Skip to content

Commit

Permalink
Update AU documentation wording
Browse files Browse the repository at this point in the history
  • Loading branch information
siigil committed Feb 19, 2025
1 parent 04f3cd6 commit 8b735b3
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,7 @@ func init() {
ID: "entra-id.persistence.hidden-au",
FriendlyName: "Create Hidden Scoped Role Assignment Through HiddenMembership AU",
Description: `
Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU.
This simulates an attacker that TODO.
Creates an [Administrative Unit (AU)](https://learn.microsoft.com/en-us/graph/api/resources/administrativeunit?view=graph-rest-1.0) with hidden membership, and a scoped role assignment over this AU. This simulates an attacker attempting to conceal the scope of a scoped role assignment using hidden AU membership.
Warm-up:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ func init() {
ID: "entra-id.persistence.restricted-au",
FriendlyName: "Create Sticky Backdoor User Through Restricted Management AU",
Description: `
Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and place a backdoor account in it to simulate a protected attacker-controlled user.
Creates a [restricted management Administrative Unit (AU)](https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/admin-units-restricted-management), and places a backdoor account in it to simulate a protected attacker-controlled user.
Warm-up:
Expand Down

0 comments on commit 8b735b3

Please sign in to comment.