You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/media-services/previous/media-services-use-osmf-smooth-streaming-client-plugin.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -328,7 +328,7 @@ package
328
328
The Smooth Streaming for OSMF dynamic plugin is compatible with [Strobe Media Playback (SMP)](http://osmf.org/strobe_mediaplayback.html). You can use the SS for OSMF plugin to add Smooth Streaming content playback to SMP. To do this, copy "MSAdaptiveStreamingPlugin-v1.0.3-osmf2.0.swf" under a web server for HTTP load using the following steps:
329
329
330
330
1. Browse the [Strobe Media Playback setup page](http://osmf.org/dev/2.0gm/setup.html).
331
-
2. Set the src to a Smooth Streaming source, (e.g. http://devplatem.vo.msecnd.net/Sintel/Sintel_H264.ism/manifest)
331
+
2. Set the src to a Smooth Streaming source, (e.g. http:\//devplatem.vo.msecnd.net/Sintel/Sintel_H264.ism/manifest)
332
332
3. Make the desired configuration changes and click Preview and Update.
333
333
334
334
**Note** Your content web server needs a valid crossdomain.xml.
Copy file name to clipboardExpand all lines: articles/remote-rendering/how-tos/tokens.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ This article describes how to create such access token.
19
19
20
20
## Token service REST API
21
21
22
-
To create access tokens, the *Secure Token Service* provides a single REST API. The URL for the ARR STS service is [https://sts.mixedreality.azure.com](https://sts.mixedreality.azure.com).
22
+
To create access tokens, the *Secure Token Service* provides a single REST API. The URL for the ARR STS service is https:\//sts.mixedreality.azure.com.
Copy file name to clipboardExpand all lines: articles/security/develop/secure-develop.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,35 +49,35 @@ common web application vulnerabilities. Untrusted data is a vehicle for
49
49
injection attacks. Input for your application includes parameters in the
50
50
URL, input from the user, data from the database or from an API, and
51
51
anything that is passed in that a user could potentially manipulate. An
52
-
application should [validate](https://www.owasp.org/index.php/OWASP_Proactive_Controls_2016#4:_Validate_All_Inputs) that data is syntactically and semantically valid before the application uses the data in any way (including displaying it back to the user).
52
+
application should [validate](https://owasp.org/www-project-proactive-controls/v3/en/c5-validate-inputs) that data is syntactically and semantically valid before the application uses the data in any way (including displaying it back to the user).
53
53
54
54
Validate input early in the data flow to ensure that only properly
55
-
formed data enters the workflow. You don’t want malformed data
55
+
formed data enters the workflow. You don't want malformed data
56
56
persisting in your database or triggering a malfunction in a downstream
57
57
component.
58
58
59
59
Blacklisting and whitelisting are two general approaches to performing
60
60
input syntax validation:
61
61
62
62
- Blacklisting attempts to check that a given user input doesn't
63
-
contain “known to be malicious” content.
63
+
contain "known to be malicious" content.
64
64
65
65
- Whitelisting attempts to check that a given user input matches a set
66
-
of “known good” inputs. Character-based whitelisting is a form of
66
+
of "known good" inputs. Character-based whitelisting is a form of
67
67
whitelisting where an application checks that user input contains
68
-
only “known good” characters or that input matches a known format.
68
+
only "known good" characters or that input matches a known format.
69
69
For example, this might involve checking that a username contains
70
70
only alphanumeric characters or that it contains exactly two
71
71
numbers.
72
72
73
73
Whitelisting is the preferred approach for building secure software.
74
-
Blacklisting is prone to error because it’s impossible to think of a
74
+
Blacklisting is prone to error because it's impossible to think of a
75
75
complete list of potentially bad input.
76
76
77
77
Do this work on the server, not on the client side (or on the server and
78
78
on the client side).
79
79
80
-
### Verify your application’s outputs
80
+
### Verify your application's outputs
81
81
82
82
Any output that you present either visually or within a document should
83
83
always be encoded and escaped. [Escaping](https://www.owasp.org/index.php/Injection_Theory#Escaping_.28aka_Output_Encoding.29), also known as *output encoding*, is used to help ensure that untrusted data isn't a vehicle for an injection attack. Escaping, combined with data validation, provides layered defenses to increase security of the
@@ -114,7 +114,7 @@ See [removing standard server headers on Azure websites](https://azure.microsoft
114
114
115
115
### Segregate your production data
116
116
117
-
Your production data, or “real” data, should not be used for
117
+
Your production data, or "real" data, should not be used for
118
118
development, testing, or any other purpose than what the business
119
119
intended. A masked ([anonymized](https://en.wikipedia.org/wiki/Data_anonymization)) dataset should be used for all development and testing.
120
120
@@ -147,7 +147,7 @@ If your application allows [file uploads](https://www.owasp.org/index.php/Unrest
147
147
148
148
Antimalware protection helps identify and remove viruses, spyware, and
149
149
other malicious software. You can install [Microsoft Antimalware](../fundamentals/antimalware.md)
150
-
or a Microsoft partner’s endpoint protection solution ([Trend Micro](https://www.trendmicro.com/azure/),
150
+
or a Microsoft partner's endpoint protection solution ([Trend Micro](https://www.trendmicro.com/azure/),
and [Endpoint Protection](https://docs.microsoft.com/configmgr/protect/deploy-use/endpoint-protection)).
@@ -167,7 +167,7 @@ like the Temporary Internet Files folder, in the case of Internet
167
167
Explorer. When these pages are referred to again, the browser displays
168
168
the pages from its cache. If sensitive information (address, credit card
169
169
details, Social Security number, username) is displayed to the user, the
170
-
information might be stored in the browser’s cache and be retrievable by
170
+
information might be stored in the browser's cache and be retrievable by
171
171
examining the browser's cache or by simply pressing the browser's
172
172
**Back** button.
173
173
@@ -205,7 +205,7 @@ tools analyze source code or compiled versions of code when the code is
205
205
not executing in order to find security flaws.
206
206
207
207
Perform DAST, preferably with the assistance of a security professional
208
-
(a [penetration tester](../fundamentals/pen-testing.md) or vulnerability assessor). If a security professional isn't available, you can perform DAST yourself with a web proxy scanner and some training. Plug in a DAST scanner early on to ensure that you don’t introduce obvious security issues into your code. See the [OWASP](https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools) site for a list of web application vulnerability scanners.
208
+
(a [penetration tester](../fundamentals/pen-testing.md) or vulnerability assessor). If a security professional isn't available, you can perform DAST yourself with a web proxy scanner and some training. Plug in a DAST scanner early on to ensure that you don't introduce obvious security issues into your code. See the [OWASP](https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools) site for a list of web application vulnerability scanners.
Copy file name to clipboardExpand all lines: articles/security/develop/secure-web-app.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -801,7 +801,7 @@ After you add the Azure AD configuration and secrets to Key Vault, users can be
801
801
In the app code, this is handled by the Azure Active Directory Authentication Library (ADAL).
802
802
803
803
After the secrets are in Key Vault and the application has access to the secrets and the database, the application service can be reached through the gateway's
804
-
application URL (https://GATEWAY_HASH.cloudapp.net), which you can get from its blade.
804
+
application URL (https:\//GATEWAY_HASH.cloudapp.net), which you can get from its blade.
805
805
806
806
If, when you sign in to Azure AD, you get an error that says "User is not registered in the directory you're trying to log into," you need to add the user. To add the user, go to the **Users** tab of Azure AD and add the user manually by entering their details or invite the user by entering their email address as a guest user to Azure AD in the **Invite Guest** blade.
807
807
@@ -976,7 +976,7 @@ After you fix some of the code errors found by the linting tools, you have more
976
976
977
977
### Find and fix vulnerabilities in app dependencies
978
978
979
-
To find and fix application dependencies, you can use [OWASP's Dependency Check](https://www.owasp.org/index.php/OWASP_Dependency_Check).
979
+
To find and fix application dependencies, you can use [OWASP's Dependency Check](https://owasp.org/www-project-dependency-check/).
980
980
981
981
Safety is a similar application that checks dependencies. You can find it on [GitHub](https://github.com/pyupio/safety). Safety scans for vulnerabilities found in well-known vulnerability databases.
Copy file name to clipboardExpand all lines: articles/security/develop/threat-modeling-tool-communication-security.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,7 +144,7 @@ This rule works by returning an HTTP status code of 301 (permanent redirect) whe
144
144
|**SDL Phase**| Build |
145
145
|**Applicable Technologies**| Generic |
146
146
|**Attributes**| N/A |
147
-
|**References**|[OWASP HTTP Strict Transport Security Cheat Sheet](https://www.owasp.org/index.php/HTTP_Strict_Transport_Security_Cheat_Sheet)|
147
+
|**References**|[OWASP HTTP Strict Transport Security Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Strict_Transport_Security_Cheat_Sheet.html)|
148
148
| **Steps** | <p>HTTP Strict Transport Security (HSTS) is an opt-in security enhancement that is specified by a web application through the use of a special response header. Once a supported browser receives this header that browser will prevent any communications from being sent over HTTP to the specified domain and will instead send all communications over HTTPS. It also prevents HTTPS click through prompts on browsers.</p><p>To implement HSTS, the following response header has to be configured for a website globally, either in code or in config. Strict-Transport-Security: max-age=300; includeSubDomains HSTS addresses the following threats:</p><ul><li>User bookmarks or manually types `https://example.com` and is subject to a man-in-the-middle attacker: HSTS automatically redirects HTTP requests to HTTPS for the target domain</li><li>Web application that is intended to be purely HTTPS inadvertently contains HTTP links or serves content over HTTP: HSTS automatically redirects HTTP requests to HTTPS for the target domain</li><li>A man-in-the-middle attacker attempts to intercept traffic from a victim user using an invalid certificate and hopes the user will accept the bad certificate: HSTS does not allow a user to override the invalid certificate message</li></ul>|
149
149
150
150
## <aid="sqlserver-validation"></a>Ensure SQL server connection encryption and certificate validation
@@ -156,7 +156,7 @@ This rule works by returning an HTTP status code of 301 (permanent redirect) whe
156
156
|**Applicable Technologies**| SQL Azure |
157
157
|**Attributes**| SQL Version - V12 |
158
158
|**References**|[Best Practices on Writing Secure Connection Strings for SQL Database](https://social.technet.microsoft.com/wiki/contents/articles/2951.windows-azure-sql-database-connection-security.aspx#best)|
159
-
|**Steps**| <p>All communications between SQL Database and a client application are encrypted using Secure Sockets Layer (SSL) at all times. SQL Database doesn’t support unencrypted connections. To validate certificates with application code or tools, explicitly request an encrypted connection and do not trust the server certificates. If your application code or tools do not request an encrypted connection, they will still receive encrypted connections</p><p>However, they may not validate the server certificates and thus will be susceptible to "man in the middle" attacks. To validate certificates with ADO.NET application code, set `Encrypt=True` and `TrustServerCertificate=False` in the database connection string. To validate certificates via SQL Server Management Studio, open the Connect to Server dialog box. Click Encrypt connection on the Connection Properties tab</p>|
159
+
|**Steps**| <p>All communications between SQL Database and a client application are encrypted using Secure Sockets Layer (SSL) at all times. SQL Database doesn't support unencrypted connections. To validate certificates with application code or tools, explicitly request an encrypted connection and do not trust the server certificates. If your application code or tools do not request an encrypted connection, they will still receive encrypted connections</p><p>However, they may not validate the server certificates and thus will be susceptible to "man in the middle" attacks. To validate certificates with ADO.NET application code, set `Encrypt=True` and `TrustServerCertificate=False` in the database connection string. To validate certificates via SQL Server Management Studio, open the Connect to Server dialog box. Click Encrypt connection on the Connection Properties tab</p>|
160
160
161
161
## <aid="encrypted-sqlserver"></a>Force Encrypted communication to SQL server
162
162
@@ -210,7 +210,7 @@ This rule works by returning an HTTP status code of 301 (permanent redirect) whe
210
210
|**SDL Phase**| Build |
211
211
|**Applicable Technologies**| Generic, Windows Phone |
212
212
|**Attributes**| N/A |
213
-
|**References**|[Certificate and Public Key Pinning](https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning#.Net)|
213
+
|**References**|[Certificate and Public Key Pinning](https://owasp.org/www-community/controls/Certificate_and_Public_Key_Pinning)|
214
214
|**Steps**| <p>Certificate pinning defends against Man-In-The-Middle (MITM) attacks. Pinning is the process of associating a host with their expected X509 certificate or public key. Once a certificate or public key is known or seen for a host, the certificate or public key is associated or 'pinned' to the host. </p><p>Thus, when an adversary attempts to do SSL MITM attack, during SSL handshake the key from attacker's server will be different from the pinned certificate's key, and the request will be discarded, thus preventing MITM Certificate pinning can be achieved by implementing ServicePointManager's `ServerCertificateValidationCallback` delegate.</p>|
0 commit comments