-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remediate Unsafe PAT Usage #2052
base: dev
Are you sure you want to change the base?
Conversation
Switch from using Personal Access Token (PATs) to using Application Service Principal and Managed Identities
GraphWebApi/wwwroot/OpenApi.yaml
Outdated
servers: | ||
- url: https://graphexplorerapi.azurewebsites.net/ | ||
- url: https://devxapi-func-prod-eastus.azurewebsites.net/ | ||
description: Main server | ||
- url: https://graphexplorerapi-staging.azurewebsites.net/ | ||
- url: https://devxapi-func-ppe-eastus.azurewebsites.net/ | ||
description: Staging server | ||
- url: https://localhost:44399/ | ||
description: Local test server |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Though it's not part of the work on this PR, it could possibly be something to do in a new PR, could we move the server definitions to the pipeline?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's also keep the old servers and add the new ones to the list
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
Co-authored-by: Musale Martin <[email protected]>
Co-authored-by: Musale Martin <[email protected]>
Quality Gate passedIssues Measures |
Switch from using Personal Access Token (PATs) to using Application Service Principal and Managed Identities
Overview
This PR contains implementation of Authentication using Federated Managed Identity. This remediated usage of unsafe Personal Access Token (PAT).
This PR also contains updated to the OpenAPI.yml server addresses to point to the Torus addresses for DevX API
Notes
Managed Identities are only available to Azure resources that you associate the Managed Identity with. You can only use the Managed Identity from a Torus-hosted Azure resource you've linked your Managed Identity to.
Microsoft Reviewers: Open in CodeFlow