Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MS.AAD.6.1v1 User passwords SHALL NOT expire. will not pass when non-root domains are in play #1532

Open
rbryndoi opened this issue Jan 27, 2025 · 2 comments
Assignees
Labels
public-reported This issue is reported by the public users of the tool.

Comments

@rbryndoi
Copy link

🐛 Summary

According to Microsoft Support, non-root domains that are configured within Entra inherit their password policies from the parent/root domain. The current tests will always fail on those non-root domains because there is no explicit password expiration policy set, and no way to set the policy (via Graph, or Portal GUI).

To reproduce

Steps to reproduce the behavior:

In an Entra tenant using SCUBA release 1.4

  1. Configure a root domain and set the password policy to never expire (per MS documentation)
  2. Run Scuba Tests
  3. Verify that MS.AAD.6.1v1 passes
  4. Create a new domain that is a subdomain of the primary example: "test.root.gov"
  5. run "Get-MGDomain" in Graph to get a list of all domains. confirm that your new test domain.
  6. Note that the new domain's "IsRoot = False" and the "PasswordValidityPeriodInDays = null"
  7. Run Scuba Tests
  8. The new subdomain will fail, while the root passes.

Expected behavior

Because the subdomains inherit from the root with no way to override the behavior, I expect the non-root domains to be exempt from evaluation (if the root passes, so will the sub, if the root fails, so will the sub).

@buidav buidav added the public-reported This issue is reported by the public users of the tool. label Jan 27, 2025
@tkol2022
Copy link
Collaborator

@mitchelbaker-cisa Can you kindly take a quick look at this since I think you coded a domain / passwords enhancement last year?

@rbryndoi Thanks for reporting!

@mitchelbaker-cisa
Copy link
Collaborator

@rbryndoi Thanks for reporting the issue. I took a closer look and reproduced the failure for a subdomain, even if its root-level domain is verified and configured with passwords set to not expire. We'll get a fix out to address.

Image

Image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
public-reported This issue is reported by the public users of the tool.
Projects
None yet
Development

No branches or pull requests

4 participants