- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe to Topic
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
GDAP and Powershell modules
Is it possible to connect to Powershell modules such as MgGraph or exchange online for partner tenants using GDAP as it is with standard DAP?
Or is GDAP limited to api calls only?
Seems like quite a step backwards if you can't use powershell modules with GDAP permissions.
Solved! Go to Solution.
- Labels:
-
Development Platform & Tools
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
@Glenndsq : With GDAP, you define & create the security groups in your tenant that are used to map GDAP permissions customers have granted you.
What this means for your service principal depends on how you plan to set this up - e.g. you could use one security group where permissions are mapped for every customer and make the service principal member of that. There could also be multiple security groups, e.g. a distinct one for each customer, consequently you would need to make the service principal member of each of them.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
@Glenndsq Received a few other reports and can reproduce myself that since last week there seems to be a more widespread issue - secure app model works for connecting to Partner Center, but fails for connecting to any end customer. You can raise a support ticket vias Partner Center, and/or you can contact my team (https://aka.ms/technicalservices) to first have a discussion if your approach is correct and if there are more recommendations.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
@Glenndsq : Can confirm it works the same using GDAP. When you look at the Secure App Model documentation, for GDAP there are some changes:
- Service Principal needs to be added in the security group that get customer permissions mapped and in the AdminAgents security group (instead of only being in AdminAgents as with DAP)
- Same applies to the user account used for the interactive consent/token creation, this also needs to be member in the respective security groups used for GDAP - and in AdminAgent security group.
If your PowerShell scripts don't need access to any Partner Center operations, you would not need to put them in the AdminAgents group though, but only in GDAP-enabled security groups - though this might be a rare scenario, even for just querying customer list you need to be in the Agents-groups.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
Thats great thanks. What are the security group names that need the extra additions?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
@Glenndsq : With GDAP, you define & create the security groups in your tenant that are used to map GDAP permissions customers have granted you.
What this means for your service principal depends on how you plan to set this up - e.g. you could use one security group where permissions are mapped for every customer and make the service principal member of that. There could also be multiple security groups, e.g. a distinct one for each customer, consequently you would need to make the service principal member of each of them.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
GOt it working at last. Thanks for all the help. Had to change a few permissions on the groups.
Superb 🙂
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
Spoke too soon. Not working 😞
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
Thanks very much for your help. I did exactly as described but nothing changed in terms of functionality. Still doesn't work.
I dont think the secure application model wants to play nice for me.
Oh well.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Permalink
- Report Inappropriate Content
GDAP is supposed to be on parity with DAP.
In theory, what was possible regards partner access in DAP should still function via GDAP.
Powershell is not something I have tested though.
A good place to raise and discuss these is the GDAP CSP Security Q&A sessions that partners may join.
GranularDelegatedAdminPrivilegesinCSPQASession Listing Page (eventbuilder.com)
