Bundled commit covering pre-session work from multiple Concelier sprints already archived or in-flight: - SPRINT_20260419_006: mirror domain / source key validation - SPRINT_20260419_029 / 030: durable jobs orchestrator runtime + endpoint verification - SPRINT_20260421_001: advisory source projection truthful counts - SPRINT_20260421_002: FE advisory source consistency (connector-side bits) - SPRINT_20260421_003: advisory connector runtime alignment - SPRINT_20260422_003: source credential entry paths (in-flight) Includes connector internals (ACSC / Adobe / CERT-BUND / Chromium / Cisco / CVE-KEV / GHSA / JVN / KISA / MSRC / Oracle / Ubuntu), source management endpoints, mirror domain management, federation endpoints, topology setup, job registration, and associated dossier updates under docs/modules/concelier/. This commit groups ~229 file changes that accumulated across the above sprints; individual changes are preserved at file granularity so blame remains useful. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2.6 KiB
2.6 KiB
Concelier MSRC Connector - Microsoft Entra Onboarding Brief
Last updated: 2026-04-22
1. App registration requirements
Sign in at https://entra.microsoft.com and open App registrations.
Create or select a confidential client application that will use client credentials. Capture:
tenantId= Directory (tenant) IDclientId= Application (client) IDclientSecret= client secret value from Certificates & secrets
Primary operator path:
- Web UI: Security Posture -> Configure Sources or Ops -> Operations -> Feeds & Airgap -> Configure Sources
- CLI:
stella db connectors configure microsoft \ --server https://concelier.example.internal \ --set tenantId=... \ --set clientId=... \ --set clientSecret=...
Notes:
- Microsoft recommends certificates over client secrets for production applications. The current StellaOps MSRC operator entry path is client-secret based.
- MSRC is not documented here as a separate paid product, but you do need a Microsoft Entra tenant plus permission to register the app and grant the required consent.
2. Secret and credential policy
- Maintain two client secrets rotating every 90 days.
- Prefer storing the active secret through the StellaOps source configuration UI or CLI.
- Offline Kit deployments that still mirror secrets out of band must mirror the secret payloads in their encrypted store.
- Legacy host configuration remains a compatibility fallback only.
3. Compatibility fallback (concelier.yaml)
concelier:
sources:
microsoft:
tenantId: "<azure-tenant-guid>"
clientId: "<app-registration-client-id>"
clientSecret: "<pull from secret store>"
apiVersion: "2024-08-01"
locale: "en-US"
requestDelay: "00:00:00.250"
failureBackoff: "00:05:00"
cursorOverlapMinutes: 10
downloadCvrf: false
The runtime source ID is microsoft, and the connector still binds the legacy vndr:msrc section for compatibility.
4. CVRF artefacts
- The MSRC REST payload exposes
cvrfUrlper advisory. - Current connector behavior records the link as advisory metadata and reference; it does not download the ZIP by default.
- Mirror CVRF ZIPs when preparing Offline Kits if air-gapped deployments need them.
5. Outstanding items
- Ops must confirm the tenant and app used for production MSRC access.
- Connector owners should validate token cache health once credentials are supplied.
- If certificate-based auth is later required, StellaOps needs a dedicated certificate entry path before switching the runbook away from client secrets.