Skip to content

Commit eceaad0

Browse files
authored
Update security-best-practices-for-app-registration.md
------- cc: @davidmu1, @madansr7
1 parent a447404 commit eceaad0

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

articles/active-directory/develop/security-best-practices-for-app-registration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@ Certificates and secrets, also known as credentials, are a vital part of an appl
6262
Consider the following guidance related to certificates and secrets:
6363

6464
- Always use [certificate credentials](./active-directory-certificate-credentials.md) whenever possible and don't use password credentials, also known as *secrets*. While it's convenient to use password secrets as a credential, when possible use x509 certificates as the only credential type for getting tokens for an application.
65+
- Configure [application authentication method policies](/graph/api/resources/applicationauthenticationmethodpolicy) to govern the use of secrets by limiting their lifetimes or blocking their use altogether.
6566
- Use Key Vault with [managed identities](../managed-identities-azure-resources/overview.md) to manage credentials for an application.
6667
- If an application is used only as a Public Client App (allows users to sign in using a public endpoint), make sure that there are no credentials specified on the application object.
6768
- Review the credentials used in applications for freshness of use and their expiration. An unused credential on an application can result in a security breach. Rollover credentials frequently and don't share credentials across applications. Don't have many credentials on one application.

0 commit comments

Comments
 (0)