Skip to content

Commit f23555a

Browse files
authored
Apply suggestions from code review
1 parent d29d104 commit f23555a

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This article provides you with steps for simulating the following risk detection
2727
- Anonymous IP address (easy)
2828
- Unfamiliar sign-in properties (moderate)
2929
- Atypical travel (difficult)
30-
- Leaked Credentials in GitHub for Workload Identities (moderate)
30+
- Leaked credentials in GitHub for workload identities (moderate)
3131

3232
Other risk detections cannot be simulated in a secure manner.
3333

@@ -84,15 +84,19 @@ The sign-in shows up in the Identity Protection dashboard within 2-4 hours.
8484

8585
## Leaked Credentials for Workload Identities
8686

87-
This risk detection indicates that the application's valid credentials have been leaked. This leak can occur when someone checks in the credentials in a public code artifact on GitHub. Therefore, to simulate this detection, you need a GitHub account and can [sign up a GitHub account](https://docs.github.com/en/get-started/signing-up-for-github) if you don't have one already.
87+
This risk detection indicates that the application's valid credentials have been leaked. This leak can occur when someone checks in the credentials in a public code artifact on GitHub. Therefore, to simulate this detection, you need a GitHub account and can [sign up a GitHub account](https://docs.github.com/get-started/signing-up-for-github) if you don't have one already.
8888

8989
**To simulate Leaked Credentials in GitHub for Workload Identities, perform the following steps**:
9090
1. Navigate to the [Azure portal](https://portal.azure.com).
9191
2. Browse to **Azure Active Directory** > **App registrations**.
9292
3. Select **New registration** to register a new application or reuse an exsiting stale application.
93-
4. Select **Certificates & Secrets** > **New client Secret** , add a description of your client secret and set an expiration for the secret or specify a custom lifetime and click **Add**. Record the secret's value for later use for your GitHub Commit. Note: **You can not retrieve the secret again after you leave this page**.
93+
4. Select **Certificates & Secrets** > **New client Secret** , add a description of your client secret and set an expiration for the secret or specify a custom lifetime and click **Add**. Record the secret's value for later use for your GitHub Commit.
94+
95+
> [!Note]
96+
> **You can not retrieve the secret again after you leave this page**.
97+
9498
5. Get the TenantID and Application(Client)ID in the **Overview** page.
95-
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**
99+
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
96100
7. Create a **public** GitHub Repository, add the following config and commit the change.
97101
```GitHub file
98102
"AadClientId": "XXXX-2dd4-4645-98c2-960cf76a4357",

0 commit comments

Comments
 (0)