docs(07-02): complete UserAccessAuditService plan
- Add 07-02-SUMMARY.md with implementation details - Update STATE.md: progress 62%, decisions, session - Update ROADMAP.md: phase 7 now 3/8 plans complete
This commit is contained in:
@@ -53,7 +53,7 @@ Plans:
|
|||||||
2. Running the audit returns a list of all access entries the user holds across the selected sites
|
2. Running the audit returns a list of all access entries the user holds across the selected sites
|
||||||
3. Results distinguish between direct role assignments, SharePoint group memberships, and inherited access
|
3. Results distinguish between direct role assignments, SharePoint group memberships, and inherited access
|
||||||
4. Results can be exported to CSV or HTML in the same format established by v1.0 export patterns
|
4. Results can be exported to CSV or HTML in the same format established by v1.0 export patterns
|
||||||
**Plans:** 1/8 plans executed
|
**Plans:** 3/8 plans executed
|
||||||
Plans:
|
Plans:
|
||||||
- [ ] 07-01-PLAN.md — UserAccessEntry model + service interfaces (Wave 1)
|
- [ ] 07-01-PLAN.md — UserAccessEntry model + service interfaces (Wave 1)
|
||||||
- [ ] 07-02-PLAN.md — UserAccessAuditService implementation (Wave 2)
|
- [ ] 07-02-PLAN.md — UserAccessAuditService implementation (Wave 2)
|
||||||
@@ -96,6 +96,6 @@ Plans:
|
|||||||
| 4. Bulk Operations and Provisioning | v1.0 | 10/10 | Complete | 2026-04-03 |
|
| 4. Bulk Operations and Provisioning | v1.0 | 10/10 | Complete | 2026-04-03 |
|
||||||
| 5. Distribution and Hardening | v1.0 | 3/3 | Complete | 2026-04-03 |
|
| 5. Distribution and Hardening | v1.0 | 3/3 | Complete | 2026-04-03 |
|
||||||
| 6. Global Site Selection | 5/5 | Complete | 2026-04-07 | - |
|
| 6. Global Site Selection | 5/5 | Complete | 2026-04-07 | - |
|
||||||
| 7. User Access Audit | 1/8 | In Progress| | - |
|
| 7. User Access Audit | 3/8 | In Progress| | - |
|
||||||
| 8. Simplified Permissions | v1.1 | 0/? | Not started | - |
|
| 8. Simplified Permissions | v1.1 | 0/? | Not started | - |
|
||||||
| 9. Storage Visualization | v1.1 | 0/? | Not started | - |
|
| 9. Storage Visualization | v1.1 | 0/? | Not started | - |
|
||||||
|
|||||||
@@ -3,14 +3,14 @@ gsd_state_version: 1.0
|
|||||||
milestone: v1.0
|
milestone: v1.0
|
||||||
milestone_name: milestone
|
milestone_name: milestone
|
||||||
status: completed
|
status: completed
|
||||||
stopped_at: Completed 07-03-PLAN.md
|
stopped_at: Completed 07-02-PLAN.md
|
||||||
last_updated: "2026-04-07T10:40:07.964Z"
|
last_updated: "2026-04-07T10:40:45.186Z"
|
||||||
last_activity: 2026-04-07 — Roadmap created (Phases 6-9), 10/10 requirements mapped
|
last_activity: 2026-04-07 — Roadmap created (Phases 6-9), 10/10 requirements mapped
|
||||||
progress:
|
progress:
|
||||||
total_phases: 4
|
total_phases: 4
|
||||||
completed_phases: 1
|
completed_phases: 1
|
||||||
total_plans: 13
|
total_plans: 13
|
||||||
completed_plans: 7
|
completed_plans: 8
|
||||||
---
|
---
|
||||||
|
|
||||||
# Project State
|
# Project State
|
||||||
@@ -49,6 +49,7 @@ Phase 6 [ ] → Phase 7 [ ] → Phase 8 [ ] → Phase 9 [ ]
|
|||||||
| Phase 06-global-site-selection P05 | 2 | 1 tasks | 1 files |
|
| Phase 06-global-site-selection P05 | 2 | 1 tasks | 1 files |
|
||||||
| Phase 07-user-access-audit P01 | 5 | 2 tasks | 3 files |
|
| Phase 07-user-access-audit P01 | 5 | 2 tasks | 3 files |
|
||||||
| Phase 07-user-access-audit P03 | 2 | 1 tasks | 1 files |
|
| Phase 07-user-access-audit P03 | 2 | 1 tasks | 1 files |
|
||||||
|
| Phase 07-user-access-audit P02 | 1 | 1 tasks | 1 files |
|
||||||
|
|
||||||
## Accumulated Context
|
## Accumulated Context
|
||||||
|
|
||||||
@@ -76,6 +77,8 @@ Decisions are logged in PROJECT.md Key Decisions table.
|
|||||||
- [Phase 07-03]: Minimum 2-character query guard prevents overly broad Graph API requests
|
- [Phase 07-03]: Minimum 2-character query guard prevents overly broad Graph API requests
|
||||||
- [Phase 07-03]: OData single-quote escaping (replace apostrophe with two apostrophes) prevents injection in startsWith filter
|
- [Phase 07-03]: OData single-quote escaping (replace apostrophe with two apostrophes) prevents injection in startsWith filter
|
||||||
- [Phase 07-03]: ConsistencyLevel=eventual and Count=true both required for startsWith on Graph directory objects
|
- [Phase 07-03]: ConsistencyLevel=eventual and Count=true both required for startsWith on Graph directory objects
|
||||||
|
- [Phase 07-user-access-audit]: TenantProfile.ClientId empty in service — session pre-authenticated at ViewModel level; SessionManager returns cached context by URL key
|
||||||
|
- [Phase 07-user-access-audit]: Bidirectional contains matching for user login — handles both plain email and full SharePoint claim formats
|
||||||
|
|
||||||
### Pending Todos
|
### Pending Todos
|
||||||
|
|
||||||
@@ -87,6 +90,6 @@ None.
|
|||||||
|
|
||||||
## Session Continuity
|
## Session Continuity
|
||||||
|
|
||||||
Last session: 2026-04-07T10:40:07.961Z
|
Last session: 2026-04-07T10:40:45.184Z
|
||||||
Stopped at: Completed 07-03-PLAN.md
|
Stopped at: Completed 07-02-PLAN.md
|
||||||
Resume file: None
|
Resume file: None
|
||||||
|
|||||||
79
.planning/phases/07-user-access-audit/07-02-SUMMARY.md
Normal file
79
.planning/phases/07-user-access-audit/07-02-SUMMARY.md
Normal file
@@ -0,0 +1,79 @@
|
|||||||
|
---
|
||||||
|
phase: 07-user-access-audit
|
||||||
|
plan: 02
|
||||||
|
subsystem: audit-engine
|
||||||
|
tags: [service, business-logic, user-access-audit, permissions, transform]
|
||||||
|
dependency_graph:
|
||||||
|
requires: [07-01]
|
||||||
|
provides: [UserAccessAuditService]
|
||||||
|
affects: [07-04, 07-05, 07-06, 07-07, 07-08]
|
||||||
|
tech_stack:
|
||||||
|
added: []
|
||||||
|
patterns: [iterator pattern (yield return), HashSet for O(1) lookup, case-insensitive contains matching]
|
||||||
|
key_files:
|
||||||
|
created:
|
||||||
|
- SharepointToolbox/Services/UserAccessAuditService.cs
|
||||||
|
modified: []
|
||||||
|
decisions:
|
||||||
|
- "TenantProfile.ClientId set to empty string in service — session must be pre-authenticated at ViewModel level; SessionManager returns cached context by URL key without requiring ClientId again"
|
||||||
|
- "User matching uses bidirectional contains (loginLower.Contains(target) || target.Contains(loginLower)) to handle both plain email and full SharePoint claim formats"
|
||||||
|
- "Each permission level emits a separate UserAccessEntry row (fully denormalized) — consistent with 07-01 design decision"
|
||||||
|
metrics:
|
||||||
|
duration_minutes: 5
|
||||||
|
completed_date: "2026-04-07"
|
||||||
|
tasks_completed: 1
|
||||||
|
files_created: 1
|
||||||
|
files_modified: 0
|
||||||
|
---
|
||||||
|
|
||||||
|
# Phase 7 Plan 02: UserAccessAuditService Implementation Summary
|
||||||
|
|
||||||
|
**One-liner:** UserAccessAuditService scans PermissionsService results across multiple sites, filters by target user logins via bidirectional contains matching, and emits fully-denormalized UserAccessEntry rows with access type classification, high-privilege detection, and external user flagging.
|
||||||
|
|
||||||
|
## What Was Built
|
||||||
|
|
||||||
|
**UserAccessAuditService.cs** — Core business logic service implementing `IUserAccessAuditService`:
|
||||||
|
|
||||||
|
1. **Multi-site loop** — Iterates sites list, builds a `TenantProfile` per site (TenantUrl = site URL), obtains a `ClientContext` via the injected `ISessionManager`, then delegates to `IPermissionsService.ScanSiteAsync` for raw permission data. Progress is reported per site.
|
||||||
|
|
||||||
|
2. **TransformEntries** — Static iterator method that splits semicolon-delimited `UserLogins`, `Users`, and `PermissionLevels` fields from each `PermissionEntry`. For each user/level combination that matches a target login, yields a `UserAccessEntry` record. Uses `yield return` for lazy evaluation.
|
||||||
|
|
||||||
|
3. **User matching** — Case-insensitive bidirectional contains: `loginLower.Contains(target) || target.Contains(loginLower)`. Handles both plain email addresses and full SharePoint claim format (`i:0#.f|membership|alice@contoso.com`).
|
||||||
|
|
||||||
|
4. **ClassifyAccessType** — Maps `HasUniquePermissions` + `GrantedThrough` to `AccessType` enum: `!HasUniquePermissions` → Inherited; `GrantedThrough` starts with "SharePoint Group:" → Group; else Direct.
|
||||||
|
|
||||||
|
5. **HighPrivilegeLevels** — Static `HashSet<string>` (case-insensitive) containing "Full Control" and "Site Collection Administrator". O(1) lookup per entry.
|
||||||
|
|
||||||
|
## Tasks
|
||||||
|
|
||||||
|
| # | Task | Status | Commit |
|
||||||
|
|---|------|--------|--------|
|
||||||
|
| 1 | Implement UserAccessAuditService | Done | 44b238e |
|
||||||
|
|
||||||
|
## Decisions Made
|
||||||
|
|
||||||
|
1. **ClientId empty in service** — `TenantProfile.ClientId` is set to `string.Empty` when constructing per-site profiles. `SessionManager` validates ClientId only when creating a new context. Since the user authenticates at the ViewModel layer before invoking the service, the session is already cached and returned by URL key without re-checking ClientId.
|
||||||
|
|
||||||
|
2. **Bidirectional contains matching** — The target login could be a short email ("alice@contoso.com") while the PermissionEntry stores the full claim ("i:0#.f|membership|alice@contoso.com"), or vice versa. Bidirectional contains handles both cases without requiring callers to normalize their input format.
|
||||||
|
|
||||||
|
3. **Fully denormalized output** — Consistent with the 07-01 decision: one row per user + object + permission level. A single PermissionEntry with 2 users and 3 permission levels emits up to 6 UserAccessEntry rows.
|
||||||
|
|
||||||
|
## Deviations from Plan
|
||||||
|
|
||||||
|
None — plan executed exactly as written.
|
||||||
|
|
||||||
|
## Verification
|
||||||
|
|
||||||
|
- `dotnet build SharepointToolbox/SharepointToolbox.csproj` — 0 errors, 0 warnings
|
||||||
|
- UserAccessAuditService implements IUserAccessAuditService interface
|
||||||
|
- TransformEntries splits semicolon-delimited logins/names/levels correctly
|
||||||
|
- ClassifyAccessType maps HasUniquePermissions + GrantedThrough to AccessType enum
|
||||||
|
- HighPrivilegeLevels HashSet contains "Full Control" and "Site Collection Administrator"
|
||||||
|
|
||||||
|
## Self-Check: PASSED
|
||||||
|
|
||||||
|
Files confirmed present:
|
||||||
|
- FOUND: SharepointToolbox/Services/UserAccessAuditService.cs
|
||||||
|
|
||||||
|
Commits confirmed:
|
||||||
|
- FOUND: 44b238e
|
||||||
Reference in New Issue
Block a user