• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Clatent

Technology | Fitness | Food

  • About
  • Resources
  • Contact

Automation

v0.0.20 EntraFIDOFinder is out

October 20, 2025 by ClaytonT Leave a Comment

4 New keys have been added and a few changes in capabilities!

New Keys:

  • Hyper FIDO Pro NFC – 23195a52-62d9-40fa-8ee5-23b173f4fb52
  • Hyper FIDO Pro (CTAP2.1, CTAP2.0, U2F) – 6999180d-630c-442d-b8f7-424b90a43fae
  • DEMIA SOLVO Fly 80 R3 FIDO Card c – dda9aa35-aaf1-4d3c-b6db-7902fd7dbbbf
  • IDEMIA SOLVO Fly 80 R3 FIDO Card e – def8ab1a-9f91-44f1-a103-088d8dc7d681

Updated Keys:

  • Updated ‘NFC’ for AAGUID ‘3f59672f-20aa-4afe-b6f4-7e5e916b6d98’ from ‘✅’ to ‘❌’.
  • Updated ‘USB’ for AAGUID ‘b12eac35-586c-4809-a4b1-d81af6c305cf’ from ‘✅’ to ‘❌’.
  • Updated ‘NFC’ for AAGUID ‘b12eac35-586c-4809-a4b1-d81af6c305cf’ from ‘✅’ to ‘❌’.
  • Updated ‘NFC’ for AAGUID ‘9d3df6ba-282f-11ed-a261-0242ac120002’ from ‘✅’ to ‘❌’.
  • Updated ‘USB’ for AAGUID ’39a5647e-1853-446c-a1f6-a79bae9f5bc7′ from ‘❌’ to ‘✅’.
  • Updated ‘BLE’ for AAGUID ’39a5647e-1853-446c-a1f6-a79bae9f5bc7′ from ‘❌’ to ‘✅’.
  • Updated ‘USB’ for AAGUID ‘820d89ed-d65a-409e-85cb-f73f0578f82a’ from ‘❌’ to ‘✅’.
  • Updated ‘BLE’ for AAGUID ‘820d89ed-d65a-409e-85cb-f73f0578f82a’ from ‘❌’ to ‘✅’.

How have your FIDO2 implementations been going? Would love to hear your stories!

PowerShell Gallery: https://www.powershellgallery.com/packages/EntraFIDOFinder/0.0.20
GitHub: https://github.com/DevClate/EntraFIDOFinder

Tagged With: 365, Automation, EntraFIDOFinder, FIDO2, Module Monday, PowerShell, Security

EntraFIDOFinder Update

September 26, 2025 by ClaytonT Leave a Comment

There haven’t been much changes the past couple months, but finally a biggish update happened where Microsoft has added 10 more keys that are Attestation capable.

Added Attestation capable keys:

  • Chipwon Clife Key | 930b0c03-ef46-4ac4-935c-538dccd1fcdb
  • HID Crescendo 4000 FIDO | aa79f476-ea00-417e-9628-1e8365123922
  • ID-One Key | 82b0a720-127a-4788-b56d-d1d4b2d82eac
  • ID-One Key | f2145e86-211e-4931-b874-e22bba7d01cc
  • VeridiumID Passkey Android SDK | 8d4378b0-725d-4432-b3c2-01fcdaf46286
  • VeridiumID Passkey iOS SDK | 1e906e14-77af-46bc-ae9f-fe6ef18257e4
  • VinCSS FIDO2 Fingerprint | 9012593f-43e4-4461-a97a-d92777b55d74
  • YubiKey 5 Series with NFC – Enhanced PIN | 662ef48a-95e2-4aaa-a6c1-5b9c40375824
  • YubiKey 5 Series with NFC – Enhanced PIN (Enterprise Profile) | b2c1a50b-dad8-4dc7-ba4d-0ce9597904bc
  • YubiKey 5 Series with NFC KVZR57 | 9eb7eabc-9db5-49a1-b6c3-555a802093f4

Are you requiring attestation? How has your implementation of FIDO2 keys been?

Don’t forget about the web version at: https://devclate.github.io/EntraFIDOFinder/Explorer/

Need the module?
– PowerShell: Install-PSResource EntraFIDOFinder
– PowerShell Gallery: https://www.powershellgallery.com/packages/EntraFIDOFinder/0.0.19
– GitHub: https://github.com/DevClate/EntraFIDOFinder

Tagged With: 365, Automation, EntraFIDOFinder, FIDO2, PowerShell, Reporting, Security

How to Delete Recurring Planner Tasks with PowerShell

July 30, 2025 by ClaytonT Leave a Comment

Are you using PowerShell and Microsoft Planner? I feel it doesn’t get the love it deserves, and to be honest, I hadn’t used PowerShell with Planner in a while, but wanted to get back into it. I first starting using the Microsoft.Graph.Planner and found some limitations that were possible if you used the Graph API directly. One of the things that stood out was you couldn’t call a Plan or Bucket by its real name, only by its ID. Yes, I could have added some logic to make it so, but realized that it also couldn’t remove recurring tasks. I thought it was going to be a quick fix, but found out hours later that wasn’t the case.. hence this post!

Let’s get into the process now.

First, we are going to go to planner.microsoft.cloud and click on the task you want or click on the plan, then on the task you want.

Once you are there you will find the ID in the URL

Below you will see in bold the “TaskId.” The “PlanId” is right after ‘plan/’. They will always be in these locations.

<https://planner.cloud.microsoft/webui/plan/1L__9CleiAwPwqMXDEPEALPQKPa9/view/board/task/1Peq3A7__1EXqot27RoV53QYBZuS?tid=26my427d-m317-83y1-63r0-4suv1pe421y8>

Next we will create a $TaskId variable, where you will put the TaskId inside of it

$TaskId = "1Peq3A7__1EXqot27RoV53QYBZuS"

Before we go farther, lets connect to Microsoft Graph (beta) with these scopes

Connect-MgGraph -Scopes 'Tasks.ReadWrite','Group.ReadWrite.All'

Then you’ll want to get the Task information and save it to the $Task variable to use later. This is important as this will store the ETAG value that you will need to delete the task, as this value changes anytime something changes with that task.

$task = Invoke-MgGraphRequest -Uri "<https://graph.microsoft.com/beta/planner/tasks/$taskId>"

Now here is the fun part, there is no way as of right now to delete a recurring meeting in one call. The best way I found to do it is to first cancel the recurrence then delete it. After doing more research I found later on that it does say you have to ‘$null’ out “Schedule” from Microsoft Learn. I figured it out the hard way when I was using “Developer Tools” to see the API requests it was doing on each click.

Let’s cancel the recurrence, first we have to build out the body to null out schedule and we do that like below.

$body = @{
    recurrence = @{
        schedule = $null
    }
} | ConvertTo-Json -Depth 3

After the body, we create the the “Header” for the request. We do that by below. This is very important because if you don’t Graph won’t know the exact task you are trying to change.

$headers = @{ 
    "If-Match" = $task.'@odata.etag'
    "Content-Type" = "application/json"
}

Now that we have TaskID, Body, and Header we can update(PATCH) the recurring task to a non recurring task.

Invoke-MgGraphRequest -Method PATCH -Uri "<https://graph.microsoft.com/beta/planner/tasks/$taskId>" -Body $body -Headers $headers

Perfect, you have canceled the recurring task and can now delete it. This may seem repetitive, but as of right now it’s the only way to do it. You have to get the task information again because it will now have a new ETAG, and will fail if you try to use the previous one.

$task = Invoke-MgGraphRequest -Uri "<https://graph.microsoft.com/beta/planner/tasks/$taskId>"

And we will have to put the updated ETAG in the header

$headers = @{ 
    "If-Match" = $task.'@odata.etag'
    "Content-Type" = "application/json"
}

We could have done this part in the beginning, but didn’t want to throw too much at you in the beginning, but here we will create the URI as a variable to make the API request shorter and easier to read.

$Uri = "<https://graph.microsoft.com/beta/planner/tasks/$taskId”>

The moment is finally here, where we actually get to delete the task…

Invoke-MgGraphRequest -uri $Uri -Method Delete -Headers $Headers

That’s it! Now go back to planner and confirm that is has been deleted.

Congrats on deleting your first recurring task! Below, I’ve put the whole script so you can see it all together and you can update the TaskId then run it to to delete recurring tasks.

If you’re interested in learning more about Planner and PowerShell, stay tuned as I may have some ideas to make using them together even easier.

$taskId = "1Peq3A7__1EXqot27RoV53QYBZuS"

$task = Invoke-MgGraphRequest -Uri "<https://graph.microsoft.com/beta/planner/tasks/$taskId>"

# Cancel the recurrence by setting schedule to null
$body = @{
    recurrence = @{
        schedule = $null
    }
} | ConvertTo-Json -Depth 3

$headers = @{ 
    "If-Match" = $task.'@odata.etag'
    "Content-Type" = "application/json"
}

Invoke-MgGraphRequest -Method PATCH -Uri "<https://graph.microsoft.com/beta/planner/tasks/$taskId>" -Body $body -Headers $headers

$task = Invoke-MgGraphRequest -Uri "<https://graph.microsoft.com/beta/planner/tasks/$taskId>"

$headers = @{ 
    "If-Match" = $task.'@odata.etag'
    "Content-Type" = "application/json"
}

$Uri = "<https://graph.microsoft.com/beta/planner/tasks/$taskId”>

Invoke-MgGraphRequest -uri $uri -Method Delete -Headers $headers

Let me know if you have any questions or feedback, have a great day!

Tagged With: 365, Automation, Planner, PowerShell, ProjectManagement, Reporting, Tasks

EntraFIDOFinder Update

June 23, 2025 by ClaytonT Leave a Comment

June( v0.0.18) update is here and we skipped May as I could tell they were still making some changes so I didn’t push them to the PowerShell gallery. This month they removed 50+ keys as they were unapproved models, but there are still over 150 keys that are Entra Attestation capable!

How is your FIDO2 journey going? What are you wishing this module could do?

Appreciate all feedback and have a great day!

PowerShell Gallery: https://www.powershellgallery.com/packages/EntraFIDOFinder/0.0.18
GitHub: https://github.com/DevClate/EntraFIDOFinder
Web Version: https://devclate.github.io/EntraFIDOFinder/Explorer/

Tagged With: 365, Automation, EntraFIDOFinder, PowerShell, Security

New version of EntraFIDOFinder is out now

May 5, 2025 by ClaytonT Leave a Comment

Now with over 15 new keys! It was a little slow last month, but this month they made up with adding 6 new Vendors too. For the module, most of the enhancements were on the backend, where I created a function to reorganize any keys that weren’t following the standard configuration. This happens when a new key is added, I haven’t figured a way yet to automatically pull the FIDO Alliance data so that it shows correctly. Also I added a Pester test to make sure the key JSON file is in the correct format and using the correct values.

Microsoft changed on the backend how they showed their “Yes” or “No” on the back end, so I had to adjust my code to look for check mark or an x, as well as changed the JSON validation for that as well. If you use JSON, and haven’t used schemas, I highly recommend you doing it as it will make catching or avoiding issues much easier and quicker.

Here are the database changes:

New Vendors:

  • Deepnet
  • GoldKey
  • SafeKey
  • SHALO
  • T-Shiled
  • VeridiumID

New Keys:

AAGUIDVendorDescription
c89e6a38-6c00-5426-5aa5-c9cbf48f0382ACSFIDO Authenticator NF
b9f6b7b6-f929-4189-bca9-dd951240c132DeepnetSafeKey/Classic (USB)
b12eac35-586c-4809-a4b1-d81af6c305cfDeepnetSafeKey/Classic (NFC)
e41b42a3-60ac-4afb-8757-a98f2d7f6c9fDeepnetSafeKey/Classic (FP)
78ba3993-d784-4f44-8d6e-cc0a8ad5230eFeitianePass FIDO-NFC(CTAP2.1, CTAP2.0, U2F)
39589099-9a75-49fc-afaa-801ca211c62aFeitianePass FIDO-NFC (Enterprise Profile) (CTAP2.1, CTAP2.0, U2F)
0db01cd6-5618-455b-bb46-1ec203d3213eGoldKeySecurity Token
c4ddaf11-3032-4e77-b3b9-3a340369b9adHIDCrescendo Fusion
57235694-51a5-4a4d-a81a-f42185df6502SHALOSHALO AUTH
7787a482-13e8-4784-8a06-c7ed49a7aaf4SwissbitiShield Key 2
e400ef8c-711d-4692-af46-7f2cf7da23adSwissbitiShield Key 2 Enterprise
5eaff75a-dd43-451f-af9f-87c9eeae293eSwissbitiShield Key 2 FIPS Enterprise
817cdab8-0d51-4de1-a821-e25b88519cf3SwissbitiShield Key 2 FIPS
882adaf5-3aa9-4708-8e7d-3957103775b4T-ShieldTrustSec FIDO2 Bio and client PIN version
8d4378b0-725d-4432-b3c2-01fcdaf46286VeridiumIDPasskey Android SDK
1e906e14-77af-46bc-ae9f-fe6ef18257e4VeridiumIDPasskey iOS SDK

Hope you enjoyed this update and have a great day! Don’t forget to star the repo and if you have an enhancement or issue, please create a GitHub Issue or discussion.

Are there any features you wish EntraFIDOFinder had? Would you like a function to just download or view the key database without updating the module?

GitHub: https://github.com/DevClate/EntraFIDOFinder
PowerShell Gallery: https://www.powershellgallery.com/packages/EntraFIDOFinder/0.0.17
Web Version: https://devclate.github.io/EntraFIDOFinder/Explorer/

Tagged With: 365, Automation, EntraFIDOFinder, FIDO2, PowerShell

EntraFIDOFinder now with over 50 new keys!

March 17, 2025 by ClaytonT Leave a Comment

I guess I should be careful what I ask for now.. Not sure if you saw, but when Microsoft first made this update it blew up my repo with over 100 issues due to all the changes and I assumed Microsoft had changed how they formatted their website, but they hadn’t. It was just from the new keys, vendors, and changes to current keys.

All of their basic info has been updated on the web and PowerShell module, but I haven’t put all the meta data in from the FIDO Alliance, as I’m looking for a way to fully automate it when new keys are added.

Now to the part you really care about

New Vendors:

  • Android
  • Dapple Security
  • Eviden
  • Foongton
  • GSTAG
  • ID-One
  • IIST
  • Infineon Technologies AG
  • KeyVault
  • Ledger
  • Nitrokey
  • OneKey
  • Samsung
  • Securité Carte à Puce
  • TruU
  • Veridium
  • VeroCard
  • Vivokey
  • WinMagic
  • ZTPass

New Keys:

AAGUIDVendorDescription
eb3b131e-59dc-536a-d176-cb7306da10f5ellipticSecureellipticSecure MIRkey USB Authenticator
8da0e4dc-164b-454e-972e-88f362b23d59EvidenCardOS FIDO2 Token
46544d5d-8f5d-4db4-89ac-ea8977073fffFoongtonFoongtone FIDO Authenticator
773c30d9-5919-4e96-a4f5-db65e95cf890GSTAGGSTAG OAK FIDO2 Authenticator
7991798a-a7f3-487f-98c0-3faf7a458a04HID GlobalHID Crescendo Key V3
2a55aee6-27cb-42c0-bc6e-04efe999e88aHID GlobalHID Crescendo 4000
82b0a720-127a-4788-b56d-d1d4b2d82eacID-OneID-One Key
f2145e86-211e-4931-b874-e22bba7d01ccID-OneID-One Key
4b89f401-464e-4745-a520-486ddfc5d80eIISTIIST FIDO2 Authenticator
cfcb13a2-244f-4b36-9077-82b79d6a7de7Infineon Technologies AGUSB/NFC Passcode Authenticator
58b44d0b-0a7c-f33a-fd48-f7153c871352LedgerLedger Nano S Plus FIDO2 Authenticator
fcb1bcb4-f370-078c-6993-bc24d0ae3fbeLedgerLedger Nano X FIDO2 Authenticator
341e4da9-3c2e-8103-5a9f-aad887135200LedgerLedger Nano S FIDO2 Authenticator
2cd2f727-f6ca-44da-8f48-5c2e5da000a2NitrokeyNitrokey 3 AM
70e7c36f-f2f6-9e0d-07a6-bcc243262e6bOneKeyOneKey FIDO2 Bluetooth Authenticator
53414d53-554e-4700-0000-000000000000SamsungSamsung Pass
5343502d-5343-5343-6172-644649444f32Securité Carte à PuceESS Smart Card Inc. Authenticator
050dd0bc-ff20-4265-8d5d-305c4b215192ThaleseToken Fusion FIPS
10c70715-2a9a-4de1-b0aa-3cff6d496d39ThaleseToken Fusion NFC FIPS
c3f47802-de73-4dfc-ba22-671fe3304f90ThaleseToken Fusion NFC PIV Enterprise
146e77ef-11eb-4423-b847-ce77864e9411ThaleseToken Fusion NFC PIV
ba86dc56-635f-4141-aef6-00227b1b9af6TruUTruU Windows Authenticator
95e4d58c-056e-4a65-866d-f5a69659e880TruUTruU Windows Authenticator
5ea308b2-7ac7-48b9-ac09-7e2da9015f8cVeridiumVeridium Android SDK
6e8d1eae-8d40-4c25-bcf8-4633959afc71VeridiumVeridium iOS SDK
99ed6c29-4573-4847-816d-78ad8f1c75efVeroCardVeroCard FIDO2 Authenticator
d7a423ad-3e19-4492-9200-78137dccc136VivoKeyVivoKey Apex FIDO2
31c3f7ff-bf15-4327-83ec-9336abcbcd34WinmagicWinMagic FIDO Eazy – Software
970c8d9c-19d2-46af-aa32-3f448db49e35WinMagicWinMagic FIDO Eazy – TPM
f56f58b3-d711-4afc-ba7d-6ac05f88cb19WinMagicWinMagic FIDO Eazy – Phone
b7d3f68e-88a6-471e-9ecf-2df26d041edeYubicoSecurity Key NFC by Yubico
9ff4cc65-6154-4fff-ba09-9e2af7882ad2YubicoSecurity Key NFC by Yubico – Enterprise Edition (Enterprise Profile)
34f5766d-1536-4a24-9033-0e294e510fb0YubicoYubiKey 5 Series with NFC Preview
6ec5cff2-a0f9-4169-945b-f33b563f7b99YubicoYubiKey Bio Series – Multi-protocol Edition (Enterprise Profile)
8c39ee86-7f9a-4a95-9ba3-f6b097e5c2eeYubicoYubiKey Bio Series – FIDO Edition (Enterprise Profile)
24673149-6c86-42e7-98d9-433fb5b73296YubicoYubiKey 5 Series with Lightning
3a662962-c6d4-4023-bebb-98ae92e78e20YubicoYubiKey 5 FIPS Series with Lightning (Enterprise Profile)
20ac7a17-c814-4833-93fe-539f0d5e3389YubicoYubiKey 5 Series (Enterprise Profile)
b90e7dc1-316e-4fee-a25a-56a666a670feYubicoYubiKey 5 Series with Lightning (Enterprise Profile)
760eda36-00aa-4d29-855b-4012a182cdebYubicoSecurity Key NFC by Yubico Preview
fcc0118f-cd45-435b-8da1-9782b2da0715YubicoYubiKey 5 FIPS Series with NFC
ff4dac45-ede8-4ec2-aced-cf66103f4335YubicoYubiKey 5 Series
7b96457d-e3cd-432b-9ceb-c9fdd7ef7432YubicoYubiKey 5 FIPS Series with Lightning
97e6a830-c952-4740-95fc-7c78dc97ce47YubicoYubiKey Bio Series – Multi-protocol Edition (Enterprise Profile)
6ab56fad-881f-4a43-acb2-0be065924522YubicoYubiKey 5 Series with NFC (Enterprise Profile)
d2fbd093-ee62-488d-9dad-1e36389f8826YubicoYubiKey 5 FIPS Series (RC Preview)
4599062e-6926-4fe7-9566-9e8fb1aedaa0YubicoYubiKey 5 Series (Enterprise Profile)
d7781e5d-e353-46aa-afe2-3ca49f13332aYubicoYubiKey 5 Series with NFC
62e54e98-c209-4df3-b692-de71bb6a8528YubicoYubiKey 5 FIPS Series with NFC Preview
34744913-4f57-4e6e-a527-e9ec3c4b94e6YubicoYubiKey Bio Series – Multi-protocol Edition
ed042a3a-4b22-4455-bb69-a267b652ae7eYubicoSecurity Key NFC by Yubico – Enterprise Edition
3b24bf49-1d45-4484-a917-13175df0867bYubicoYubiKey 5 Series with Lightning (Enterprise Profile)
3124e301-f14e-4e38-876d-fbeeb090e7bfYubicoYubiKey 5 Series with Lightning Preview
9e66c661-e428-452a-a8fb-51f7ed088acfYubicoYubiKey 5 FIPS Series with Lightning (RC Preview)
ce6bf97f-9f69-4ba7-9032-97adc6ca5cf1YubicoYubiKey 5 FIPS Series with NFC (RC Preview)
2772ce93-eb4b-4090-8b73-330f48477d73YubicoSecurity Key NFC by Yubico – Enterprise Edition Preview
ad08c78a-4e41-49b9-86a2-ac15b06899e2YubicoYubiKey Bio Series – FIDO Edition
905b4cb4-ed6f-4da9-92fc-45e0d4e9b5c7YubicoYubiKey 5 FIPS Series (Enterprise Profile)
b415094c-49d3-4c8b-b3fe-7d0ad28a6bc4ZTPassZTPass SmartAuth
  • Updated Keys
    • Updated ‘NFC’ for AAGUID ’30b5035e-d297-4ff1-b00b-addc96ba6a98′ from ‘Yes’ to ‘No’.
    • Updated ‘Description’ for AAGUID ’83c47309-aabb-4108-8470-8be838b573cb’ from ‘YubiKey Bio Series (Enterprise Profile)’ to ‘YubiKey Bio Series – FIDO Edition (Enterprise Profile)’.
    • Updated ‘Description’ for AAGUID ‘5ca1ab1e-1337-fa57-f1d0-a117e71ca702’ from ‘Allthenticator App: roaming BLE FIDO2 Allthenticator for Windows, Mac, Linux, and Allthenticate door readers’ to ‘Allthenticator iOS App: roaming BLE FIDO2 Allthenticator for Windows, Mac, Linux, and Allthenticate door readers’.
    • Updated ‘Description’ for AAGUID ‘d8522d9f-575b-4866-88a9-ba99fa02f35b’ from ‘YubiKey Bio Series’ to ‘YubiKey Bio Series – FIDO Edition’.
    • Updated ‘Description’ for AAGUID ‘dd86a2da-86a0-4cbe-b462-4bd31f57bc6f’ from ‘YubiKey Bio FIDO Edition’ to ‘YubiKey Bio Series – FIDO Edition’.

I know, it was a lot for me too! Which FIDO2 keys do you like the best? Feel free to message me if you rather not put it in the comments, but would love to hear your experiences.

PowerShell Gallery: https://www.powershellgallery.com/packages/EntraFIDOFinder/0.0.16
GitHub: https://github.com/DevClate/EntraFIDOFinder
Web Version: https://devclate.github.io/EntraFIDOFinder/Explorer/

Hope you enjoyed and have a great day!

Tagged With: 365, Automation, Entra, EntraFIDOFinder, FIDO2, PowerShell, Reporting, Security

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 11
  • Go to Next Page »

Primary Sidebar

Clayton Tyger

Tech enthusiast dad who has lost 100lbs and now sometimes has crazy running/biking ideas. Read More…

Find Me On

  • Email
  • GitHub
  • Instagram
  • LinkedIn
  • Twitter

Recent Posts

  • v0.0.20 EntraFIDOFinder is out
  • EntraFIDOFinder Update
  • Did you know: SSPR/Password Reset Edition
  • How to Delete Recurring Planner Tasks with PowerShell
  • Why does my 365 Admin Audit Log sometime say it’s disabled, but other times enabled? Am I being compromised?

Categories

  • 365
  • Active Directory
  • AI
  • AzureAD
  • BlueSky
  • Cim
  • Dashboards
  • Documentation
  • Entra
  • Get-WMI
  • Learning
  • Module Monday
  • Nutanix
  • One Liner Wednesday
  • Passwords
  • PDF
  • Planner
  • PowerShell
  • Read-Only Friday
  • Reporting
  • Security
  • Windows
  • WSUS

© 2025 Clatent