This repo is dedicated to reporting on Microsoft Entra Conditional Access.
The Invoke-CAPReview.ps1 script now supports a secondary data input method.
Usage:
Invoke-CAPReview.ps1 -collectionType json -folderPath C:\temp\jsonFiles
JSON support was added with the intention to work with the CA Policy Copier extension. https://chromewebstore.google.com/detail/aadhphlmlghfpodlialmlednaboadjan?utm_source=item-share-cb
Download JSON files for all policies to report on. Point the script to the folder and no authentication is required by the script.
To use the original data input format, specify no command line parameters or specify the "graph" collectionType.
This method requires an account that has been delegated read-only permissions to the Graph Command Line Tools (aka Microsoft Graph PowerShell) These permissions (and more) are automatically delegated to highly privileged Entra ID roles however, best practice would require a dedicated account granted only the required permissions. The Grant-CAPPermissions.ps1 is a very simple script that can delegate these permissions. Set the $userUPN variable and run the script as Cloud Application Administrator or equivalent.
Script output reports on statistics and lists all Conditional Access Policies

It then categorizes the policies into 13 best practice categories
Finally, the script begins checking for misconfigurations of Authentication Strengths and Administrative Role usage

