diff --git a/EasyPIM/EasyPIM.psd1 b/EasyPIM/EasyPIM.psd1 index a2df5d9..122a235 100644 --- a/EasyPIM/EasyPIM.psd1 +++ b/EasyPIM/EasyPIM.psd1 @@ -4,7 +4,7 @@ RootModule = 'EasyPIM.psm1' # Version number of this module. -ModuleVersion = '1.6' +ModuleVersion = '1.6.1' # Supported PSEditions # CompatiblePSEditions = @() diff --git a/EasyPIM/functions/Remove-PIMGroupActiveAssignment.ps1 b/EasyPIM/functions/Remove-PIMGroupActiveAssignment.ps1 index ded917b..5ff1271 100644 --- a/EasyPIM/functions/Remove-PIMGroupActiveAssignment.ps1 +++ b/EasyPIM/functions/Remove-PIMGroupActiveAssignment.ps1 @@ -1,20 +1,16 @@ <# .Synopsis - Create an active assignement at the provided scope + Remove an active assignement at the provided scope .Description Active assignment does not require users to activate their role. https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-resource-roles-assign-roles .Parameter tenantID EntraID tenant ID - .Parameter subscriptionID - subscription ID - .Parameter scope - use scope parameter if you want to work at other scope than a subscription .Parameter principalID objectID of the principal (user, group or service principal) - .Parameter rolename - name of the role to assign - .Parameter duration - duration of the assignment, if not set we will use the maximum allowed value from the role policy + .Parameter groupID + ID of the group + .Parameter type + member or owner .Parameter startDateTime When the assignment wil begin, if not set we will use current time .Parameter permanent diff --git a/EasyPIM/internal/functions/Invoke-graph.ps1 b/EasyPIM/internal/functions/Invoke-graph.ps1 index ba46701..d3cb93e 100644 --- a/EasyPIM/internal/functions/Invoke-graph.ps1 +++ b/EasyPIM/internal/functions/Invoke-graph.ps1 @@ -47,7 +47,9 @@ function invoke-graph { "RoleManagementPolicy.ReadWrite.AzureADGroup", "PrivilegedEligibilitySchedule.ReadWrite.AzureADGroup", "PrivilegedAssignmentSchedule.ReadWrite.AzureADGroup", - "PrivilegedAccess.ReadWrite.AzureADGroup") + "PrivilegedAccess.ReadWrite.AzureADGroup", + "AuditLog.Read.All", + "Directory.Read.All") Connect-MgGraph -Tenant $script:tenantID -Scopes $scopes }