Skip to content

Commit e91d516

Browse files
committed
accuracy-review
1 parent fc77bd8 commit e91d516

File tree

3 files changed

+16
-24
lines changed

3 files changed

+16
-24
lines changed

articles/active-directory/reports-monitoring/recommendation-remove-unused-credential-from-apps.md

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,6 @@ This article covers the recommendation to remove unused credentials from apps. T
2222

2323
Application credentials can include certificates and other types of secrets that need to be registered with that application. These credentials are used to prove the identity of the application. Only credentials actively in use by an application should remain registered with the application.
2424

25-
## Logic
26-
2725
This recommendation shows up if your tenant has application credentials that haven't been used in more than 30 days.
2826

2927
## Value
@@ -47,18 +45,6 @@ Applications that the recommendation identified appear in the list of **Impacted
4745

4846
![Screenshot of the Certificates & secrets area of app registrations.](media/recommendation-remove-unused-credential-from-apps/app-certificates-secrets.png)
4947

50-
### Use Microsoft Graph to remove an unused credential
51-
52-
You can use Microsoft Graph to remove an unused credential programmatically. To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
53-
54-
- Remove a **credential** from a service principal resource:
55-
- Use the Microsoft Graph Service Principal API service action `removePassword`
56-
- [servicePrincipal: removePassword MS Graph API documentation](/graph/api/serviceprincipal-removepassword?view=graph-rest-beta&preserve-view=true)
57-
58-
- Remove a **key credential** from a service principal resource:
59-
- Use the Microsoft Graph Service Principal API service action `removeKey`
60-
- [servicePrincipal: removeKey MS Graph API documentation](/graph/api/serviceprincipal-removekey?view=graph-rest-beta&preserve-view=true)
61-
6248
## Next steps
6349

6450
- [Review the Azure AD recommendations overview](overview-recommendations.md)

articles/active-directory/reports-monitoring/recommendation-renew-expiring-application-credential.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,6 @@ This article covers the recommendation to renew expiring application credentials
2222

2323
Application credentials can include certificates and other types of secrets that need to be registered with that application. These credentials are used to prove the identity of the application.
2424

25-
## Logic
26-
2725
This recommendation shows up if your tenant has application credentials that will expire soon.
2826

2927
## Value
@@ -47,12 +45,14 @@ Applications that the recommendation identified appear in the list of **Impacted
4745
![Screenshot of the Certificates & secrets area of app registrations.](media/recommendation-renew-expiring-application-credential/app-certificates-secrets.png)
4846

4947
1. Once the certificate or secret is successfully added, update the service code to ensure it works with the new credential and doesn't negatively affect customers.
50-
1. Use the Azure AD sign-in logs to validate that the thumbprint of the certificate matches the one that was recently uploaded.
48+
1. Use the Azure AD sign-in logs to validate that the Key ID of the credential matches the one that was recently added.
5149
1. After validating the new credential, navigate back to **Azure AD** > **App registrations** > **Certificates and Secrets** for the app and remove the old credential.
5250

5351
## Known limitations
5452

55-
When looking for the application with the credential that needs to be rotated, only the app name is used. The service doesn't have the ability to show the resource ID for the app.
53+
- Currently in the current list of **Impacted resources**, only the app name and resource ID is shown. The key ID for the credential that needs to be rotated is not shown. To find the key ID credential, go to **Azure AD** > **App registrations** > **Certificates and Secrets** for the impacted application.
54+
55+
- An impacted resource with credentials that expired recently will be marked as completed. If that resource has more than one credential expiring soon, the status of the resource will still be active.
5656

5757
## Next steps
5858

articles/active-directory/reports-monitoring/recommendation-renew-expiring-service-principal-credential.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,20 +31,25 @@ Renewing the service principal credential(s) before expiration ensures the appli
3131

3232
## Action plan
3333

34-
1. Navigate to **Azure AD** > **Enterprise applications**.
35-
- The status of the service principal appears in the **Certificate Expiry Status** column.
36-
- Use the search box at the top of the list to find the service principal that was listed in the recommendation.
34+
1. Select the name of the application from the list of **Impacted resources** to go directly to the **Enterprise applications - Single sign-on** page for the selected application.
35+
36+
a. Alternatively, go to **Azure AD** > **Enterprise applications**. The status of the service principal appears in the **Certificate Expiry Status** column.
37+
38+
b. Use the search box at the top of the list to find the application that was listed in the recommendation.
3739

3840
![Screenshot of the Enterprise applications area with the search box highlighted.](media/recommendation-renew-expriring-service-principal-credential/recommendation-enterprise-apps-list.png)
41+
42+
c. Select the service principal with the credential that needs to be rotated, then select **Single sign-on** from the side menu.
3943

40-
1. Select the service principal with the credential that needs to be rotated, then select **Single sign-on** from the side menu.
4144
1. Edit the **SAML signing certificate** section and follow the prompts to add a new certificate.
4245

4346
![Screenshot of the edit single-sign-on process.](media/recommendation-renew-expriring-service-principal-credential/recommendation-edit-sso.png)
4447

4548
1. After adding the certificate, change its properties to make the certificate active, which makes the other certificate inactive.
4649
1. Once the certificate is successfully added and activated, update the service code to ensure it works with the new credential and doesn't negatively affect customers.
47-
1. Use the Azure AD sign-in logs to validate that the thumbprint of the certificate matches the one that was recently uploaded.
50+
1. Use the Azure AD sign-in logs to validate that the Key ID of the certificate matches the one that was recently uploaded.
51+
- Go to **Azure AD Sign-in logs** > **Service principal sign-ins**.
52+
- Open the details for a related sign-in and check that the **Client credential type** is "Client secret" and the **Credential key ID** matches your credential.
4853
1. After validating the new credential, navigate back to the **Single sign-on** area for the app and remove the old credential.
4954

5055
### Use Microsoft Graph to renew expiring service principal credentials
@@ -74,8 +79,9 @@ When renewing service principal credentials using Microsoft Graph, you need to r
7479
7580
- Service principal credentials that expire before the recommendation is completed will be marked complete by the system.
7681
77-
- The recommendation currently doesn't display the password secret credential in service principal when you select the impacted resource from the list.
82+
- The recommendation currently doesn't display the password secret credential in service principal when you select an **Impacted resource** from the list.
7883
84+
- The **ID** shown in the list of **Impacted resources** is for the application not the service principal.
7985
8086
## Next steps
8187

0 commit comments

Comments
 (0)