-
Notifications
You must be signed in to change notification settings - Fork 311
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue with subscription "Access to Azure Active Directory" #161
Comments
@aricade that functionality should already be in the script / excluding subscriptions with quotaId 'AAD_*'. Please pass more details at which stage it gets stuck /provide logs and please execute with parameter: -debugAzAPICall |
Thanks @JulianHayward
I ran this connected with SPN that has Tenant READ:
This is the interesting part of the debug verbosity:
Like this over and over the I seem to have 2 I run this to to determine the whitelist subscriptions: EDIT 2:
So PS: thanks for all your work on this project! It is awesome! |
@aricade ok, got it - requires a fix, will update here. Meanwhile try parameter |
wait, really? that is interesting I think it might be opposite. Let me verify. I will update here.
Well, I have tested below 2 work arounds after some confusion:
Option 1: If you want PIM: Option 2: If you don't need PIM: |
Well that's all good, appreciate you looking into this. When you get around to it, let me know and I will verify. |
Had the same "Access to Azure AD" subscriptions. these are legacy and can be deleted. However you cannot do that yourself and need to raise a support ticket with MS to get them removed. I recall there is a 90 day retention before they can actually be deleted. So in the meantime I am running with the -SubscriptionQuotaIdWhitelist argument populated |
Yes I had a call with MS escalated through my CSP. Though the support analyst was saying that these 2 subscriptions are from AAD_PREMIUM_P2 Licenses and Some free trial; Claiming they are required for Azure AD Connect and other features. But after I showed them that as a Subscription Owner I did not have access to modify permissions through IAM, they are looking into it. I think you are right they are legacy and have directed them to your first link when I started the ticket but they seemed convinced this was normal. Hence I started this issue. But I will point them to this issue and the links you have supplied. Thank you very much!
But Thanks! |
@aricade @MarcelHeek
|
@JulianHayward |
@JulianHayward I bumped up to the latest released version, v6_major_20230103_1 and the script fatally exits at the first website slot for all my tenants, so I am back to v6_major_20221228_1 and this issue is introduced after that version. |
@MarcelHeek let´s try the latest in the dev branch (v6_major_20230106_1) |
@JulianHayward Damn, you are fast. The error is gone. |
thanks gents @MarcelHeek @aricade |
Running with a SPN the script get's stuck in an endless failing loop if it tries to analyze MS special subscriptions for licensing called "Access to Azure Active Directory". Not even Tenant Owner/Global Admin can see the roles of these subscriptions. I think only MS can.
Is there a way to add a Subscription Exclude List? Or perhaps another strategy the will work with the code as it is now?
I have been using Management groups to work around it but right now we are moving subscriptions and it would be helpful to analyze everything (subscriptions) from the tenant-root-group.
The text was updated successfully, but these errors were encountered: