User login credentials
If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Start now at the Microsoft Purview compliance portal trials hub. Learn details about signing up and trial terms.
This SIT is also included in the All credentials bundled SIT.
A paired username and password used in general authentication process.
A paired username and password used in PuTTY connection manager.
Plain text password used in code snippets.
A combination of 88 characters consisting of letters, digits, and special characters.
Various username and password formats, for example:
An XML element <login> An embeded XML element <login> Inner XML content An embeded XML element </login> An embeded XML element <password> Inner XML content An embeded XML element </password> An XML element </login>
<login> <login>ZYXWVU_1</login> <password>ZY…
Various password formats in code snippets, for example:
ConvertTo-SecureString -String ********
password = "********"
"password" : "********"
A combination of 86 characters:
- a-z (not case-sensitive)
- forward slashes (/)
- or plus signs (+)
- ends with two equal signs (=)
SITs that have checksums use a unique calculation to check if the information is valid. This means when the Checksum value is Yes, the service can make a positive detection based on the sensitive data alone. When the Checksum value is No additional (secondary) elements must also be detected for the service to make a positive detection.
When keyword highlighting is supported in the contextual summary for a sensitive information type or a trainable classifier, in the Contextual Summary view of activity explorer, the keywords in a document that were matched to a policy are highlighted.
This SIT is designed to match the security information that's used in general user login process.
It uses several primary resources:
- Patterns of Plain-text username and password.
- Patterns of Plain-text username and password in PuTTYcm database file.
- Patterns of Password context in code.
- Patterns of Base64 encoded 512 bits symmetric key.
- Patterns of CredentialName, CredentialFeatures, AccountIdentityName, AccountIdentityValue, ResourceType, ResourceName, Id, AccountName.
- Patterns of mockup values, redactions, and placeholders.
- A dictionary of vocabulary.
The patterns are designed to match actual credentials with reasonable confidence. The patterns don't match credentials formatted as examples. Mockup values, redacted values, and placeholders, like credential type or usage descriptions, in the position where an actual secret value should present won't be matched.