Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New Policy (Azure Web Apps): Web apps should have basic local authentication methods disabled for FTP deployments #434

Merged

Conversation

tdefise
Copy link
Contributor

@tdefise tdefise commented Apr 3, 2024

Policy

  • Name: Web App should have basic local authentication methods disabled for FTP deployments
  • Description: Disabling local authentication methods for FTP deployments improves security by ensuring that Web apps exclusively require Microsoft Entra identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth.
  • Category: App Service
  • Supported effect(s): AuditIfNotExists, Disabled
  • Parameters: None

Description

Audit if basic local authentication methods for FTP deployments is disabled

Details

App Service provides basic authentication for FTP and WebDeploy clients to connect to it by using deployment credentials.
These APIs are great for browsing your site’s file system, uploading drivers and utilities, and deploying with MsBuild. However, enterprises often require more secure deployment methods than basic authentication, such as Microsoft Entra ID authentication (see Authentication types by deployment methods in Azure App Service).
Microsoft Entra uses OAuth 2.0 token-based authorization and has many benefits and improvements that help mitigate the issues in basic authentication. For example, OAuth access tokens have a limited usable lifetime, and are specific to the applications and resources for which they're issued, so they can't be reused. Microsoft Entra also lets you deploy from other Azure services using managed identities.

Source: https://learn.microsoft.com/en-us/azure/app-service/configure-basic-auth-disable?tabs=portal

Contribution Rules

  • Contain a single Policy in a folder by itself with 3 files: azurepolicy.json, azurepolicy.rules.json, and azurepolicy.parameters.json
  • Used Confirm-PolicyDefinitionIsValid.ps1
  • Used Out-FormattedPolicyDefinition.ps1

@aschabus aschabus merged commit 99792c8 into Azure:main Apr 17, 2024
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants