Microsoft Launched Bug Bounty Program for Individuality Services Flaws

Microsoft had inaugurated a new bug bounty program, this time for individuality services.

“Microsoft has invested heavily in the security and privacy of both our consumer (Microsoft Account) and enterprise (Azure Active Directory) identity solutions,” wrote principal security group manager Phillip Misner.

However Redmond’s not merely paying to defend itself: the new bounties will likewise be on proposal for certain executions of the OpenID specs. Misner stated Microsoft’s prolonged its generosity to OpenID since it distinguishes its individual verification technologies require to function together with standards-based exertions.

“If you are a security researcher and have discovered a security vulnerability in the Identity services, we appreciate your help in disclosing it to us privately and giving us an opportunity to fix it before publishing technical details,” Misner wrote. Doing so could score you between US$500 and $100,000.”

Microsoft states you will require to search somewhat horrible that influences one of the following login tools to be entitled for the cash:

  • windows.net
  • microsoftonline.com
  • live.com
  • live.com
  • windowsazure.com
  • activedirectory.windowsazure.com
  • activedirectory.windowsazure.com
  • office.com
  • microsoftonline.com
  • Microsoft Authenticator for iOS and Android

Additionally, the flaw you find will require to:

  • Recognize a unique and formerly unreported serious or significant flaw that repeats in our Microsoft Individuality services.
  • Recognize a unique and formerly unreported flaw that marks in the enchanting over of a Microsoft Account or Azure Active Directory Account.
  • Recognize a single and formerly unreported flaw in registered OpenID ideals or with the protocol executed in our specialized products, services, or libraries.
  • However bounty awards will merely be compensated if the flaw repeats against the modern, openly available version give in beside any version of Microsoft Authenticator application.
  • Contain a description of the subject and brief reproducibility stages that are effortlessly understood. (This permits submissions to be treated as rapidly as probable and assists the maximum payment for the sort of flaw being exposed.
  • Contain the influence of the flaw
  • Continue a threat vector if not obvious

The organization has hundreds of millions of listed customers as it is not solid to note why Microsoft has definite its ID services are a upright target for bounty hunters, which creates it a mark so great that wicked hackers are confidently previously have all the inspiration they require. Proposing them a substitute, while also offering white hats more encouragement, is an immaculate crowdsourcing play.

Legend similarly has it that leftovers of Banyan Vines hang about within the core of Active Directory and certainly that venerable product merits some new devotion in case an antique horror could occur to impends us anew today.

Leave a Reply

Your email address will not be published. Required fields are marked *