last sync: 2020-Aug-05 13:05:29 UTC

Azure Policy

Service Fabric clusters should only use Azure Active Directory for client authentication

Policy DisplayName Service Fabric clusters should only use Azure Active Directory for client authentication
Policy Id b54ed75b-3e1a-44ac-a333-05ba39b99ff0
Policy Category Service Fabric
Policy Description Audit usage of client authentication only via Azure Active Directory in Service Fabric
Policy Mode Indexed
Policy Type BuiltIn
Policy in Preview FALSE
Policy Deprecated FALSE
Policy Effect Default: Audit
Allowed: (Audit,Deny,Disabled)
Roles used none
Policy Changes no changes
Used in Policy Initiative(s)
Initiative DisplayName Initiative Id
IRS1075 September 2016 105e0327-6175-4eb2-9af4-1fba43bdb39d
Enable Monitoring in Azure Security Center 1f3afdf9-d0c9-4c3d-847f-89da613e70a8
[Preview]: Australian Government ISM PROTECTED 27272c0b-c225-4cc3-b8b0-f2534b093077
UK OFFICIAL and UK NHS 3937f550-eedd-4639-9c5e-294358be442e
[Preview]: SWIFT CSP-CSCF v2020 3e0c67fc-8c7c-406c-89bd-6b6bdc986a22
[Preview]: Azure Security Benchmark 42a694ed-f65e-42b2-aa9e-8052e9740a92
Canada Federal PBMM 4c4a5f27-de81-430b-b4e5-9cbd50595a87
ISO 27001:2013 89c6cddc-1c73-4ac1-b19c-54d1a15a42f2
[Deprecated]: DOD Impact Level 4 8d792a84-723c-4d92-a3c3-e4ed16a2d133
NIST SP 800-53 R4 cf25b9c1-bd23-4eb6-bd2c-f4f3ac644a5f
FedRAMP High d5264498-16f4-418a-b659-fa7ef418175f
FedRAMP Moderate e95f5a9f-57ad-4d03-bb0b-b1d16db93693
Policy Rule
{
  "properties": {
    "displayName": "Service Fabric clusters should only use Azure Active Directory for client authentication",
    "policyType": "BuiltIn",
    "mode": "Indexed",
    "description": "Audit usage of client authentication only via Azure Active Directory in Service Fabric",
    "metadata": {
      "version": "1.1.0",
      "category": "Service Fabric"
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
          "displayName": "Effect",
          "description": "The effect determines what happens when the policy rule is evaluated to match"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      }
    },
    "policyRule": {
      "if": {
        "allOf": [
          {
            "field": "type",
            "equals": "Microsoft.ServiceFabric/clusters"
          },
          {
            "anyOf": [
              {
                "field": "Microsoft.ServiceFabric/clusters/azureActiveDirectory.tenantId",
                "exists": "false"
              },
              {
                "field": "Microsoft.ServiceFabric/clusters/azureActiveDirectory.tenantId",
                "equals": ""
              }
            ]
          }
        ]
      },
      "then": {
      "effect": "[parameters('effect')]"
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/b54ed75b-3e1a-44ac-a333-05ba39b99ff0",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "b54ed75b-3e1a-44ac-a333-05ba39b99ff0"
}