-
Notifications
You must be signed in to change notification settings - Fork 223
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PIM Issue and Workaround: Why arent new envts showing up in my inventory??? #8119
Comments
Hi Jenefer and PowerCat. |
@Jenefer-Monroe Can you confirm that both Global Admin and Power Platform Admin roles are required for our CoE service account for this workaround? We cannot give an account permanently active Global Admin role, this would be significant security issue for us. Global Admin roles are tightly controlled. Our current service account has Power Platform Admin directly assigned, wondering if that will suffice? If not, I would advise against a solution that would require us to open up a large attack vector on our entire Azure tenant. Thank you |
ah great to hear, thanks. |
Hey @Jenefer-Monroe, I have a permanent Power Platform Admin role activated on my account, but am running into the below error when trying to use the grant sys admin action:
Apologies, for some reason I'm unable to upload screenshots. |
It is, sorry for not specifying. |
no problem at all. Repro for HelpIf the above doesn't fix it, please let me know. |
Thanks for your help @Jenefer-Monroe , got it working. Some feedback, the action itself asks for Environment Id, which is a possible output from the list environments as admin action. However, what the action wants is the name field, as shown in the demo flow. What was causing the issue I pasted above was that I was providing it the Environment Id output from the list environments action, not the name, as I was testing from a flow I created on my own. Maybe this could be marked more clearly in the future? Thanks again for your help! |
sorry are you saying you got the test flow to work? Or that the action to escalate privilege's is working for you now? |
I tested the flow "PIM Workaround Flow" and it appears to be failing on all of our Teams environments with error "Action 'Grants_requesting_tenant_admin_user_the_system_admin_role' failed." Is this a known issue, or should it work for Teams environments? I have confirmed my ID has the role "Power Platform Admin" assigned directly. |
Teams environments do seem to work for me in my testing. Can you please resubmit and see if it still fails? If so get me the exact error message and I will reach out internally to see if they have debugging ideas. And then you should also contact product support with the repro if you repro again. |
Looks like D4T environments are failing for me now too. Posted this bug to track here in GitHub: #8580 |
Yes unfortunately it appears that there are some oddities in the way that the action works. |
fixed in August release https://github.com/microsoft/coe-starter-kit/releases/tag/CoEStarterKit-August2024 |
The issue
In the past, as the identity running the inventory flows had the PPAdmin Role, it would get added as a Sys Admin to any new environments as they came in. And if you removed someone with the PPAdmin Role from the Sys Admin to any envt they would just get re-added.
This was just the way the product treated its privileged roles.
This behavior is changing and now these privileged role users will not get added to these SRs by default.
Instead privileged role users will be able to see all information from within product UX (ex all environments in the Admin UX or returned by the connector) but will not get the Sys Admin SR.
While this is good behavior it does conflict with the design of the starter kit which reaches in to all envts in the tenant in order to gather information.
As a result you will need to escalate the identity in all environments in order to continue using the kit.
The feature
Here is information about the feature: Manage admin roles with Microsoft Entra Privileged Identity Management
And about this this limitation for this feature:
Feature is now live!!!
The workaround until we ship with the kit
The action required is not yet available in all regions.
When it is available in your region you can use the temp solution below to fix up the permissions.
Role requirements
Do to complexities around Security Group protections on Environments. The following are the requirements for the Admin Role Used
Required Action
Grants requesting tenant admin user the system admin role within Dataverse in the environment
The workaround until new action available in your region
If you see this when you try to turn on the flow, then the action is not yet available in your region:
There are other existing steps to elevate the user and hence be added, but they are not in a form that the kit can consume yet as the connector is not yet available in all regions.. The product team is actively working to unblock us but we are not yet able to do this elevation for you.
As a result, here are your options:
Once available everywhere
Once this new action is available in all regions, including the sovereign clouds, we will ship with the CoE Starter Kit directly and you will no longer need this temp solution.
The text was updated successfully, but these errors were encountered: