Skip to content

Commit fef20cd

Browse files
Merge pull request #252818 from SteveMutungi254/docs-editor/service-accounts-principal-1695718122
Replace MSOL/Azure AD references with MS Graph PowerShell - Service account principal docs
2 parents 73ee22b + 07f93f7 commit fef20cd

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

articles/active-directory/architecture/service-accounts-principal.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ An application instance has two properties: the ApplicationID (or ClientID) and
3333

3434
> [!NOTE]
3535
> The terms **application** and **service principal** are used interchangeably, when referring to an application in authentication tasks. However, they are two representations of applications in Microsoft Entra ID.
36-
36+
3737
The ApplicationID represents the global application and is the same for application instances, across tenants. The ObjectID is a unique value for an application object. As with users, groups, and other resources, the ObjectID helps to identify an application instance in Microsoft Entra ID.
3838

3939
To learn more, see [Application and service principal relationship in Microsoft Entra ID](../develop/app-objects-and-service-principals.md)
@@ -43,8 +43,9 @@ To learn more, see [Application and service principal relationship in Microsoft
4343
You can create an application and its service principal object (ObjectID) in a tenant using:
4444

4545
* Azure PowerShell
46+
* Microsoft Graph PowerShell
4647
* Azure command-line interface (Azure CLI)
47-
* Microsoft Graph
48+
* Microsoft Graph API
4849
* The Azure portal
4950
* Other tools
5051

@@ -85,17 +86,17 @@ When using service principals, use the following table to match challenges and m
8586
To find accounts, run the following commands using service principals with Azure CLI or PowerShell.
8687

8788
* Azure CLI - `az ad sp list`
88-
* PowerShell - `Get-AzureADServicePrincipal -All:$true`
89+
* PowerShell - `Get-MgServicePrincipal -All:$true`
8990

90-
For more information, see [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal)
91+
For more information, see [Get-MgServicePrincipal](/powershell/module/microsoft.graph.applications/get-mgserviceprincipal)
9192

9293
## Assess service principal security
9394

9495
To assess the security, evaluate privileges and credential storage. Use the following table to help mitigate challenges:
9596

9697
|Challenge | Mitigation|
9798
| - | - |
98-
| Detect the user who consented to a multi-tenant app, and detect illicit consent grants to a multi-tenant app | - Run the following PowerShell to find multi-tenant apps <br>`Get-AzureADServicePrincipal -All:$true ? {$_.Tags -eq WindowsAzureActiveDirectoryIntegratedApp"}`</br> - Disable user consent </br> - Allow user consent from verified publishers, for selected permissions (recommended) </br> - Configure them in the user context </br> - Use their tokens to trigger the service principal|
99+
| Detect the user who consented to a multi-tenant app, and detect illicit consent grants to a multi-tenant app | - Run the following PowerShell to find multi-tenant apps <br>`Get-MgServicePrincipal -All:$true | ? {$_.Tags -eq "WindowsAzureActiveDirectoryIntegratedApp"}`</br> - Disable user consent </br> - Allow user consent from verified publishers, for selected permissions (recommended) </br> - Configure them in the user context </br> - Use their tokens to trigger the service principal|
99100
|Use of a hard-coded shared secret in a script using a service principal|Use a certificate|
100101
|Tracking who uses the certificate or the secret| Monitor the service principal sign-ins using the Microsoft Entra sign-in logs|
101102
|Can't manage service principal sign-in with Conditional Access| Monitor the sign-ins using the Microsoft Entra sign-in logs
@@ -134,3 +135,5 @@ Conditional Access:
134135
Use Conditional Access to block service principals from untrusted locations.
135136

136137
See, [Create a location-based Conditional Access policy](../conditional-access/workload-identity.md#create-a-location-based-conditional-access-policy)
138+
139+

0 commit comments

Comments
 (0)