Skip to content

Commit b845da5

Browse files
authored
Merge pull request #96033 from cuixi1222/patch-1
Add detection simulation for workload identities
2 parents 9549471 + f23555a commit b845da5

File tree

2 files changed

+29
-1
lines changed

2 files changed

+29
-1
lines changed

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -113,3 +113,4 @@ The [Azure AD Toolkit](https://github.com/microsoft/AzureADToolkit) is a PowerSh
113113
- [Microsoft Graph API](/graph/use-the-api)
114114
- [Azure AD audit logs](../reports-monitoring/concept-audit-logs.md)
115115
- [Azure AD sign-in logs](../reports-monitoring/concept-sign-ins.md)
116+
- [Simulate risk detections](howto-identity-protection-simulate-risk.md)

articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,11 @@ This article provides you with steps for simulating the following risk detection
2727
- Anonymous IP address (easy)
2828
- Unfamiliar sign-in properties (moderate)
2929
- Atypical travel (difficult)
30+
- Leaked credentials in GitHub for workload identities (moderate)
3031

3132
Other risk detections cannot be simulated in a secure manner.
3233

33-
More information about each risk detection can be found in the article, [What is risk](concept-identity-protection-risks.md).
34+
More information about each risk detection can be found in the article, What is risk for [user](concept-identity-protection-risks.md) and [workload identity](concept-workload-identity-risk.md).
3435

3536
## Anonymous IP address
3637

@@ -81,6 +82,30 @@ Simulating the atypical travel condition is difficult because the algorithm uses
8182

8283
The sign-in shows up in the Identity Protection dashboard within 2-4 hours.
8384

85+
## Leaked Credentials for Workload Identities
86+
87+
This risk detection indicates that the application's valid credentials have been leaked. This leak can occur when someone checks in the credentials in a public code artifact on GitHub. Therefore, to simulate this detection, you need a GitHub account and can [sign up a GitHub account](https://docs.github.com/get-started/signing-up-for-github) if you don't have one already.
88+
89+
**To simulate Leaked Credentials in GitHub for Workload Identities, perform the following steps**:
90+
1. Navigate to the [Azure portal](https://portal.azure.com).
91+
2. Browse to **Azure Active Directory** > **App registrations**.
92+
3. Select **New registration** to register a new application or reuse an exsiting stale application.
93+
4. Select **Certificates & Secrets** > **New client Secret** , add a description of your client secret and set an expiration for the secret or specify a custom lifetime and click **Add**. Record the secret's value for later use for your GitHub Commit.
94+
95+
> [!Note]
96+
> **You can not retrieve the secret again after you leave this page**.
97+
98+
5. Get the TenantID and Application(Client)ID in the **Overview** page.
99+
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
100+
7. Create a **public** GitHub Repository, add the following config and commit the change.
101+
```GitHub file
102+
"AadClientId": "XXXX-2dd4-4645-98c2-960cf76a4357",
103+
"AadSecret": "p3n7Q~XXXX",
104+
"AadTenantDomain": "XXXX.onmicrosoft.com",
105+
"AadTenantId": "99d4947b-XXX-XXXX-9ace-abceab54bcd4",
106+
```
107+
7. In about 8 hours, you will be able to view a leaked credentail detection under **Azure Active Directory** > **Security** > **Risk Detection** > **Workload identity detections** where the additional info will contain your the URL of your GitHub commit.
108+
84109
## Testing risk policies
85110

86111
This section provides you with steps for testing the user and the sign-in risk policies created in the article, [How To: Configure and enable risk policies](howto-identity-protection-configure-risk-policies.md).
@@ -126,6 +151,8 @@ To test a sign in risk policy, perform the following steps:
126151

127152
- [What is risk?](concept-identity-protection-risks.md)
128153

154+
- [Securing workload identities with Identity](concept-workload-identity-risk.md)
155+
129156
- [How To: Configure and enable risk policies](howto-identity-protection-configure-risk-policies.md)
130157

131158
- [Azure Active Directory Identity Protection](overview-identity-protection.md)

0 commit comments

Comments
 (0)