You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/concept-workload-identity-risk.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,6 @@ ms.reviewer: etbasser
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
19
18
# Securing workload identities
20
19
21
20
Azure AD Identity Protection has historically protected users in detecting, investigating, and remediating identity-based risks. We're now extending these capabilities to workload identities to protect applications and service principals.
@@ -40,10 +39,10 @@ To make use of workload identity risk, including the new **Risky workload identi
40
39
41
40
- Workload Identities Premium licensing: You can view and acquire licenses on the [Workload Identities blade](https://portal.azure.com/#view/Microsoft_Azure_ManagedServiceIdentity/WorkloadIdentitiesBlade) in the Azure portal.
42
41
- One of the following administrator roles assigned
43
-
- Global Administrator
44
42
- Security Administrator
45
43
- Security Operator
46
44
- Security Reader Users assigned the Conditional Access administrator role can create policies that use risk as a condition.
45
+
- Global Administrator
47
46
48
47
## Workload identity risk detections
49
48
@@ -63,7 +62,7 @@ We detect risk on workload identities across sign-in behavior and offline indica
63
62
64
63
Organizations can find workload identities that have been flagged for risk in one of two locations:
65
64
66
-
1. Sign in to the [Azure portal](https://portal.azure.com).
65
+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Reader](../roles/permissions-reference.md#security-reader).
67
66
1. Browse to **Azure Active Directory** > **Security** > **Risky workload identities**.
68
67
1. Or browse to **Azure Active Directory** > **Security** > **Risk detections**.
69
68
1. Select the **Workload identity detections** tab.'
@@ -89,7 +88,7 @@ For improved security and resilience of your workload identities, Continuous Acc
89
88
90
89
## Investigate risky workload identities
91
90
92
-
Identity Protection provides organizations with two reports they can use to investigate workload identity risk. These reports are the risky workload identities, and risk detections for workload identities. All reports allow for downloading of events in .CSV format for further analysis outside of the Azure portal.
91
+
Identity Protection provides organizations with two reports they can use to investigate workload identity risk. These reports are the risky workload identities, and risk detections for workload identities. All reports allow for downloading of events in .CSV format for further analysis.
93
92
94
93
Some of the key questions to answer during your investigation include:
95
94
@@ -102,7 +101,7 @@ The [Azure Active Directory security operations guide for Applications](../archi
102
101
103
102
Once you determine if the workload identity was compromised, dismiss the account’s risk, or confirm the account as compromised in the Risky workload identities report. You can also select “Disable service principal” if you want to block the account from further sign-ins.
104
103
105
-
:::image type="content" source="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png" alt-text="Confirm workload identity compromise or dismiss the risk in the Azure portal." lightbox="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png":::
104
+
:::image type="content" source="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png" alt-text="Confirm workload identity compromise or dismiss the risk." lightbox="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png":::
1. Sign in to the [Azure portal](https://portal.azure.com).
37
+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Administrator](../roles/permissions-reference.md#security-administrator)
38
38
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **MFA registration policy**.
39
39
1. Under **Assignments** > **Users**
40
40
1. Under **Include**, select **All users** or **Select individuals and groups** if limiting your rollout.
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ Before organizations enable remediation policies, they may want to [investigate]
64
64
65
65
### User risk policy in Conditional Access
66
66
67
-
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
67
+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
68
68
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
69
69
1. Select **New policy**.
70
70
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
@@ -90,7 +90,7 @@ After confirming your settings using [report-only mode](../conditional-access/ho
90
90
91
91
### Sign-in risk policy in Conditional Access
92
92
93
-
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
93
+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
94
94
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
95
95
1. Select **New policy**.
96
96
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-identity-protection-remediate-unblock.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ Administrators are given two options when resetting a password for their users:
66
66
67
67
If after investigation and confirming that the user account isn't at risk of being compromised, then you can choose to dismiss the risky user.
68
68
69
-
To **Dismiss user risk**, search for and select **Azure AD Risky users** in the Azure portal or the Entra portal, select the affected user, and select **Dismiss user(s) risk**.
69
+
To **Dismiss user risk**, search for and select **Azure AD Risky users** in the Azure portal or the Microsoft Entra admin center, select the affected user, and select **Dismiss user(s) risk**.
70
70
71
71
When you select **Dismiss user risk**, the user is no longer at risk, and all the risky sign-ins of this user and corresponding risk detections are dismissed as well.
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md
+16-15Lines changed: 16 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,10 +75,10 @@ Simulating the atypical travel condition is difficult because the algorithm uses
75
75
**To simulate an atypical travel risk detection, perform the following steps**:
76
76
77
77
1. Using your standard browser, navigate to [https://myapps.microsoft.com](https://myapps.microsoft.com).
78
-
2. Enter the credentials of the account you want to generate an atypical travel risk detection for.
79
-
3. Change your user agent. You can change user agent in Microsoft Edge from Developer Tools (F12).
80
-
4. Change your IP address. You can change your IP address by using a VPN, a Tor add-on, or creating a new virtual machine in Azure in a different data center.
81
-
5. Sign-in to [https://myapps.microsoft.com](https://myapps.microsoft.com) using the same credentials as before and within a few minutes after the previous sign-in.
78
+
1. Enter the credentials of the account you want to generate an atypical travel risk detection for.
79
+
1. Change your user agent. You can change user agent in Microsoft Edge from Developer Tools (F12).
80
+
1. Change your IP address. You can change your IP address by using a VPN, a Tor add-on, or creating a new virtual machine in Azure in a different data center.
81
+
1. Sign-in to [https://myapps.microsoft.com](https://myapps.microsoft.com) using the same credentials as before and within a few minutes after the previous sign-in.
82
82
83
83
The sign-in shows up in the Identity Protection dashboard within 2-4 hours.
84
84
@@ -88,25 +88,26 @@ The sign-in shows up in the Identity Protection dashboard within 2-4 hours.
88
88
89
89
This risk detection indicates that the application's valid credentials have been leaked. This leak can occur when someone checks in the credentials in a public code artifact on GitHub. Therefore, to simulate this detection, you need a GitHub account and can [sign up a GitHub account](https://docs.github.com/get-started/signing-up-for-github) if you don't have one already.
90
90
91
-
**To simulate Leaked Credentials in GitHub for Workload Identities, perform the following steps**:
92
-
1. Sign in to the [Azure portal](https://portal.azure.com).
93
-
2. Browse to **Azure Active Directory** > **App registrations**.
94
-
3. Select **New registration** to register a new application or reuse an existing stale application.
95
-
4. Select **Certificates & Secrets** > **New client Secret** , add a description of your client secret and set an expiration for the secret or specify a custom lifetime and select **Add**. Record the secret's value for later use for your GitHub Commit.
91
+
### Simulate Leaked Credentials in GitHub for Workload Identities
92
+
93
+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Administrator](../roles/permissions-reference.md#security-administrator).
94
+
1. Browse to **Azure Active Directory** > **App registrations**.
95
+
1. Select **New registration** to register a new application or reuse an existing stale application.
96
+
1. Select **Certificates & Secrets** > **New client Secret** , add a description of your client secret and set an expiration for the secret or specify a custom lifetime and select **Add**. Record the secret's value for later use for your GitHub Commit.
96
97
97
98
> [!Note]
98
99
> **You can not retrieve the secret again after you leave this page**.
99
100
100
-
5. Get the TenantID and Application(Client)ID in the **Overview** page.
101
-
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
102
-
7. Create a **public** GitHub Repository, add the following config and commit the change as a file with the .txt extension.
101
+
1. Get the TenantID and Application(Client)ID in the **Overview** page.
102
+
1. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
103
+
1. Create a **public** GitHub Repository, add the following config and commit the change as a file with the .txt extension.
7. In about 8 hours, you'll be able to view a leaked credential detection under **Azure Active Directory** > **Security** > **Risk Detection** > **Workload identity detections** where the additional info will contain the URL of your GitHub commit.
110
+
1. In about 8 hours, you'll be able to view a leaked credential detection under **Azure Active Directory** > **Security** > **Risk Detection** > **Workload identity detections** where the additional info will contain the URL of your GitHub commit.
110
111
111
112
## Testing risk policies
112
113
@@ -116,7 +117,7 @@ This section provides you with steps for testing the user and the sign-in risk p
116
117
117
118
To test a user risk security policy, perform the following steps:
118
119
119
-
1. Sign in to the [Azure portal](https://portal.azure.com).
120
+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Administrator](../roles/permissions-reference.md#security-administrator).
120
121
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **Overview**.
121
122
1. Select **Configure user risk policy**.
122
123
1. Under **Assignments**
@@ -136,7 +137,7 @@ To test a user risk security policy, perform the following steps:
136
137
137
138
To test a sign-in risk policy, perform the following steps:
138
139
139
-
1. Sign in to the [Azure portal](https://portal.azure.com).
140
+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Administrator](../roles/permissions-reference.md#security-administrator).
140
141
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **Overview**.
0 commit comments