-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
test(entra): Unit tests for ensure using MFA for APIs
- Loading branch information
Showing
1 changed file
with
228 additions
and
0 deletions.
There are no files selected for viewing
228 changes: 228 additions & 0 deletions
228
...for_management_api/entra_conditional_access_policy_require_mfa_for_management_api_test.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,228 @@ | ||
from unittest import mock | ||
from uuid import uuid4 | ||
|
||
from tests.providers.azure.azure_fixtures import DOMAIN | ||
|
||
|
||
class Test_entra_conditional_access_policy_require_mfa_for_management_api: | ||
def test_entra_no_subscriptions(self): | ||
entra_client = mock.MagicMock | ||
|
||
with mock.patch( | ||
"prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api.entra_client", | ||
new=entra_client, | ||
): | ||
from prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api import ( | ||
entra_conditional_access_policy_require_mfa_for_management_api, | ||
) | ||
|
||
entra_client.conditional_access_policy = {} | ||
|
||
check = entra_conditional_access_policy_require_mfa_for_management_api() | ||
result = check.execute() | ||
assert len(result) == 0 | ||
|
||
def test_entra_tenant_no_policies(self): | ||
entra_client = mock.MagicMock | ||
|
||
with mock.patch( | ||
"prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api.entra_client", | ||
new=entra_client, | ||
): | ||
from prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api import ( | ||
entra_conditional_access_policy_require_mfa_for_management_api, | ||
) | ||
|
||
entra_client.conditional_access_policy = {DOMAIN: {}} | ||
|
||
check = entra_conditional_access_policy_require_mfa_for_management_api() | ||
result = check.execute() | ||
assert len(result) == 1 | ||
assert result[0].status == "FAIL" | ||
assert result[0].subscription == f"Tenant: {DOMAIN}" | ||
assert result[0].resource_name == "Conditional Access Policy" | ||
assert result[0].resource_id == "Conditional Access Policy" | ||
assert ( | ||
result[0].status_extended | ||
== "Conditional Access Policy does not require MFA for management API." | ||
) | ||
|
||
def test_entra_tenant_policy_no_mfa(self): | ||
entra_client = mock.MagicMock | ||
|
||
with mock.patch( | ||
"prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api.entra_client", | ||
new=entra_client, | ||
): | ||
from prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api import ( | ||
entra_conditional_access_policy_require_mfa_for_management_api, | ||
) | ||
from prowler.providers.azure.services.entra.entra_service import ( | ||
ConditionalAccessPolicy, | ||
) | ||
|
||
policy = ConditionalAccessPolicy( | ||
name="Test Policy", | ||
state="enabled", | ||
users={"include": ["All"]}, | ||
target_resources={"include": ["797f4846-ba00-4fd7-ba43-dac1f8f63013"]}, | ||
access_controls={"grant": ["grant"]}, | ||
) | ||
|
||
entra_client.conditional_access_policy = {DOMAIN: {str(uuid4()): policy}} | ||
|
||
check = entra_conditional_access_policy_require_mfa_for_management_api() | ||
result = check.execute() | ||
assert len(result) == 1 | ||
assert result[0].status == "FAIL" | ||
assert result[0].subscription == f"Tenant: {DOMAIN}" | ||
assert result[0].resource_name == "Conditional Access Policy" | ||
assert result[0].resource_id == "Conditional Access Policy" | ||
assert ( | ||
result[0].status_extended | ||
== "Conditional Access Policy does not require MFA for management API." | ||
) | ||
|
||
def test_entra_tenant_policy_mfa(self): | ||
entra_client = mock.MagicMock | ||
|
||
with mock.patch( | ||
"prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api.entra_client", | ||
new=entra_client, | ||
): | ||
from prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api import ( | ||
entra_conditional_access_policy_require_mfa_for_management_api, | ||
) | ||
from prowler.providers.azure.services.entra.entra_service import ( | ||
ConditionalAccessPolicy, | ||
) | ||
|
||
policy = ConditionalAccessPolicy( | ||
name="Test Policy", | ||
state="enabled", | ||
users={"include": ["All"]}, | ||
target_resources={"include": ["797f4846-ba00-4fd7-ba43-dac1f8f63013"]}, | ||
access_controls={"grant": ["grant", "MFA"]}, | ||
) | ||
|
||
entra_client.conditional_access_policy = {DOMAIN: {str(uuid4()): policy}} | ||
|
||
check = entra_conditional_access_policy_require_mfa_for_management_api() | ||
result = check.execute() | ||
assert len(result) == 1 | ||
assert result[0].status == "PASS" | ||
assert result[0].subscription == f"Tenant: {DOMAIN}" | ||
assert result[0].resource_name == "Test Policy" | ||
assert result[0].resource_id != "Conditional Access Policy" | ||
assert ( | ||
result[0].status_extended | ||
== "Conditional Access Policy requires MFA for management API." | ||
) | ||
|
||
def test_entra_tenant_policy_mfa_disabled(self): | ||
entra_client = mock.MagicMock | ||
|
||
with mock.patch( | ||
"prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api.entra_client", | ||
new=entra_client, | ||
): | ||
from prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api import ( | ||
entra_conditional_access_policy_require_mfa_for_management_api, | ||
) | ||
from prowler.providers.azure.services.entra.entra_service import ( | ||
ConditionalAccessPolicy, | ||
) | ||
|
||
policy = ConditionalAccessPolicy( | ||
name="Test Policy", | ||
state="disabled", | ||
users={"include": ["All"]}, | ||
target_resources={"include": ["797f4846-ba00-4fd7-ba43-dac1f8f63013"]}, | ||
access_controls={"grant": ["grant", "MFA"]}, | ||
) | ||
|
||
entra_client.conditional_access_policy = {DOMAIN: {str(uuid4()): policy}} | ||
|
||
check = entra_conditional_access_policy_require_mfa_for_management_api() | ||
result = check.execute() | ||
assert len(result) == 1 | ||
assert result[0].status == "FAIL" | ||
assert result[0].subscription == f"Tenant: {DOMAIN}" | ||
assert result[0].resource_name == "Conditional Access Policy" | ||
assert result[0].resource_id == "Conditional Access Policy" | ||
assert ( | ||
result[0].status_extended | ||
== "Conditional Access Policy does not require MFA for management API." | ||
) | ||
|
||
def test_entra_tenant_policy_mfa_no_target(self): | ||
entra_client = mock.MagicMock | ||
|
||
with mock.patch( | ||
"prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api.entra_client", | ||
new=entra_client, | ||
): | ||
from prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api import ( | ||
entra_conditional_access_policy_require_mfa_for_management_api, | ||
) | ||
from prowler.providers.azure.services.entra.entra_service import ( | ||
ConditionalAccessPolicy, | ||
) | ||
|
||
policy = ConditionalAccessPolicy( | ||
name="Test Policy", | ||
state="enabled", | ||
users={"include": ["All"]}, | ||
target_resources={"include": []}, | ||
access_controls={"grant": ["grant", "MFA"]}, | ||
) | ||
|
||
entra_client.conditional_access_policy = {DOMAIN: {str(uuid4()): policy}} | ||
|
||
check = entra_conditional_access_policy_require_mfa_for_management_api() | ||
result = check.execute() | ||
assert len(result) == 1 | ||
assert result[0].status == "FAIL" | ||
assert result[0].subscription == f"Tenant: {DOMAIN}" | ||
assert result[0].resource_name == "Conditional Access Policy" | ||
assert result[0].resource_id == "Conditional Access Policy" | ||
assert ( | ||
result[0].status_extended | ||
== "Conditional Access Policy does not require MFA for management API." | ||
) | ||
|
||
def test_entra_tenant_policy_mfa_no_users(self): | ||
entra_client = mock.MagicMock | ||
|
||
with mock.patch( | ||
"prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api.entra_client", | ||
new=entra_client, | ||
): | ||
from prowler.providers.azure.services.entra.entra_conditional_access_policy_require_mfa_for_management_api.entra_conditional_access_policy_require_mfa_for_management_api import ( | ||
entra_conditional_access_policy_require_mfa_for_management_api, | ||
) | ||
from prowler.providers.azure.services.entra.entra_service import ( | ||
ConditionalAccessPolicy, | ||
) | ||
|
||
policy = ConditionalAccessPolicy( | ||
name="Test Policy", | ||
state="enabled", | ||
users={"include": []}, | ||
target_resources={"include": ["797f4846-ba00-4fd7-ba43-dac1f8f63013"]}, | ||
access_controls={"grant": ["grant", "MFA"]}, | ||
) | ||
|
||
entra_client.conditional_access_policy = {DOMAIN: {str(uuid4()): policy}} | ||
|
||
check = entra_conditional_access_policy_require_mfa_for_management_api() | ||
result = check.execute() | ||
assert len(result) == 1 | ||
assert result[0].status == "FAIL" | ||
assert result[0].subscription == f"Tenant: {DOMAIN}" | ||
assert result[0].resource_name == "Conditional Access Policy" | ||
assert result[0].resource_id == "Conditional Access Policy" | ||
assert ( | ||
result[0].status_extended | ||
== "Conditional Access Policy does not require MFA for management API." | ||
) |