Files
claude-skills-reference/engineering-team/ms365-tenant-manager/scripts/user_management.py
Alireza Rezvani b47f163b57 fix(skill): restructure ms365-tenant-manager for better PDA (#69) (#131)
- Add trigger phrases to frontmatter (M365 tenant, Office 365 admin, etc.)
- Add TOC to SKILL.md with proper section navigation
- Delete duplicate HOW_TO_USE.md (70% content overlap)
- Create references/ directory with deep-dive content:
  - powershell-templates.md: Ready-to-use script templates
  - security-policies.md: Conditional Access, MFA, DLP guide
  - troubleshooting.md: Common issues and solutions
- Move Python tools to scripts/ directory (standard pattern)
- Consolidate best practices into actionable workflows
- Fix second-person voice throughout

Addresses Progressive Disclosure Architecture feedback.

Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-30 09:59:10 +01:00

448 lines
16 KiB
Python

"""
User lifecycle management module for Microsoft 365.
Handles user creation, modification, license assignment, and deprovisioning.
"""
from typing import Dict, List, Any, Optional
from datetime import datetime
class UserLifecycleManager:
"""Manage Microsoft 365 user lifecycle operations."""
def __init__(self, domain: str):
"""
Initialize with tenant domain.
Args:
domain: Primary domain name for the tenant
"""
self.domain = domain
self.operations_log = []
def generate_user_creation_script(self, users: List[Dict[str, Any]]) -> str:
"""
Generate PowerShell script for bulk user creation.
Args:
users: List of user dictionaries with details
Returns:
PowerShell script for user provisioning
"""
script = """<#
.SYNOPSIS
Bulk User Provisioning Script for Microsoft 365
.DESCRIPTION
Creates multiple users, assigns licenses, and configures mailboxes.
.NOTES
Prerequisites:
- Install-Module Microsoft.Graph -Scope CurrentUser
- Install-Module ExchangeOnlineManagement
#>
# Connect to Microsoft Graph
Connect-MgGraph -Scopes "User.ReadWrite.All", "Directory.ReadWrite.All", "Group.ReadWrite.All"
# Connect to Exchange Online
Connect-ExchangeOnline
# Define users to create
$users = @(
"""
for user in users:
upn = f"{user.get('username', '')}@{self.domain}"
display_name = user.get('display_name', '')
first_name = user.get('first_name', '')
last_name = user.get('last_name', '')
job_title = user.get('job_title', '')
department = user.get('department', '')
license_sku = user.get('license_sku', 'Microsoft_365_Business_Standard')
script += f""" @{{
UserPrincipalName = "{upn}"
DisplayName = "{display_name}"
GivenName = "{first_name}"
Surname = "{last_name}"
JobTitle = "{job_title}"
Department = "{department}"
LicenseSku = "{license_sku}"
UsageLocation = "US"
PasswordProfile = @{{
Password = "ChangeMe@$(Get-Random -Minimum 1000 -Maximum 9999)"
ForceChangePasswordNextSignIn = $true
}}
}}
"""
script += """
)
# Create users
foreach ($user in $users) {
try {
Write-Host "Creating user: $($user.DisplayName)..." -ForegroundColor Cyan
# Create user account
$newUser = New-MgUser -UserPrincipalName $user.UserPrincipalName `
-DisplayName $user.DisplayName `
-GivenName $user.GivenName `
-Surname $user.Surname `
-JobTitle $user.JobTitle `
-Department $user.Department `
-PasswordProfile $user.PasswordProfile `
-UsageLocation $user.UsageLocation `
-AccountEnabled $true `
-MailNickname ($user.UserPrincipalName -split '@')[0]
Write-Host " ✓ User created successfully" -ForegroundColor Green
# Wait for user provisioning
Start-Sleep -Seconds 5
# Assign license
$licenseParams = @{
AddLicenses = @(
@{
SkuId = (Get-MgSubscribedSku -All | Where-Object {$_.SkuPartNumber -eq $user.LicenseSku}).SkuId
}
)
}
Set-MgUserLicense -UserId $newUser.Id -BodyParameter $licenseParams
Write-Host " ✓ License assigned: $($user.LicenseSku)" -ForegroundColor Green
# Log success
$user | Add-Member -NotePropertyName "Status" -NotePropertyValue "Success" -Force
$user | Add-Member -NotePropertyName "CreatedDate" -NotePropertyValue (Get-Date) -Force
} catch {
Write-Host " ✗ Error creating user: $_" -ForegroundColor Red
$user | Add-Member -NotePropertyName "Status" -NotePropertyValue "Failed" -Force
$user | Add-Member -NotePropertyName "Error" -NotePropertyValue $_.Exception.Message -Force
}
}
# Export results
$users | Export-Csv -Path "UserCreation_Results_$(Get-Date -Format 'yyyyMMdd_HHmmss').csv" -NoTypeInformation
# Disconnect
Disconnect-MgGraph
Disconnect-ExchangeOnline -Confirm:$false
Write-Host "`nUser provisioning complete!" -ForegroundColor Green
"""
return script
def generate_user_offboarding_script(self, user_email: str) -> str:
"""
Generate script for secure user offboarding.
Args:
user_email: Email address of user to offboard
Returns:
PowerShell script for offboarding
"""
script = f"""<#
.SYNOPSIS
User Offboarding Script - Secure Deprovisioning
.DESCRIPTION
Securely offboards user: {user_email}
- Revokes access and signs out all sessions
- Converts mailbox to shared (preserves emails)
- Removes licenses
- Archives OneDrive
- Documents all actions
#>
# Connect to services
Connect-MgGraph -Scopes "User.ReadWrite.All", "Directory.ReadWrite.All"
Connect-ExchangeOnline
$userEmail = "{user_email}"
$timestamp = Get-Date -Format "yyyyMMdd_HHmmss"
Write-Host "Starting offboarding for: $userEmail" -ForegroundColor Cyan
try {{
# Step 1: Get user details
$user = Get-MgUser -UserId $userEmail
Write-Host "✓ User found: $($user.DisplayName)" -ForegroundColor Green
# Step 2: Disable sign-in (immediately revokes access)
Update-MgUser -UserId $user.Id -AccountEnabled $false
Write-Host "✓ Account disabled - user cannot sign in" -ForegroundColor Green
# Step 3: Revoke all active sessions
Revoke-MgUserSignInSession -UserId $user.Id
Write-Host "✓ All active sessions revoked" -ForegroundColor Green
# Step 4: Remove from all groups (except retained groups)
$groups = Get-MgUserMemberOf -UserId $user.Id
foreach ($group in $groups) {{
if ($group.AdditionalProperties["@odata.type"] -eq "#microsoft.graph.group") {{
Remove-MgGroupMemberByRef -GroupId $group.Id -DirectoryObjectId $user.Id
Write-Host " - Removed from group: $($group.AdditionalProperties.displayName)"
}}
}}
Write-Host "✓ Removed from all groups" -ForegroundColor Green
# Step 5: Remove mobile devices
$devices = Get-MgUserRegisteredDevice -UserId $user.Id
foreach ($device in $devices) {{
Remove-MgUserRegisteredDeviceByRef -UserId $user.Id -DirectoryObjectId $device.Id
Write-Host " - Removed device: $($device.AdditionalProperties.displayName)"
}}
Write-Host "✓ All mobile devices removed" -ForegroundColor Green
# Step 6: Convert mailbox to shared (preserves emails, removes license requirement)
Set-Mailbox -Identity $userEmail -Type Shared
Write-Host "✓ Mailbox converted to shared mailbox" -ForegroundColor Green
# Step 7: Set up email forwarding (optional - update recipient as needed)
# Set-Mailbox -Identity $userEmail -ForwardingAddress "manager@{self.domain}"
# Write-Host "✓ Email forwarding configured" -ForegroundColor Green
# Step 8: Set auto-reply
$autoReplyMessage = @"
Thank you for your email. This mailbox is no longer actively monitored as the employee has left the organization.
For assistance, please contact: support@{self.domain}
"@
Set-MailboxAutoReplyConfiguration -Identity $userEmail `
-AutoReplyState Enabled `
-InternalMessage $autoReplyMessage `
-ExternalMessage $autoReplyMessage
Write-Host "✓ Auto-reply configured" -ForegroundColor Green
# Step 9: Remove licenses (wait a bit after mailbox conversion)
Start-Sleep -Seconds 30
$licenses = Get-MgUserLicenseDetail -UserId $user.Id
if ($licenses) {{
$licenseParams = @{{
RemoveLicenses = @($licenses.SkuId)
}}
Set-MgUserLicense -UserId $user.Id -BodyParameter $licenseParams
Write-Host "✓ Licenses removed" -ForegroundColor Green
}}
# Step 10: Hide from GAL (Global Address List)
Set-Mailbox -Identity $userEmail -HiddenFromAddressListsEnabled $true
Write-Host "✓ Hidden from Global Address List" -ForegroundColor Green
# Step 11: Document offboarding
$offboardingReport = @{{
UserEmail = $userEmail
DisplayName = $user.DisplayName
OffboardingDate = Get-Date
MailboxStatus = "Converted to Shared"
LicensesRemoved = $licenses.SkuPartNumber -join ", "
AccountDisabled = $true
SessionsRevoked = $true
}}
$offboardingReport | Export-Csv -Path "Offboarding_${{userEmail}}_$timestamp.csv" -NoTypeInformation
Write-Host "`n✓ Offboarding completed successfully!" -ForegroundColor Green
Write-Host "`nNext steps:" -ForegroundColor Cyan
Write-Host "1. Archive user's OneDrive data (available for 30 days by default)"
Write-Host "2. Review shared mailbox permissions"
Write-Host "3. After 30 days, consider permanently deleting the account if no longer needed"
Write-Host "4. Review and transfer any owned resources (Teams, SharePoint sites, etc.)"
}} catch {{
Write-Host "✗ Error during offboarding: $_" -ForegroundColor Red
}}
# Disconnect
Disconnect-MgGraph
Disconnect-ExchangeOnline -Confirm:$false
"""
return script
def generate_license_assignment_recommendations(self, user_role: str, department: str) -> Dict[str, Any]:
"""
Recommend appropriate license based on user role and department.
Args:
user_role: Job title or role
department: Department name
Returns:
License recommendations with justification
"""
# License decision matrix
if any(keyword in user_role.lower() for keyword in ['ceo', 'cto', 'cfo', 'executive', 'director', 'vp']):
return {
'recommended_license': 'Microsoft 365 E5',
'justification': 'Executive level - requires advanced security, compliance, and full feature set',
'features_needed': [
'Advanced Threat Protection',
'Azure AD P2 with PIM',
'Advanced compliance and eDiscovery',
'Phone System and Audio Conferencing'
],
'monthly_cost': 57.00
}
elif any(keyword in user_role.lower() for keyword in ['admin', 'it', 'security', 'compliance']):
return {
'recommended_license': 'Microsoft 365 E5',
'justification': 'IT/Security role - requires full admin and security capabilities',
'features_needed': [
'Advanced security and compliance tools',
'Azure AD P2',
'Privileged Identity Management',
'Advanced analytics'
],
'monthly_cost': 57.00
}
elif department.lower() in ['legal', 'finance', 'hr', 'accounting']:
return {
'recommended_license': 'Microsoft 365 E3',
'justification': 'Handles sensitive data - requires enhanced security and compliance',
'features_needed': [
'Data Loss Prevention',
'Information Protection',
'Azure AD P1',
'Advanced compliance tools'
],
'monthly_cost': 36.00
}
elif any(keyword in user_role.lower() for keyword in ['manager', 'lead', 'supervisor']):
return {
'recommended_license': 'Microsoft 365 Business Premium',
'justification': 'Management role - needs full productivity suite with security',
'features_needed': [
'Desktop Office apps',
'Advanced security',
'Device management',
'Teams advanced features'
],
'monthly_cost': 22.00
}
elif any(keyword in user_role.lower() for keyword in ['part-time', 'contractor', 'temporary', 'intern']):
return {
'recommended_license': 'Microsoft 365 Business Basic',
'justification': 'Temporary/part-time role - web apps and basic features sufficient',
'features_needed': [
'Web versions of Office apps',
'Teams',
'OneDrive (1TB)',
'Exchange (50GB)'
],
'monthly_cost': 6.00
}
else:
return {
'recommended_license': 'Microsoft 365 Business Standard',
'justification': 'Standard office worker - full productivity suite',
'features_needed': [
'Desktop Office apps',
'Teams',
'OneDrive (1TB)',
'Exchange (50GB)',
'SharePoint'
],
'monthly_cost': 12.50
}
def generate_group_membership_recommendations(self, user: Dict[str, Any]) -> List[str]:
"""
Recommend security and distribution groups based on user attributes.
Args:
user: User dictionary with role, department, location
Returns:
List of recommended group names
"""
recommended_groups = []
# Department-based groups
department = user.get('department', '').lower()
if department:
recommended_groups.append(f"DL-{department.capitalize()}") # Distribution list
recommended_groups.append(f"SG-{department.capitalize()}") # Security group
# Location-based groups
location = user.get('location', '').lower()
if location:
recommended_groups.append(f"SG-Location-{location.capitalize()}")
# Role-based groups
job_title = user.get('job_title', '').lower()
if any(keyword in job_title for keyword in ['manager', 'director', 'vp', 'executive']):
recommended_groups.append("SG-Management")
if any(keyword in job_title for keyword in ['admin', 'administrator']):
recommended_groups.append("SG-ITAdmins")
# Functional groups
if user.get('needs_sharepoint_access'):
recommended_groups.append(f"SG-SharePoint-{department.capitalize()}")
if user.get('needs_project_access'):
recommended_groups.append("SG-ProjectUsers")
return recommended_groups
def validate_user_data(self, user_data: Dict[str, Any]) -> Dict[str, Any]:
"""
Validate user data before provisioning.
Args:
user_data: User information dictionary
Returns:
Validation results with errors and warnings
"""
errors = []
warnings = []
# Required fields
required_fields = ['first_name', 'last_name', 'username']
for field in required_fields:
if not user_data.get(field):
errors.append(f"Missing required field: {field}")
# Username validation
username = user_data.get('username', '')
if username:
if ' ' in username:
errors.append("Username cannot contain spaces")
if not username.islower():
warnings.append("Username should be lowercase")
if len(username) < 3:
errors.append("Username must be at least 3 characters")
# Email validation
email = user_data.get('email')
if email and '@' not in email:
errors.append("Invalid email format")
# Display name
if not user_data.get('display_name'):
first = user_data.get('first_name', '')
last = user_data.get('last_name', '')
warnings.append(f"Display name not provided, will use: {first} {last}")
# License validation
if not user_data.get('license_sku'):
warnings.append("No license specified, will need manual assignment")
return {
'is_valid': len(errors) == 0,
'errors': errors,
'warnings': warnings
}