } } |