Skip to content

Commit 3e8f2cd

Browse files
Learn Editor: Update service-accounts-principal.md
1 parent 9e858bd commit 3e8f2cd

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

articles/active-directory/architecture/service-accounts-principal.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ An application instance has two properties: the ApplicationID (or ClientID) and
3333

3434
> [!NOTE]
3535
> The terms **application** and **service principal** are used interchangeably, when referring to an application in authentication tasks. However, they are two representations of applications in Microsoft Entra ID.
36-
36+
3737
The ApplicationID represents the global application and is the same for application instances, across tenants. The ObjectID is a unique value for an application object. As with users, groups, and other resources, the ObjectID helps to identify an application instance in Microsoft Entra ID.
3838

3939
To learn more, see [Application and service principal relationship in Microsoft Entra ID](../develop/app-objects-and-service-principals.md)
@@ -42,9 +42,9 @@ To learn more, see [Application and service principal relationship in Microsoft
4242

4343
You can create an application and its service principal object (ObjectID) in a tenant using:
4444

45-
* Azure PowerShell
45+
* Microsoft Graph PowerShell
4646
* Azure command-line interface (Azure CLI)
47-
* Microsoft Graph
47+
* Microsoft Graph API
4848
* The Azure portal
4949
* Other tools
5050

@@ -85,17 +85,17 @@ When using service principals, use the following table to match challenges and m
8585
To find accounts, run the following commands using service principals with Azure CLI or PowerShell.
8686

8787
* Azure CLI - `az ad sp list`
88-
* PowerShell - `Get-AzureADServicePrincipal -All:$true`
88+
* PowerShell - `Get-MgServicePrincipal -All:$true`
8989

90-
For more information, see [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal)
90+
For more information, see [Get-MgServicePrincipal](/powershell/module/microsoft.graph.applications/get-mgserviceprincipal)
9191

9292
## Assess service principal security
9393

9494
To assess the security, evaluate privileges and credential storage. Use the following table to help mitigate challenges:
9595

9696
|Challenge | Mitigation|
9797
| - | - |
98-
| Detect the user who consented to a multi-tenant app, and detect illicit consent grants to a multi-tenant app | - Run the following PowerShell to find multi-tenant apps <br>`Get-AzureADServicePrincipal -All:$true ? {$_.Tags -eq WindowsAzureActiveDirectoryIntegratedApp"}`</br> - Disable user consent </br> - Allow user consent from verified publishers, for selected permissions (recommended) </br> - Configure them in the user context </br> - Use their tokens to trigger the service principal|
98+
| Detect the user who consented to a multi-tenant app, and detect illicit consent grants to a multi-tenant app | - Run the following PowerShell to find multi-tenant apps <br>`Get-MgServicePrincipal -All:$true | ? {$_.Tags -eq "WindowsAzureActiveDirectoryIntegratedApp"}`</br> - Disable user consent </br> - Allow user consent from verified publishers, for selected permissions (recommended) </br> - Configure them in the user context </br> - Use their tokens to trigger the service principal|
9999
|Use of a hard-coded shared secret in a script using a service principal|Use a certificate|
100100
|Tracking who uses the certificate or the secret| Monitor the service principal sign-ins using the Microsoft Entra sign-in logs|
101101
|Can't manage service principal sign-in with Conditional Access| Monitor the sign-ins using the Microsoft Entra sign-in logs
@@ -134,3 +134,4 @@ Conditional Access:
134134
Use Conditional Access to block service principals from untrusted locations.
135135

136136
See, [Create a location-based Conditional Access policy](../conditional-access/workload-identity.md#create-a-location-based-conditional-access-policy)
137+

0 commit comments

Comments
 (0)