Featured image of post Automating with PowerShell: Connecting to Microsoft Teams with the Secure Application Model

Automating with PowerShell: Connecting to Microsoft Teams with the Secure Application Model

Since the creation of the Secure Application Model more and more modules are supporting it, which is great to see, although at times the documentation is slightly lacking. One of those applications is the MicrosoftTeams module. It’s great to be able to connect to specific teams from your own partner tenant to perform automated tasks or alert on changes that aren’t supposed to happen.

The teams module is a bit sluggish, especially compared to the native Graph solution, but does give us a little bit more information to play with. To be able to connect using the Secure Application Model we have to create two tokens; one normal partner token, the other for the clients tenant. You can use the script below to connect to your clients easily.

The Script

This script uses the PartnerCenter Module, and the MicrosoftTeams Module. You’ll need at least version 2.0, and make sure that no other versions are present. There’s also some difficulties at times when setting specific properties. You might receive an error denied, if you do then that property has to be set with a tenant account itself.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
######### Secrets #########
$ApplicationId = 'ApplicationID'
$ApplicationSecret = 'ApplicationSecret' | ConvertTo-SecureString -Force -AsPlainText
$TenantID = 'YourTenantID'
$RefreshToken = 'YourLongRefreshToken'
$UPN = "A-Valid-UPN-In-Your-Tenant"
######### Secrets #########
$credential = New-Object System.Management.Automation.PSCredential($ApplicationId, $ApplicationSecret)

$aadGraphToken = New-PartnerAccessToken -ApplicationId $ApplicationId -Credential $credential -RefreshToken $refreshToken -Scopes 'https://graph.windows.net/.default' -ServicePrincipal -Tenant $tenantID
$graphToken = New-PartnerAccessToken -ApplicationId $ApplicationId -Credential $credential -RefreshToken $refreshToken -Scopes 'https://graph.microsoft.com/.default' -ServicePrincipal -Tenant $tenantID

Connect-MsolService -AdGraphAccessToken $aadGraphToken.AccessToken -MsGraphAccessToken $graphToken.AccessToken

$customers = Get-MsolPartnerContract -All
foreach ($customer in $customers) {

    $body = @{
        'resource'      = 'https://graph.microsoft.com'
        'client_id'     = $ApplicationId
        'client_secret' = ((New-Object PSCredential "user", $ApplicationSecret).GetNetworkCredential().Password)
        'grant_type'    = "client_credentials"
        'scope'         = "openid"
    }
    $ClientToken = Invoke-RestMethod -Method post -Uri "https://login.microsoftonline.com/$($Customer.tenantID)/oauth2/token" -Body $body -ErrorAction Stop
    $null = connect-microsoftteams -MsAccessToken $ClientToken.access_token -AadAccessToken $aadGraphToken.AccessToken -AccountId $UPN
    get-team

}

And that’s it! this should help you connect to Microsoft Teams resources using the Secure Application Model, as always, Happy PowerShelling.

All blogs are posted under AGPL3.0 unless stated otherwise
comments powered by Disqus
Built with Hugo
Theme Stack designed by Jimmy