SlideShare a Scribd company logo
Frequently Asked Questions (FAQ)
New Security Requirements
for the Cloud Solution
Provider (CSP) program
Frequently Asked Questions (FAQs)
The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all
warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In
no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect,
incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have
been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for
consequential or incidental damages so the foregoing limitation may not apply.
Revision Sheet
Change Record
Date Author Version Change Reference
Page 1
New Security Requirements for the CSP program
Table of Contents
1 Introduction............................................................................................................................................ 2
1.1 Why is Microsoft implementing these new requirements?.............................................................................2
1.2 Our company already applied industry best practices to keep our system secure. Why should I
implement these requirements?................................................................................................................................................2
1.3 What will happen if I do not take any actions?....................................................................................................3
1.4 How do I join the Partner Center security guidance Yammer?......................................................................3
2 Secure Application Model FAQs...................................................................................................... 3
2.1 What is the new secure application model? .........................................................................................................3
2.2 What actions do I need to take to implement a secure applications model? .........................................3
2.3 When do I need to implement a secure applications model? .......................................................................4
2.4 Who is a control panel vendor (CPV)?.....................................................................................................................4
2.5 How do I know if my control panel vendor (CPV) is working on implementing the solution or
not? 4
3 Multi-Factor Authentication (MFA) FAQs..................................................................................... 5
3.1 What is Multi-Factor Authentication (MFA)? ........................................................................................................5
3.2 What actions do I need to take to implement a multi-factor authentication (MFA) solution? ........5
3.3 When do I need to implement a Multi-Factor Authentication (MFA) solution?.....................................5
3.4 I use multiple tenants to transact, do I need to implement a Multi-Factor Authentication (MFA)
solution on them all? .....................................................................................................................................................................6
3.5 If my company transacts through the CSP program in multiple countries, how will implementing
a Multi-Factor Authentication (MFA) solution work?........................................................................................................6
3.6 I am a Direct Bill partner with Microsoft. Do I still have to do this? ............................................................6
3.7 I am an Indirect Reseller and only transact though a distributor. Do I still have to do this? ............6
3.8 Should I use or purchase Microsoft Azure Active Directory (AAD) premium?........................................6
3.9 Which vendors provide Multi-Factor Authentication (MFA) solutions compatible with Microsoft
Azure Active Directory (AAD). ....................................................................................................................................................6
3.10 I already have implemented a Multi-Factor Authentication (MFA) solution in our environment,
what should I do?............................................................................................................................................................................7
Page 2
New Security Requirements for the CSP program
1 Introduction
Cybersecurity is the central challenge of our digital age. Microsoft is committed to providing a
trusted set of cloud services and platforms. We invest heavily in our technology, people, and
processes to help ensure that customers’ as well as partners’ data is private and protected from
unauthorized access, both internally and externally.
1.1 Why is Microsoft implementing these new requirements?
Microsoft is committed to providing a trusted set of cloud services and platforms. We have
noticed an increasing number of security breaches and fraud incidents in the industry. As our
Cloud Solution Provider program ecosystem grows, we are extending our security best practices
to our partner ecosystem, and introducing new mandatory security requirements that help
protect our partners in the CSP program ecosystem as well as customers from unexpected
security risks and financial damages caused by unauthorized access.
The new mandatory security requirements include:
1. Enabling a new secure application model to integrate with Partner Center APIs.
Effective date starts December 11, 2018.
2. Adopting and enabling Multi-Factor Authentication (MFA) to access Partner Center
API and Partner Center Dashboard. Enforcement date begins February 4, 2019.
Enabling a new security model will allow partners transacting in the CSP program to activate a
more secure access to Partner Center APIs with enhanced identity protection features. This
secure application model helps partners to further secure credentials and reduce the potential
financial and branding damages caused by unauthorized access. These requirements empowers
all parties, including partners in the CSP program as well as control panel vendors (CPV), to
protect their infrastructure as well as customer data from unauthorized access and unintended
security risks such as identify theft or other fraud incidents.
1.2 Our company already applied industry best practices to keep our
system secure. Why should I implement these requirements?
CSP partners must meet these requirements before the effective dates. Microsoft is committed
to providing a trusted set of cloud services and platforms. As our Cloud Solution Provider (CSP)
program grows, we are extending our security best practices and features available on Microsoft
Partner Center to our partner ecosystem.
Page 3
New Security Requirements for the CSP program
1.3 What will happen if I do not take any actions?
Failure in implementing these changes may impact partner’s ability to transact through the
Cloud Solution Provider (CSP) program via Partner Center API and Partner Center Dashboard.
1.4 How do I join the Partner Center security guidance Yammer?
A Partner Center security guidance Yammer group is available for discussion on the technical
requirements of these new security requirements. To join, users must follow the steps below:
1. Join the open network.
2. Join either the CSP Yammer Partner Community (for direct bill partners) or the CSP
Indirect Partner Group (for indirect partners).
3. Request to join the Partner Center security guidance Yammer group.
2 Secure Application Model FAQs
2.1 What is the new secure application model?
Microsoft is introducing a secure, scalable framework for authenticating Cloud Solution Provider
(CSP) partners and control panel vendors (CPV) through the Microsoft Azure multi-factor
authentication (MFA) architecture. CSP partners and CPVs can rely on the new secure application
model to elevate security for Partner Center API integration.
Further detail is available within the secure application model guide.
2.2 What actions do I need to take to implement a secure applications
model?
Cloud Solution Provider (CSP) partners and control panel vendors (CPV) need to apply the new
secure application model before effective date December 11, 2018. The following actions are
required:
Partner scenarios Actions required
Partners using Partner Center
APIs directly
(Indirect providers or direct
bill partners)
• Start implementing this requirement immediately.
Refer to the Partner Center: secure applications
model guide.
Page 4
New Security Requirements for the CSP program
Control panel vendors (CPV)
integrating with Partner
Center APIs
• On-board to Partner Center as a control panel
vendor. On-boarding tooling and process will be
ready by early December. More information to come.
o Start implementing this requirement immediately.
Refer to the Partner Center: secure applications
model guide.
o Accept and manage CSP partners’ consent instead of
credentials
o Purge all existing CSP partners’ credentials
Partners using control panel
vendor solutions
• Consult with your control panel providers to adopt
the new security application model.
2.3 When do I need to implement a secure applications model?
Partners must complete this action by the effective date, December 11, 2018.
2.4 Who is a control panel vendor (CPV)?
A Control Panel vendor is an independent software vendor that develops apps for use by CSP
Partners to integrate with Partner Center APIs. A Control Panel vendor is not a CSP Partner with
direct access to Partner Center dashboard or APIs. A detailed description is available within the
Partner Center: secure application model guide.
2.5 How do I know if my control panel vendor (CPV) is working on
implementing the solution or not?
For partners using a control panel vendor (CPV) solution to transact in the Cloud Solution
Provider (CSP) program, it is your responsibility to consult with your CPV to meet this
requirement.
Page 5
New Security Requirements for the CSP program
3 Multi-Factor Authentication (MFA) FAQs
3.1 What is Multi-Factor Authentication (MFA)?
Multi-Factor Authentication (MFA) is a security mechanism in which individuals are
authenticated through more than one required security and validation procedure. It works by
requiring two or more of the following authentication methods:
• Something you know (typically a password)
• Something you have (a trusted device that is not easily duplicated, like a phone)
• Something you are (biometrics)
3.2 What actions do I need to take to implement a multi-factor
authentication (MFA) solution?
Cloud Solution Provider (CSP) partners and control panel vendors (CPV) need to adopt a Multi-
Factor Authentication (MFA) solution before effective date February 4, 2019. The MFA solution
must be compatible with Azure Active Directory (AAD). The following actions are required:
Partner scenarios Actions required
Partners using Partner Center
APIs or Dashboard
(Indirect providers, direct bill
partners or resellers)
• Implement a MFA solution to access Partner Center
APIs or Dashboard
Control panel vendors (CPV)
integrating with Partner
Center APIs
• Implement a MFA solution to access Partner Center
APIs or Sandbox Dashboard
Partners using control panel
vendor solutions
• Implement a MFA solution to access Partner Center
APIs or Dashboard
3.3 When do I need to implement a Multi-Factor Authentication (MFA)
solution?
Partners must complete this action by the effective date, February 4, 2019.
Page 6
New Security Requirements for the CSP program
3.4 I use multiple tenants to transact, do I need to implement a Multi-
Factor Authentication (MFA) solution on them all?
Yes. A Multi-Factor Authentication (MFA) solution must be implemented on all active Cloud
Solution Provider (CSP) tenants a partner uses.
3.5 If my company transacts through the CSP program in multiple
countries, how will implementing a Multi-Factor Authentication
(MFA) solution work?
A Multi-Factor Authentication (MFA) solution must be implemented on all active Cloud Solution
Provider (CSP) tenants a partner uses.
3.6 I am a Direct Bill partner with Microsoft. Do I still have to do this?
Yes. Direct Bill Cloud Solution Provider (CSP) partners need to implement a Multi-Factor
Authentication (MFA) solution before the effective date, February 4, 2019.
3.7 I am an Indirect Reseller and only transact though a distributor. Do I
still have to do this?
For Cloud Solution Provider (CSP) partners transacting through a distributor, the distributor is
responsible for implementing a Multi-Factor Authentication (MFA) solution.  All partners who
access Partner Center Dashboard themselves must implement a MFA solution.
3.8 Should I use or purchase Microsoft Azure Active Directory (AAD)
premium?
Microsoft allows you to choose among the various Multi-Factor Authentication (MFA) solutions
available on the market to best fit your business needs.  Partners can choose any MFA solutions
that are compatible with Azure Active Directory (AAD). Microsoft Azure Active Directory (AAD)
premium is one of several options available which provide advanced Multi-Factor Authentication
(MFA) capabilities.
3.9 Which vendors provide Multi-Factor Authentication (MFA) solutions
compatible with Microsoft Azure Active Directory (AAD).
There are many independent reviews of MFA solutions online, such as Gartner. When reviewing
MFA vendors and solutions, partners must ensure the solution they choose is compatible with
Azure Active Directory (AAD).
Page 7
New Security Requirements for the CSP program
3.10 I already have implemented a Multi-Factor Authentication (MFA)
solution in our environment, what should I do?
Partners should check their Multi-Factor Authentication (MFA) solution is supported by
Microsoft Azure Active Directory (AAD).

More Related Content

Similar to super affiliate generating Big commissions with onlinecasino affiliate programs

Salesforce Release in a box - Winter 19
Salesforce Release in a box - Winter 19Salesforce Release in a box - Winter 19
Salesforce Release in a box - Winter 19
Antonina Romanova
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
dewhirstichabod
 
You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems
walthamcoretta
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
simongreaves
 
Moving Apps to Cloud
Moving Apps to CloudMoving Apps to Cloud
Moving Apps to Cloud
Kamalakar Devaki
 
CloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.comCloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.com
Alistair Croll
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
William McBorrough
 
ISV Lightning Webinar Series - Part 2 (December 8, 2015)
ISV Lightning Webinar Series - Part 2 (December 8, 2015)ISV Lightning Webinar Series - Part 2 (December 8, 2015)
ISV Lightning Webinar Series - Part 2 (December 8, 2015)
Salesforce Partners
 
E commerce Testing
E commerce TestingE commerce Testing
E commerce Testing
Atul Pant
 
The forrester wave™ endpoint security software as a service, q2 2021
The forrester wave™  endpoint security software as a service, q2 2021The forrester wave™  endpoint security software as a service, q2 2021
The forrester wave™ endpoint security software as a service, q2 2021
Andy Kwong
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The Cloud
Peter Coffee
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
Symantec
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
lucydavidson
 
ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)
Salesforce Partners
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Dreamforce
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Happiest Minds Technologies
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
IJMER
 

Similar to super affiliate generating Big commissions with onlinecasino affiliate programs (20)

Salesforce Release in a box - Winter 19
Salesforce Release in a box - Winter 19Salesforce Release in a box - Winter 19
Salesforce Release in a box - Winter 19
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Jon shende fbcs citp q&a
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
 
Moving Apps to Cloud
Moving Apps to CloudMoving Apps to Cloud
Moving Apps to Cloud
 
CloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.comCloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.com
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
ISV Lightning Webinar Series - Part 2 (December 8, 2015)
ISV Lightning Webinar Series - Part 2 (December 8, 2015)ISV Lightning Webinar Series - Part 2 (December 8, 2015)
ISV Lightning Webinar Series - Part 2 (December 8, 2015)
 
E commerce Testing
E commerce TestingE commerce Testing
E commerce Testing
 
The forrester wave™ endpoint security software as a service, q2 2021
The forrester wave™  endpoint security software as a service, q2 2021The forrester wave™  endpoint security software as a service, q2 2021
The forrester wave™ endpoint security software as a service, q2 2021
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The Cloud
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 

Recently uploaded

Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
HajeJanKamps
 
list of states and organizations .pdf
list of  states  and  organizations .pdflist of  states  and  organizations .pdf
list of states and organizations .pdf
Rbc Rbcua
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
JoeYangGreatMachiner
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Stone Art Hub
 
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineEllen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
CIOWomenMagazine
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
ZevinAttisha
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
➑➌➋➑➒➎➑➑➊➍
 
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium PresentationKirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip
 
Science Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around UsScience Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around Us
PennapaKeavsiri
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
APCO
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
Arijit Dutta
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
taqyea
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
dpbossdpboss69
 
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Niswey
 

Recently uploaded (20)

Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
 
list of states and organizations .pdf
list of  states  and  organizations .pdflist of  states  and  organizations .pdf
list of states and organizations .pdf
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
 
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineEllen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
 
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium PresentationKirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
 
Science Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around UsScience Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around Us
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
 
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
 

super affiliate generating Big commissions with onlinecasino affiliate programs

  • 1. Frequently Asked Questions (FAQ) New Security Requirements for the Cloud Solution Provider (CSP) program
  • 2. Frequently Asked Questions (FAQs) The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Revision Sheet Change Record Date Author Version Change Reference
  • 3. Page 1 New Security Requirements for the CSP program Table of Contents 1 Introduction............................................................................................................................................ 2 1.1 Why is Microsoft implementing these new requirements?.............................................................................2 1.2 Our company already applied industry best practices to keep our system secure. Why should I implement these requirements?................................................................................................................................................2 1.3 What will happen if I do not take any actions?....................................................................................................3 1.4 How do I join the Partner Center security guidance Yammer?......................................................................3 2 Secure Application Model FAQs...................................................................................................... 3 2.1 What is the new secure application model? .........................................................................................................3 2.2 What actions do I need to take to implement a secure applications model? .........................................3 2.3 When do I need to implement a secure applications model? .......................................................................4 2.4 Who is a control panel vendor (CPV)?.....................................................................................................................4 2.5 How do I know if my control panel vendor (CPV) is working on implementing the solution or not? 4 3 Multi-Factor Authentication (MFA) FAQs..................................................................................... 5 3.1 What is Multi-Factor Authentication (MFA)? ........................................................................................................5 3.2 What actions do I need to take to implement a multi-factor authentication (MFA) solution? ........5 3.3 When do I need to implement a Multi-Factor Authentication (MFA) solution?.....................................5 3.4 I use multiple tenants to transact, do I need to implement a Multi-Factor Authentication (MFA) solution on them all? .....................................................................................................................................................................6 3.5 If my company transacts through the CSP program in multiple countries, how will implementing a Multi-Factor Authentication (MFA) solution work?........................................................................................................6 3.6 I am a Direct Bill partner with Microsoft. Do I still have to do this? ............................................................6 3.7 I am an Indirect Reseller and only transact though a distributor. Do I still have to do this? ............6 3.8 Should I use or purchase Microsoft Azure Active Directory (AAD) premium?........................................6 3.9 Which vendors provide Multi-Factor Authentication (MFA) solutions compatible with Microsoft Azure Active Directory (AAD). ....................................................................................................................................................6 3.10 I already have implemented a Multi-Factor Authentication (MFA) solution in our environment, what should I do?............................................................................................................................................................................7
  • 4. Page 2 New Security Requirements for the CSP program 1 Introduction Cybersecurity is the central challenge of our digital age. Microsoft is committed to providing a trusted set of cloud services and platforms. We invest heavily in our technology, people, and processes to help ensure that customers’ as well as partners’ data is private and protected from unauthorized access, both internally and externally. 1.1 Why is Microsoft implementing these new requirements? Microsoft is committed to providing a trusted set of cloud services and platforms. We have noticed an increasing number of security breaches and fraud incidents in the industry. As our Cloud Solution Provider program ecosystem grows, we are extending our security best practices to our partner ecosystem, and introducing new mandatory security requirements that help protect our partners in the CSP program ecosystem as well as customers from unexpected security risks and financial damages caused by unauthorized access. The new mandatory security requirements include: 1. Enabling a new secure application model to integrate with Partner Center APIs. Effective date starts December 11, 2018. 2. Adopting and enabling Multi-Factor Authentication (MFA) to access Partner Center API and Partner Center Dashboard. Enforcement date begins February 4, 2019. Enabling a new security model will allow partners transacting in the CSP program to activate a more secure access to Partner Center APIs with enhanced identity protection features. This secure application model helps partners to further secure credentials and reduce the potential financial and branding damages caused by unauthorized access. These requirements empowers all parties, including partners in the CSP program as well as control panel vendors (CPV), to protect their infrastructure as well as customer data from unauthorized access and unintended security risks such as identify theft or other fraud incidents. 1.2 Our company already applied industry best practices to keep our system secure. Why should I implement these requirements? CSP partners must meet these requirements before the effective dates. Microsoft is committed to providing a trusted set of cloud services and platforms. As our Cloud Solution Provider (CSP) program grows, we are extending our security best practices and features available on Microsoft Partner Center to our partner ecosystem.
  • 5. Page 3 New Security Requirements for the CSP program 1.3 What will happen if I do not take any actions? Failure in implementing these changes may impact partner’s ability to transact through the Cloud Solution Provider (CSP) program via Partner Center API and Partner Center Dashboard. 1.4 How do I join the Partner Center security guidance Yammer? A Partner Center security guidance Yammer group is available for discussion on the technical requirements of these new security requirements. To join, users must follow the steps below: 1. Join the open network. 2. Join either the CSP Yammer Partner Community (for direct bill partners) or the CSP Indirect Partner Group (for indirect partners). 3. Request to join the Partner Center security guidance Yammer group. 2 Secure Application Model FAQs 2.1 What is the new secure application model? Microsoft is introducing a secure, scalable framework for authenticating Cloud Solution Provider (CSP) partners and control panel vendors (CPV) through the Microsoft Azure multi-factor authentication (MFA) architecture. CSP partners and CPVs can rely on the new secure application model to elevate security for Partner Center API integration. Further detail is available within the secure application model guide. 2.2 What actions do I need to take to implement a secure applications model? Cloud Solution Provider (CSP) partners and control panel vendors (CPV) need to apply the new secure application model before effective date December 11, 2018. The following actions are required: Partner scenarios Actions required Partners using Partner Center APIs directly (Indirect providers or direct bill partners) • Start implementing this requirement immediately. Refer to the Partner Center: secure applications model guide.
  • 6. Page 4 New Security Requirements for the CSP program Control panel vendors (CPV) integrating with Partner Center APIs • On-board to Partner Center as a control panel vendor. On-boarding tooling and process will be ready by early December. More information to come. o Start implementing this requirement immediately. Refer to the Partner Center: secure applications model guide. o Accept and manage CSP partners’ consent instead of credentials o Purge all existing CSP partners’ credentials Partners using control panel vendor solutions • Consult with your control panel providers to adopt the new security application model. 2.3 When do I need to implement a secure applications model? Partners must complete this action by the effective date, December 11, 2018. 2.4 Who is a control panel vendor (CPV)? A Control Panel vendor is an independent software vendor that develops apps for use by CSP Partners to integrate with Partner Center APIs. A Control Panel vendor is not a CSP Partner with direct access to Partner Center dashboard or APIs. A detailed description is available within the Partner Center: secure application model guide. 2.5 How do I know if my control panel vendor (CPV) is working on implementing the solution or not? For partners using a control panel vendor (CPV) solution to transact in the Cloud Solution Provider (CSP) program, it is your responsibility to consult with your CPV to meet this requirement.
  • 7. Page 5 New Security Requirements for the CSP program 3 Multi-Factor Authentication (MFA) FAQs 3.1 What is Multi-Factor Authentication (MFA)? Multi-Factor Authentication (MFA) is a security mechanism in which individuals are authenticated through more than one required security and validation procedure. It works by requiring two or more of the following authentication methods: • Something you know (typically a password) • Something you have (a trusted device that is not easily duplicated, like a phone) • Something you are (biometrics) 3.2 What actions do I need to take to implement a multi-factor authentication (MFA) solution? Cloud Solution Provider (CSP) partners and control panel vendors (CPV) need to adopt a Multi- Factor Authentication (MFA) solution before effective date February 4, 2019. The MFA solution must be compatible with Azure Active Directory (AAD). The following actions are required: Partner scenarios Actions required Partners using Partner Center APIs or Dashboard (Indirect providers, direct bill partners or resellers) • Implement a MFA solution to access Partner Center APIs or Dashboard Control panel vendors (CPV) integrating with Partner Center APIs • Implement a MFA solution to access Partner Center APIs or Sandbox Dashboard Partners using control panel vendor solutions • Implement a MFA solution to access Partner Center APIs or Dashboard 3.3 When do I need to implement a Multi-Factor Authentication (MFA) solution? Partners must complete this action by the effective date, February 4, 2019.
  • 8. Page 6 New Security Requirements for the CSP program 3.4 I use multiple tenants to transact, do I need to implement a Multi- Factor Authentication (MFA) solution on them all? Yes. A Multi-Factor Authentication (MFA) solution must be implemented on all active Cloud Solution Provider (CSP) tenants a partner uses. 3.5 If my company transacts through the CSP program in multiple countries, how will implementing a Multi-Factor Authentication (MFA) solution work? A Multi-Factor Authentication (MFA) solution must be implemented on all active Cloud Solution Provider (CSP) tenants a partner uses. 3.6 I am a Direct Bill partner with Microsoft. Do I still have to do this? Yes. Direct Bill Cloud Solution Provider (CSP) partners need to implement a Multi-Factor Authentication (MFA) solution before the effective date, February 4, 2019. 3.7 I am an Indirect Reseller and only transact though a distributor. Do I still have to do this? For Cloud Solution Provider (CSP) partners transacting through a distributor, the distributor is responsible for implementing a Multi-Factor Authentication (MFA) solution.  All partners who access Partner Center Dashboard themselves must implement a MFA solution. 3.8 Should I use or purchase Microsoft Azure Active Directory (AAD) premium? Microsoft allows you to choose among the various Multi-Factor Authentication (MFA) solutions available on the market to best fit your business needs.  Partners can choose any MFA solutions that are compatible with Azure Active Directory (AAD). Microsoft Azure Active Directory (AAD) premium is one of several options available which provide advanced Multi-Factor Authentication (MFA) capabilities. 3.9 Which vendors provide Multi-Factor Authentication (MFA) solutions compatible with Microsoft Azure Active Directory (AAD). There are many independent reviews of MFA solutions online, such as Gartner. When reviewing MFA vendors and solutions, partners must ensure the solution they choose is compatible with Azure Active Directory (AAD).
  • 9. Page 7 New Security Requirements for the CSP program 3.10 I already have implemented a Multi-Factor Authentication (MFA) solution in our environment, what should I do? Partners should check their Multi-Factor Authentication (MFA) solution is supported by Microsoft Azure Active Directory (AAD).