Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This SIT is also included in the All credentials bundled SIT.
Important
Because credential scanning SITs are a type of advanced classifier, you must enable advanced classification before implementing them. For information about enabling advanced classification, and about configuring endpoints and the supported file types, see Advanced classification scanning and protection.
Format
A combination of 32 characters consisting of letters, digits, and special characters.
Pattern
A combination of 32 characters consisting of:
- a-z (not case-sensitive)
- 0-9
- forward slashes (/)
- or plus signs (+)
Credential example
account.azurecr.io/ #docker password: A1bC2dE3fH4iJ5kL6mN7oP8qR9sT0u/+
Checksum
No
SITs that have checksums use a unique calculation to check if the information is valid. This means when the Checksum value is Yes, the service can make a positive detection based on the sensitive data alone. When the Checksum value is No additional (secondary) elements must also be detected for the service to make a positive detection.
Keyword Highlighting
Supported
When keyword highlighting is supported in the contextual summary for a sensitive information type or a trainable classifier, in the Contextual Summary view of activity explorer, the keywords in a document that were matched to a policy are highlighted.
Definition
This SIT is designed to match the security information that's used to access Azure Container Registry services as an admin account.
It uses several primary resources:
- Patterns of Base64 encoded 192-bits symmetric key.
- Patterns of CredentialName, CredentialFeatures, AccountIdentityName, AccountIdentityValue, ResourceType, ResourceName.
- Patterns of mockup values, redactions, and placeholders.
- A dictionary of vocabulary.
The patterns are designed to match actual credentials with reasonable confidence. The patterns don't match credentials formatted as examples. Mockup values, redacted values, and placeholders, like credential type or usage descriptions, in the position where an actual secret value should present won't be matched.
Keywords
Keyword_SymmetricKey192:
- password
- -p
- azurecr