|
| 1 | +<# |
| 2 | +.SYNOPSIS |
| 3 | + Gets emergency access accounts from the configuration. |
| 4 | +
|
| 5 | +.DESCRIPTION |
| 6 | + Returns emergency access accounts defined in the ZeroTrustAssessment configuration file. |
| 7 | + Uses Maester-style configuration format where customers explicitly define their |
| 8 | + emergency/breakglass accounts. |
| 9 | +
|
| 10 | + Configuration format (in zt-config.json) - follows Maester format: |
| 11 | + { |
| 12 | + "GlobalSettings": { |
| 13 | + "EmergencyAccessAccounts": [ |
| 14 | + { "Type": "User", "UserPrincipalName": "breakglass1@contoso.com" }, |
| 15 | + { "Type": "User", "Id": "00000000-0000-0000-0000-000000000001" }, |
| 16 | + { "Type": "Group", "Id": "00000000-0000-0000-0000-000000000002" } |
| 17 | + ] |
| 18 | + } |
| 19 | + } |
| 20 | +
|
| 21 | + Note: Group-based emergency accounts are resolved at runtime via Microsoft Graph API. |
| 22 | +
|
| 23 | +.PARAMETER Database |
| 24 | + The DuckDB database connection used to resolve user information. |
| 25 | +
|
| 26 | +.OUTPUTS |
| 27 | + Array of PSCustomObject with properties: |
| 28 | + - Id: User's object ID |
| 29 | + - UserPrincipalName: User's UPN |
| 30 | + - DisplayName: User's display name |
| 31 | + - Type: 'User' or 'GroupMember' (indicates user resolved from a configured group) |
| 32 | +
|
| 33 | +.EXAMPLE |
| 34 | + $emergencyAccounts = Get-ZtEmergencyAccessAccounts -Database $Database |
| 35 | +
|
| 36 | +.NOTES |
| 37 | + Created to fix Issue #266 - Test 21815 incorrectly flags emergency access accounts |
| 38 | + as failures for having permanent privileged role assignments. |
| 39 | +
|
| 40 | + Updated to use config-based approach per PM feedback (FIDO2 requirement too strict). |
| 41 | +#> |
| 42 | + |
| 43 | +function Get-ZtEmergencyAccessAccounts { |
| 44 | + [CmdletBinding()] |
| 45 | + param( |
| 46 | + [Parameter(Mandatory = $true)] |
| 47 | + $Database |
| 48 | + ) |
| 49 | + |
| 50 | + Write-PSFMessage '🟦 Start' -Tag Test -Level VeryVerbose |
| 51 | + Write-PSFMessage 'Getting emergency access accounts from configuration' -Level Verbose |
| 52 | + |
| 53 | + # Get emergency accounts from PSFConfig (set by Invoke-ZtAssessment) |
| 54 | + $configuredAccounts = Get-PSFConfigValue -FullName 'ZeroTrustAssessment.EmergencyAccessAccounts' |
| 55 | + |
| 56 | + if (-not $configuredAccounts -or $configuredAccounts.Count -eq 0) { |
| 57 | + Write-PSFMessage 'No emergency access accounts configured' -Level Verbose |
| 58 | + return @() |
| 59 | + } |
| 60 | + |
| 61 | + Write-PSFMessage "Found $($configuredAccounts.Count) configured emergency access accounts" -Level Verbose |
| 62 | + |
| 63 | + $emergencyAccessAccounts = @() |
| 64 | + |
| 65 | + foreach ($account in $configuredAccounts) { |
| 66 | + $type = $account.Type |
| 67 | + $id = $account.Id |
| 68 | + $upn = $account.UserPrincipalName |
| 69 | + |
| 70 | + if ($type -eq 'User') { |
| 71 | + # Resolve user by UPN or ID |
| 72 | + if ($upn) { |
| 73 | + # Lower-case both sides for case-insensitive UPN match (portable; avoids DB-specific COLLATE syntax) |
| 74 | + $escapedUpn = ($upn.ToLowerInvariant()) -replace "'", "''" |
| 75 | + $sql = "SELECT id, userPrincipalName, displayName FROM User WHERE LOWER(userPrincipalName) = '$escapedUpn'" |
| 76 | + } |
| 77 | + elseif ($id) { |
| 78 | + $guidRef = [System.Guid]::Empty |
| 79 | + if (-not [System.Guid]::TryParse($id, [ref]$guidRef)) { |
| 80 | + Write-PSFMessage "Skipping invalid user entry: Id '$id' is not a valid GUID" -Level Warning |
| 81 | + continue |
| 82 | + } |
| 83 | + $escapedId = $guidRef.ToString() |
| 84 | + $sql = "SELECT id, userPrincipalName, displayName FROM User WHERE id = '$escapedId'" |
| 85 | + } |
| 86 | + else { |
| 87 | + Write-PSFMessage "Skipping invalid user entry: no Id or UserPrincipalName provided" -Level Warning |
| 88 | + continue |
| 89 | + } |
| 90 | + |
| 91 | + $user = Invoke-DatabaseQuery -Database $Database -Sql $sql | Select-Object -First 1 |
| 92 | + |
| 93 | + if ($user) { |
| 94 | + $emergencyAccessAccounts += [PSCustomObject]@{ |
| 95 | + Id = $user.id |
| 96 | + UserPrincipalName = $user.userPrincipalName |
| 97 | + DisplayName = $user.displayName |
| 98 | + Type = 'User' |
| 99 | + } |
| 100 | + Write-PSFMessage "Emergency access user found: $($user.userPrincipalName)" -Level Verbose |
| 101 | + } |
| 102 | + else { |
| 103 | + Write-PSFMessage "Emergency access user not found in tenant: UPN=$upn, Id=$id" -Level Warning |
| 104 | + } |
| 105 | + } |
| 106 | + elseif ($type -eq 'Group') { |
| 107 | + if (-not $id) { |
| 108 | + Write-PSFMessage "Skipping invalid group entry: no Id provided" -Level Warning |
| 109 | + continue |
| 110 | + } |
| 111 | + |
| 112 | + $guidRef = [System.Guid]::Empty |
| 113 | + if (-not [System.Guid]::TryParse($id, [ref]$guidRef)) { |
| 114 | + Write-PSFMessage "Skipping invalid group entry: Id '$id' is not a valid GUID" -Level Warning |
| 115 | + continue |
| 116 | + } |
| 117 | + |
| 118 | + # Resolve group members via Microsoft Graph API (GroupMember table not available in DB) |
| 119 | + try { |
| 120 | + Write-PSFMessage "Resolving emergency access group members via Graph API: Id=$id" -Level Verbose |
| 121 | + $membersResponse = Get-ZtGroupMember -GroupId $id -Recurse -ErrorAction Stop |
| 122 | + $members = @($membersResponse | Where-Object { $_.'@odata.type' -eq '#microsoft.graph.user' }) |
| 123 | + |
| 124 | + if ($members.Count -gt 0) { |
| 125 | + # Batch all member IDs into a single SQL lookup to avoid N+1 queries; |
| 126 | + # member IDs come from Graph API responses which are always valid GUIDs. |
| 127 | + $escapedIds = $members | ForEach-Object { |
| 128 | + $memberGuid = [System.Guid]::Empty |
| 129 | + if ([System.Guid]::TryParse($_.id, [ref]$memberGuid)) { |
| 130 | + "'" + $memberGuid.ToString() + "'" |
| 131 | + } |
| 132 | + } | Where-Object { $_ } |
| 133 | + |
| 134 | + if (-not $escapedIds) { |
| 135 | + Write-PSFMessage "Emergency access group members had no valid GUIDs: Id=$id" -Level Warning |
| 136 | + } |
| 137 | + else { |
| 138 | + $idList = $escapedIds -join ',' |
| 139 | + $memberSql = "SELECT id, userPrincipalName, displayName FROM User WHERE id IN ($idList)" |
| 140 | + $userDetailsList = @(Invoke-DatabaseQuery -Database $Database -Sql $memberSql) |
| 141 | + |
| 142 | + foreach ($userDetails in $userDetailsList) { |
| 143 | + $emergencyAccessAccounts += [PSCustomObject]@{ |
| 144 | + Id = $userDetails.id |
| 145 | + UserPrincipalName = $userDetails.userPrincipalName |
| 146 | + DisplayName = $userDetails.displayName |
| 147 | + Type = 'GroupMember' |
| 148 | + } |
| 149 | + Write-PSFMessage "Emergency access group member found: $($userDetails.userPrincipalName)" -Level Verbose |
| 150 | + } |
| 151 | + } |
| 152 | + } |
| 153 | + else { |
| 154 | + Write-PSFMessage "Emergency access group has no user members: Id=$id" -Level Warning |
| 155 | + } |
| 156 | + } |
| 157 | + catch { |
| 158 | + Write-PSFMessage "Failed to resolve emergency access group members: Id=$id. Error: $($_.Exception.Message)" -Level Warning |
| 159 | + } |
| 160 | + } |
| 161 | + else { |
| 162 | + Write-PSFMessage "Skipping unknown account type: $type" -Level Warning |
| 163 | + } |
| 164 | + } |
| 165 | + |
| 166 | + Write-PSFMessage "Total emergency access accounts resolved: $($emergencyAccessAccounts.Count)" -Level Verbose |
| 167 | + |
| 168 | + return $emergencyAccessAccounts |
| 169 | +} |
0 commit comments