Entra ID Service Principal Federated Credential Authentication by Unusual Client

Last updated 16 days ago on 2026-02-09
Created 16 days ago on 2026-02-09

About

Identifies when a service principal authenticates using a federated identity credential for the first time in the historical window. This indicates that Entra ID validated a JWT token potentially against an external OIDC identity provider and issued an access token. While legitimate for CI/CD workflows (GitHub Actions, Azure DevOps), adversaries may abuse this by configuring rogue identity providers (BYOIDP) to authenticate as compromised applications. First-time federated credential usage for a service principal warrants investigation to determine if the external identity provider is legitimate.
Tags
Domain: CloudDomain: IdentityData Source: AzureData Source: Microsoft Entra IDData Source: Microsoft Entra ID Sign-In LogsUse Case: Identity and Access AuditTactic: Initial AccessTactic: Defense EvasionTactic: PersistenceLanguage: kuery
Severity
medium
Risk Score
47
MITRE ATT&CK™

Initial Access (TA0001)(external, opens in a new tab or window)

Defense Evasion (TA0005)(external, opens in a new tab or window)

False Positive Examples
New CI/CD pipeline deployments using GitHub Actions, Azure DevOps, or Kubernetes OIDC will trigger this rule when federated authentication is first used. Validate the issuer URL against approved identity providers. Application migrations or reconfigurations that switch from certificate/secret authentication to federated credentials will appear as new behavior. Confirm with application owners. New workload identity federation configurations for legitimate automation will trigger on first use.
License
Elastic License v2(external, opens in a new tab or window)

Definition

Rule Type
New Terms Rule
Integration Pack
Prebuilt Security Detection Rules
Index Patterns
logs-azure.signinlogs-*
Related Integrations

azure(external, opens in a new tab or window)

Query
text code block:
event.dataset: "azure.signinlogs" and azure.signinlogs.category: "ServicePrincipalSignInLogs" and azure.signinlogs.properties.client_credential_type: "federatedIdentityCredential" and azure.signinlogs.result_signature: "SUCCESS" and azure.signinlogs.properties.app_id: * and not azure.signinlogs.properties.app_owner_tenant_id: ( "f8cdef31-a31e-4b4a-93e4-5f571e91255a" or "72f988bf-86f1-41af-91ab-2d7cd011db47" )

Install detection rules in Elastic Security

Detect Entra ID Service Principal Federated Credential Authentication by Unusual Client in the Elastic Security detection engine by installing this rule into your Elastic Stack.

To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).