feat(m365): add entra_seamless_sso_disabled security check#10086
Merged
HugoPBrito merged 7 commits intomasterfrom Feb 19, 2026
Merged
feat(m365): add entra_seamless_sso_disabled security check#10086HugoPBrito merged 7 commits intomasterfrom
HugoPBrito merged 7 commits intomasterfrom
Conversation
Contributor
|
✅ All necessary |
Contributor
|
✅ Conflict Markers Resolved All conflict markers have been successfully resolved in this pull request. |
Add new security check entra_seamless_sso_disabled for m365 provider. Includes check implementation, metadata, and unit tests.
e9fc725 to
5c7cf0d
Compare
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## master #10086 +/- ##
=======================================
Coverage 87.60% 87.60%
=======================================
Files 105 106 +1
Lines 4243 4300 +57
=======================================
+ Hits 3717 3767 +50
- Misses 526 533 +7
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
Contributor
🔒 Container Security ScanImage: 📊 Vulnerability Summary
4 package(s) affected
|
…ess_sso_disabled - Remove single quotes around organization name in status_extended messages - Update tests to match new message format
HugoPBrito
previously approved these changes
Feb 19, 2026
…n error handling - Use DirectorySyncSettings.seamless_sso_enabled instead of inferring from on_premises_sync_enabled - Add proper ODataError handling with clear permission error messages - Report FAIL when permissions are insufficient (OnPremDirectorySynchronization.Read.All required) - Update documentation with new required permission - Add test for permission error scenario
99c7644 to
95bf5a1
Compare
andoniaf
commented
Feb 19, 2026
Co-authored-by: Andoni Alonso <14891798+andoniaf@users.noreply.github.com>
- Add emphasis to Description and Recommendation fields - Highlight key security concepts per metadata guidelines
HugoPBrito
approved these changes
Feb 19, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Context
Seamless Single Sign-On (SSO) in hybrid Microsoft Entra deployments can be exploited for lateral movement between on-premises domains and Entra ID when an Entra Connect server is compromised. It also enables brute force attacks against Entra ID, as authentication through the AZUREADSSOACC account bypasses standard protections. Modern devices with Primary Refresh Token (PRT) support make Seamless SSO unnecessary for most organizations, so it should be disabled to reduce the attack surface.
Description
This check verifies the actual Seamless SSO configuration in directory synchronization settings via the Microsoft Graph API. The check reports:
Remediation involves disabling Seamless SSO through the Entra Connect configuration tool, removing the AZUREADSSOACC computer account from Active Directory, and verifying the change with
Get-AzureADSSOStatus.This check is the Prowler equivalent of Maester test MT.1084.
Warning
New Permission Required: This check requires the following Microsoft Graph API permission:
OnPremDirectorySynchronization.Read.All- Required for reading directory sync settings (hybrid deployments only)Users must add this permission to their App Registration in Microsoft Entra ID and grant admin consent for the check to work correctly. Without this permission, the check will report FAIL with a message indicating the missing permission.
Steps to review
prowler/providers/m365/services/entra/entra_seamless_sso_disabled/prowler/compliance/m365/to ensure the check is correctly mapped to relevant requirementspoetry run pytest tests/providers/m365/services/entra/entra_seamless_sso_disabled/ -vRelated Issues
https://prowlerpro.atlassian.net/browse/PROWLER-872
Checklist
Community Checklist
docs/user-guide/providers/microsoft365/authentication.mdxwith required permissions.SDK/CLI
OnPremDirectorySynchronization.Read.Allis required for hybrid deploymentsLicense
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.