You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md
+28-1Lines changed: 28 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,10 +27,11 @@ This article provides you with steps for simulating the following risk detection
27
27
- Anonymous IP address (easy)
28
28
- Unfamiliar sign-in properties (moderate)
29
29
- Atypical travel (difficult)
30
+
- Leaked credentials in GitHub for workload identities (moderate)
30
31
31
32
Other risk detections cannot be simulated in a secure manner.
32
33
33
-
More information about each risk detection can be found in the article, [What is risk](concept-identity-protection-risks.md).
34
+
More information about each risk detection can be found in the article, What is risk for [user](concept-identity-protection-risks.md) and [workload identity](concept-workload-identity-risk.md).
34
35
35
36
## Anonymous IP address
36
37
@@ -81,6 +82,30 @@ Simulating the atypical travel condition is difficult because the algorithm uses
81
82
82
83
The sign-in shows up in the Identity Protection dashboard within 2-4 hours.
83
84
85
+
## Leaked Credentials for Workload Identities
86
+
87
+
This risk detection indicates that the application's valid credentials have been leaked. This leak can occur when someone checks in the credentials in a public code artifact on GitHub. Therefore, to simulate this detection, you need a GitHub account and can [sign up a GitHub account](https://docs.github.com/get-started/signing-up-for-github) if you don't have one already.
88
+
89
+
**To simulate Leaked Credentials in GitHub for Workload Identities, perform the following steps**:
90
+
1. Navigate to the [Azure portal](https://portal.azure.com).
91
+
2. Browse to **Azure Active Directory** > **App registrations**.
92
+
3. Select **New registration** to register a new application or reuse an exsiting stale application.
93
+
4. Select **Certificates & Secrets** > **New client Secret** , add a description of your client secret and set an expiration for the secret or specify a custom lifetime and click **Add**. Record the secret's value for later use for your GitHub Commit.
94
+
95
+
> [!Note]
96
+
> **You can not retrieve the secret again after you leave this page**.
97
+
98
+
5. Get the TenantID and Application(Client)ID in the **Overview** page.
99
+
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
100
+
7. Create a **public** GitHub Repository, add the following config and commit the change.
7. In about 8 hours, you will be able to view a leaked credentail detection under **Azure Active Directory** > **Security** > **Risk Detection** > **Workload identity detections** where the additional info will contain your the URL of your GitHub commit.
108
+
84
109
## Testing risk policies
85
110
86
111
This section provides you with steps for testing the user and the sign-in risk policies created in the article, [How To: Configure and enable risk policies](howto-identity-protection-configure-risk-policies.md).
@@ -126,6 +151,8 @@ To test a sign in risk policy, perform the following steps:
126
151
127
152
-[What is risk?](concept-identity-protection-risks.md)
128
153
154
+
-[Securing workload identities with Identity](concept-workload-identity-risk.md)
155
+
129
156
-[How To: Configure and enable risk policies](howto-identity-protection-configure-risk-policies.md)
130
157
131
158
-[Azure Active Directory Identity Protection](overview-identity-protection.md)
0 commit comments