Skip to content

Commit

Permalink
Merge pull request #635 from siigil/katie.knowles/au-todo-update
Browse files Browse the repository at this point in the history
Update AU Documentation
  • Loading branch information
siigil authored Feb 19, 2025
2 parents da1a353 + 8b735b3 commit 72c14e0
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 6 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -17,8 +17,7 @@ Platform: Entra ID
## Description


Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU.
This simulates an attacker that TODO.
Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU. This simulates an attacker attempting to conceal the scope of a scoped role assignment using hidden AU membership.

<span style="font-variant: small-caps;">Warm-up</span>:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ Platform: Entra ID
## Description


Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and place a backdoor account in it to simulate a protected attacker-controlled user.
Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and places a backdoor account in it to simulate a protected attacker-controlled user.

<span style="font-variant: small-caps;">Warm-up</span>:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ func init() {
ID: "entra-id.persistence.hidden-au",
FriendlyName: "Create Hidden Scoped Role Assignment Through HiddenMembership AU",
Description: `
Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU.
This simulates an attacker that TODO.
Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU. This simulates an attacker attempting to conceal the scope of a scoped role assignment using hidden AU membership.
Warm-up:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ func init() {
ID: "entra-id.persistence.restricted-au",
FriendlyName: "Create Sticky Backdoor User Through Restricted Management AU",
Description: `
Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and place a backdoor account in it to simulate a protected attacker-controlled user.
Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and places a backdoor account in it to simulate a protected attacker-controlled user.
Warm-up:
Expand Down

0 comments on commit 72c14e0

Please sign in to comment.