
- SDL THREAT MODELING TOOL NETAPPS PASSWORD
- SDL THREAT MODELING TOOL NETAPPS WINDOWS
This rule also applies for making critical changes to an account or action or prompting for re-authentication) so the user is challenged before being granted access to sensitive information. Verify the application has additional authorization (such as step up or adaptive authentication, via multi-factor authentication such as sending OTP in SMS, email etc.
Accounts are disabled after an excessive number of failed attemptsĮnable step up or adaptive authentication Title. A generic error message is displayed on failed authentication and access denied event(s). Protection of privileged resources after failed logins. Display a generic error message after failed authentication and access denied occurs. Deny access to privileged resources when authentication fails. Some of them are listed below:Ĭonsider using a standard authentication mechanism to identify the source processĪpplications must handle failed authentication scenarios securely TitleĪpplications that explicitly authenticate users must handle failed authentication scenarios securely.The authentication mechanism must: There are multiple authentication protocols available which may be considered. Grant limited access to objects in Azure storage using SAS or SAPĬonsider using a standard authentication mechanism to authenticate to Web Application TitleĪuthentication is the process where an entity proves its identity, typically through credentials, such as a user name and password. Ensure that only the required containers and blobs are given anonymous read access.
Use per-device authentication credentials. Ensure that devices connecting to Cloud gateway are authenticated. Authenticate devices connecting to the Field Gateway.
Use ADAL libraries to manage token requests from OAuth2 clients to AAD (or on-premises AD). Ensure that TokenRepla圜ache is used to prevent the replay of ADAL authentication tokens. Override the default ADAL token cache with a scalable alternative. Use standard authentication scenarios supported by Azure Active Directory.
Ensure that standard authentication techniques are used to secure Web APIs.WCF-Do not set Transport clientCredentialType to none.WCF-Do not set Message clientCredentialType to none.Enable authentication when connecting to MSMQ queues in WCF.Ensure that deployed application's binaries are digitally signed.Override the default Identity Server token cache with a scalable alternative.Use standard authentication scenarios supported by Identity Server.Ensure that service fabric certificates are obtained from an approved Certificate Authority (CA).Use AAD to authenticate clients to service fabric clusters.Ensure that Service Fabric client-to-node certificate is different from node-to-node certificate.Restrict anonymous access to Service Fabric Cluster.Enable Azure AD Multi-Factor Authentication for Azure Administrators.Use per device authentication credentials using SaS tokens.Do not use SQL Authentication in contained databases.
When SQL authentication mode is used, ensure that account and password policy are enforced on SQL server.When possible use Azure Active Directory Authentication for Connecting to SQL Database.
When possible, use Windows Authentication for connecting to SQL Server. Implement controls to prevent username enumeration. Ensure that password and account policy are implemented. Implement forgot password functionalities securely. Ensure that administrative interfaces are appropriately locked down. Enable step up or adaptive authentication. Applications must handle failed authentication scenarios securely. Consider using a standard authentication mechanism to authenticate to Web Application. Security Frame: Authentication | Mitigations Product/Service Has-adal-ref, devx-track-js, devx-track-csharp