HomeCyber BalkansSTOP generating SAML signing certificates externally

STOP generating SAML signing certificates externally

Published on

spot_img

In a recent study conducted by cybersecurity experts, it was revealed that there are vulnerabilities in the Active Directory Federation Services (ADFS) that could potentially lead to data theft through a Golden SAML attack. This attack allows attackers to steal the private key needed to speak SAML to business applications and impersonate authentication and users. Woodruff, a researcher at Semperis, highlighted the risks associated with these vulnerabilities.

To address these security concerns, experts recommended switching to a cloud identity provider like Entra ID, which provides better private key security. With Entra ID, the private key used in SAML authentications is stored in a way that only Microsoft services can access it. This means that only administrators can write the private key, preventing attackers from reading it even if they gain unauthorized access.

One of the key advantages of using Entra ID is that the generation of SAML signing certificates is defaulted to Microsoft when applications are configured with this cloud identity provider. As a result, the private key portion of the certificate cannot be exported, making it impossible for attackers to obtain it. However, there are instances where administrators may obtain certificates externally and upload them to Entra ID, creating potential risks.

The exposure occurs when certificates are obtained externally and uploaded to Entra ID, as this process leaves opportunities for attackers to find the private key. Organizations often generate signing certificates on client systems using enterprise public key infrastructure like Active Directory Certificate Services or external certificate authorities. These certificates may then be used through insecure channels like Teams or Slack on client machines, leaving them vulnerable to export in the local certificate store or on web servers running Microsoft Internet Information Services.

Overall, the security risks associated with ADFS can be mitigated by implementing cloud identity providers like Entra ID, which offer enhanced private key security measures. By defaulting the generation of SAML signing certificates to Microsoft and limiting access to the private key, organizations can better protect their data from potential cyber threats. It is essential for businesses to proactively address these vulnerabilities and prioritize data security to prevent data breaches and unauthorized access.

Source link

Latest articles

GitLab Addresses Vulnerabilities That Could Enable User Session Hijacking

GitLab, the popular DevOps platform, has taken significant steps to bolster its security posture...

Trump’s Leading Cyber Nominee Withdraws Following Turbulent Process

Leadership Crisis Deepens as Sean Plankey Withdraws from CISA Nomination The U.S. Cybersecurity and Infrastructure...

Microsoft Partners with Anthropic’s Mythos to Enhance Secure Software Development

In a recent development in cybersecurity, Microsoft has taken a significant step by integrating...

Push for Digital Sovereignty: Essential Insights for CISOs

In early 2026, the French government made a significant announcement that sent ripples throughout...

More like this

GitLab Addresses Vulnerabilities That Could Enable User Session Hijacking

GitLab, the popular DevOps platform, has taken significant steps to bolster its security posture...

Trump’s Leading Cyber Nominee Withdraws Following Turbulent Process

Leadership Crisis Deepens as Sean Plankey Withdraws from CISA Nomination The U.S. Cybersecurity and Infrastructure...

Microsoft Partners with Anthropic’s Mythos to Enhance Secure Software Development

In a recent development in cybersecurity, Microsoft has taken a significant step by integrating...