Skip to main content

IntuneAssistant – Security & Compliance Overview

info

This document provides the technical and security background of IntuneAssistant to support internal review, onboarding, and approval by security and compliance teams.


Purpose​

This page explains:

  • How IntuneAssistant works and communicates with Microsoft Graph
  • Which permissions are required
  • How authentication and authorization are implemented
  • What data is stored and why
  • How tenants maintain full control over access and consent

Overview​

IntuneAssistant is a management and automation platform for Microsoft Intune and Microsoft 365 environments.
It simplifies administrative tasks, generates reports, and supports baseline comparison, documentation, and troubleshooting.

πŸ”— Related documentation


Architecture & Authentication Model​

Multi-Tier Design​

IntuneAssistant uses two multi-tenant Azure AD (Entra ID) applications:

ApplicationPurposePermissions
App 1 – FrontendHandles user login using OpenID Connect.None (sign-in only)
App 2 – Downstream APICommunicates with Microsoft Graph API via the On-Behalf-Of (OBO) flow.Delegated permissions listed below

Security Highlights​

  • No system accounts or application-only permissions.
  • All actions are performed on behalf of the authenticated user.
  • Tokens are short-lived and delegated.
  • Customer admins can revoke access at any time via Entra ID.

Microsoft Graph Permissions​

Default Read Permissions​

These are required for read-only modules (documentation, reporting, baseline comparison):

PermissionDescription
DeviceManagementConfiguration.Read.AllRead Intune configuration profiles and baselines
DeviceManagementApps.Read.AllRead managed applications
DeviceManagementServiceConfig.Read.AllRead device management service configuration
DeviceManagementScripts.Read.AllRead management scripts
Group.Read.AllRead group memberships
Directory.AccessAsUser.AllAccess directory data on behalf of the user
Policy.Read.ConditionalAccessRead Conditional Access policies

Partner Center (MSP) Scenarios​

For GDAP / Partner Center integration, one additional scope is required:

PermissionDescription
DelegatedAdminRelationship.Read.AllRead Partner Center relationships to onboard customer tenants

This permission is used only to identify and link Partner Center tenants during onboarding.


Paid modules that modify Intune resources require delegated write scopes.
These permissions are requested only when activated by the customer.

PermissionDescription
DeviceManagementConfiguration.ReadWrite.AllModify configuration profiles
DeviceManagementApps.ReadWrite.AllCreate or update applications
DeviceManagementServiceConfig.ReadWrite.AllModify service configuration
DeviceManagementScripts.ReadWrite.AllUpload or edit scripts
Group.ReadWrite.AllManage group memberships

All actions remain fully delegated β€” performed under the signed-in user’s context.


Data Storage & Privacy​

Data TypeStoredPurposeRetention
Tenant IDβœ…Identify tenant and enforce fair-usage licensingPersistent
Tenant Domainβœ…Display and licensing identificationPersistent
Session Data (tokens, settings)❌Stored only in the browser sessionTemporary
Intune / Graph Data❌Processed in memory only, never persistedN/A
Minimal Data Policy

IntuneAssistant stores only the tenant ID and domain.
No user data, device data, or configuration data is stored permanently.


Access Control & Governance​

Tenant Control​

Tenant administrators can:

  • Restrict access via Enterprise Applications β†’ Users & Groups
  • Control consent using Admin Consent workflows
  • Use Privileged Identity Management (PIM) to grant time-bound access

Role Enforcement​

All actions are performed under the user’s assigned Intune / Entra roles.

  • Read-only roles β†’ view data only
  • Administrator roles β†’ perform allowed write actions

No elevation or privilege escalation occurs within IntuneAssistant itself.


Security Posture Summary​

AspectDetails
AuthenticationMicrosoft Entra ID (OpenID Connect + OAuth 2.0 OBO)
AuthorizationDelegated Microsoft Graph permissions
Data ResidencyMinimal (tenant ID and domain only)
Token HandlingShort-lived, delegated, never stored
Least PrivilegeDefault to read-only
IsolationTenant-scoped sessions
Multi-Tenant SafetyMicrosoft-compliant multi-tenant model
GDAP SupportPartner Center delegated rights only
AuditabilityAll actions appear under the signed-in user in audit logs

Compliance Highlights​

  • βœ… OAuth 2.0 / OpenID Connect compliant
  • βœ… Uses only Microsoft Graph API
  • βœ… No application-only access
  • βœ… No data exfiltration
  • βœ… Customer-controlled access & consent
  • βœ… Revocable at any time in Entra ID

Summary​

IntuneAssistant follows Microsoft’s Zero-Trust and Least-Privilege principles:

  • All authentication and authorization use Microsoft Entra ID.
  • All data access is delegated and tenant-scoped.
  • Only minimal metadata is stored.
  • Customers retain complete control over access, consent, and revocation.

IntuneAssistant provides enterprise-grade security while maintaining simplicity and transparency.


Continue Reading​