Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
powershell_heavy
windows_tools
missing_linux_example
windows_first
Summary
The documentation page demonstrates a strong Windows bias. All command-line examples are provided exclusively in PowerShell, with no mention of Linux or cross-platform alternatives. The focus is on Windows-native tools (PowerShell modules, Active Directory, Microsoft Entra Domain Services), and there are no instructions or guidance for users on Linux or macOS. The documentation assumes a Windows-centric environment and does not address Linux administration scenarios.
Recommendations
  • Provide equivalent command-line examples using Azure CLI and/or Bash scripts, which are cross-platform and commonly used on Linux.
  • Mention and document how Linux administrators can perform required tasks, such as managing service principals and policies, using non-Windows tools.
  • Clarify whether any steps require Windows specifically, and if so, suggest workarounds or alternatives for Linux/macOS users.
  • Include references to Linux-compatible tools (e.g., Azure CLI, REST API) alongside PowerShell, and avoid assuming the user is on Windows.
  • Add a section or notes for Linux/macOS users to ensure parity and inclusivity.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2026-01-14 00:00 #250 in_progress Biased Biased
2026-01-13 00:00 #246 completed Biased Biased
2026-01-11 00:00 #240 completed Biased Biased
2026-01-10 00:00 #237 completed Biased Biased
2026-01-09 00:34 #234 completed Biased Biased
2026-01-08 00:53 #231 completed Biased Biased
2026-01-06 18:15 #225 cancelled Clean Clean
2025-08-17 00:01 #83 cancelled Clean Clean
2025-07-16 00:00 #52 completed Biased Biased
2025-07-13 21:37 #48 completed Biased Biased
2025-07-12 23:44 #41 cancelled Biased Biased

Flagged Code Snippets

   Install-Module Microsoft.Entra
   Install-Module microsoft.Entra.Beta
   
   Connect-Entra -Scopes 'Application.ReadWrite.All'
   
    # Determine whether policy exists
    Get-EntraBetaPolicy | Where {$_.DisplayName -eq "EnableDirectAuth"}

    # Create if not exists
    $policy = New-EntraBetaPolicy `
        -Definition @('{"HomeRealmDiscoveryPolicy":{"AllowCloudPasswordValidation":true}}') `
        -DisplayName "EnableDirectAuth" `
        -Type "HomeRealmDiscoveryPolicy"

    # Determine whether a policy for the service principal exist
    Get-EntraBetaServicePrincipalPolicy `
        -Id $powershellSPN.ObjectId

    # Add a service principal policy if not exist
    Add-EntraBetaServicePrincipalPolicy `
        -Id $powershellSPN.ObjectId `
        -refObjectID $policy.ID