You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-remove-unused-credential-from-apps.md
-14Lines changed: 0 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,8 +22,6 @@ This article covers the recommendation to remove unused credentials from apps. T
22
22
23
23
Application credentials can include certificates and other types of secrets that need to be registered with that application. These credentials are used to prove the identity of the application. Only credentials actively in use by an application should remain registered with the application.
24
24
25
-
## Logic
26
-
27
25
This recommendation shows up if your tenant has application credentials that haven't been used in more than 30 days.
28
26
29
27
## Value
@@ -47,18 +45,6 @@ Applications that the recommendation identified appear in the list of **Impacted
47
45
48
46

49
47
50
-
### Use Microsoft Graph to remove an unused credential
51
-
52
-
You can use Microsoft Graph to remove an unused credential programmatically. To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
53
-
54
-
- Remove a **credential** from a service principal resource:
55
-
- Use the Microsoft Graph Service Principal API service action `removePassword`
56
-
-[servicePrincipal: removePassword MS Graph API documentation](/graph/api/serviceprincipal-removepassword?view=graph-rest-beta&preserve-view=true)
57
-
58
-
- Remove a **key credential** from a service principal resource:
59
-
- Use the Microsoft Graph Service Principal API service action `removeKey`
60
-
-[servicePrincipal: removeKey MS Graph API documentation](/graph/api/serviceprincipal-removekey?view=graph-rest-beta&preserve-view=true)
61
-
62
48
## Next steps
63
49
64
50
-[Review the Azure AD recommendations overview](overview-recommendations.md)
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-renew-expiring-application-credential.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,8 +22,6 @@ This article covers the recommendation to renew expiring application credentials
22
22
23
23
Application credentials can include certificates and other types of secrets that need to be registered with that application. These credentials are used to prove the identity of the application.
24
24
25
-
## Logic
26
-
27
25
This recommendation shows up if your tenant has application credentials that will expire soon.
28
26
29
27
## Value
@@ -47,12 +45,14 @@ Applications that the recommendation identified appear in the list of **Impacted
47
45

48
46
49
47
1. Once the certificate or secret is successfully added, update the service code to ensure it works with the new credential and doesn't negatively affect customers.
50
-
1. Use the Azure AD sign-in logs to validate that the thumbprint of the certificate matches the one that was recently uploaded.
48
+
1. Use the Azure AD sign-in logs to validate that the Key ID of the credential matches the one that was recently added.
51
49
1. After validating the new credential, navigate back to **Azure AD** > **App registrations** > **Certificates and Secrets** for the app and remove the old credential.
52
50
53
51
## Known limitations
54
52
55
-
When looking for the application with the credential that needs to be rotated, only the app name is used. The service doesn't have the ability to show the resource ID for the app.
53
+
- Currently in the current list of **Impacted resources**, only the app name and resource ID is shown. The key ID for the credential that needs to be rotated is not shown. To find the key ID credential, go to **Azure AD** > **App registrations** > **Certificates and Secrets** for the impacted application.
54
+
55
+
- An impacted resource with credentials that expired recently will be marked as completed. If that resource has more than one credential expiring soon, the status of the resource will still be active.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-renew-expiring-service-principal-credential.md
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,20 +31,25 @@ Renewing the service principal credential(s) before expiration ensures the appli
31
31
32
32
## Action plan
33
33
34
-
1. Navigate to **Azure AD** > **Enterprise applications**.
35
-
- The status of the service principal appears in the **Certificate Expiry Status** column.
36
-
- Use the search box at the top of the list to find the service principal that was listed in the recommendation.
34
+
1. Select the name of the application from the list of **Impacted resources** to go directly to the **Enterprise applications - Single sign-on** page for the selected application.
35
+
36
+
a. Alternatively, go to **Azure AD** > **Enterprise applications**. The status of the service principal appears in the **Certificate Expiry Status** column.
37
+
38
+
b. Use the search box at the top of the list to find the application that was listed in the recommendation.
37
39
38
40

41
+
42
+
c. Select the service principal with the credential that needs to be rotated, then select **Single sign-on** from the side menu.
39
43
40
-
1. Select the service principal with the credential that needs to be rotated, then select **Single sign-on** from the side menu.
41
44
1. Edit the **SAML signing certificate** section and follow the prompts to add a new certificate.
42
45
43
46

44
47
45
48
1. After adding the certificate, change its properties to make the certificate active, which makes the other certificate inactive.
46
49
1. Once the certificate is successfully added and activated, update the service code to ensure it works with the new credential and doesn't negatively affect customers.
47
-
1. Use the Azure AD sign-in logs to validate that the thumbprint of the certificate matches the one that was recently uploaded.
50
+
1. Use the Azure AD sign-in logs to validate that the Key ID of the certificate matches the one that was recently uploaded.
51
+
- Go to **Azure AD Sign-in logs** > **Service principal sign-ins**.
52
+
- Open the details for a related sign-in and check that the **Client credential type** is "Client secret" and the **Credential key ID** matches your credential.
48
53
1. After validating the new credential, navigate back to the **Single sign-on** area for the app and remove the old credential.
49
54
50
55
### Use Microsoft Graph to renew expiring service principal credentials
@@ -74,8 +79,9 @@ When renewing service principal credentials using Microsoft Graph, you need to r
74
79
75
80
- Service principal credentials that expire before the recommendation is completed will be marked complete by the system.
76
81
77
-
- The recommendation currently doesn't display the password secret credential in service principal when you select the impacted resource from the list.
82
+
- The recommendation currently doesn't display the password secret credential in service principal when you select an **Impacted resource** from the list.
78
83
84
+
- The **ID** shown in the list of **Impacted resources** is for the application not the service principal.
0 commit comments