%3CLINGO-SUB%20id%3D%22lingo-sub-2094443%22%20slang%3D%22en-US%22%3ESecurity%20baseline%20for%20Microsoft%20Edge%2C%20version%2088%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2094443%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20pleased%20to%20announce%20the%20enterprise-ready%20release%20of%20the%20security%20baseline%20for%20Microsoft%20Edge%20version%2088!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20have%20reviewed%20the%20settings%20in%20Microsoft%20Edge%20version%2088%20and%20updated%20our%20guidance%20with%20the%20addition%20of%20one%20setting%20that%20we%20will%20explain%20below.%20A%20new%20Microsoft%20Edge%20security%20baseline%20package%20was%20just%20released%20to%20the%20Download%20Center.%20You%20can%20download%20the%20version%2088%20package%20from%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fdownload%2Fdetails.aspx%3Fid%3D55319%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESecurity%20Compliance%20Toolkit%3C%2FA%3E%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EBasic%20Authentication%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EHTTP%20Basic%20Authentication%20is%20a%20non-secure%20authentication%20method%20that%20relies%20on%20sending%20the%20username%20and%20password%20to%20the%20server%20in%20plaintext%20(base64).%20When%20Basic%20Authentication%20is%20used%20over%20non-secure%20HTTP%20connections%2C%20the%20credentials%20can%20be%20trivially%20stolen%20by%20others%20on%20the%20network.%3C%2FP%3E%0A%3CP%3EBasic%20Authentication%20for%20HTTP%20has%20been%20configurable%20since%20Internet%20Explorer%207.%20Until%20now%2C%20however%2C%20there%20wasn't%20a%20way%20to%20configure%20it%20for%20Microsoft%20Edge.%20With%20version%2088%20we%20now%20have%20that%20ability%20and%20are%20recommending%20the%20disablement%20of%20basic%20authentication%20over%20HTTP.%20Disabling%20Basic%20Authentication%20over%20HTTP%20falls%20in%20line%20with%20our%20other%20security%20baselines%20where%20we%20disable%20this%20method.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Edge%20version%2088%20introduced%2017%20new%20computer%20settings%20and%2017%20new%20user%20settings.%20We%20have%20included%20a%20spreadsheet%20listing%20the%20new%20settings%20in%20the%20release%20to%20make%20it%20easier%20for%20you%20to%20find%20them.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAs%20a%20friendly%20reminder%2C%20all%20available%20settings%20for%20Microsoft%20Edge%20are%20documented%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2FDeployEdge%2Fmicrosoft-edge-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E%2C%20and%20all%20available%20settings%20for%20Microsoft%20Edge%20Update%20are%20documented%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2FDeployEdge%2Fmicrosoft-edge-update-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPlease%20continue%20to%20give%20us%20feedback%20through%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Security-Baselines%2Fbd-p%2FSecurity-Baselines%22%20target%3D%22_blank%22%3ESecurity%20Baselines%20Discussion%20site%3C%2FA%3E%20or%20this%20post.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2094443%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Edge%20v88.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F249139i5D425F5642BA4A28%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Edge%20v88.png%22%20alt%3D%22Edge%20v88.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20pleased%20to%20announce%20the%20enterprise-ready%20release%20of%20the%20security%20baseline%20for%20Microsoft%20Edge%20version%2088!%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2097955%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%2C%20version%2088%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2097955%22%20slang%3D%22en-US%22%3E%3CP%3EI%20have%20been%20following%20the%20baselines%20and%20already%20have%20Basic%20authentication%20disabled%20with%20'Microsoft%20Edge%5CHTTP%20authentication%5CSupported%20Authentication%20schemes%3A%20Enabled%3A%20ntlm%2C%20negotiate'.%20It%20seems%20like%20the%20new%20recommended%20'Allow%20Basic%20authentication%20over%20HTTP'%20would%20not%20have%20an%20effect%20if%20Basic%20auth%20is%20already%20disabled.%20Would%20setting%20'disallow%20Basic%20over%20HTTP'%20make%20if%20feasible%20to%20add%20Basic%20auth%20back%20to%20the%20list%20of%20supported%20authentication%20schemes%3F%20We've%20had%20to%20make%20an%20exception%20group%20for%20embedded%20equipment%20that%20use%20Basic%2C%20and%20it%20seems%20that%20this%20would%20eliminate%20much%20of%20that%20need.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2098172%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%2C%20version%2088%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2098172%22%20slang%3D%22en-US%22%3E%3CP%3EI%20don't%20see%20the%20spreadsheet%20attached%2C%20can%20that%20be%20added%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2099575%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%2C%20version%2088%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2099575%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F943264%22%20target%3D%22_blank%22%3E%40MikeGnau%3C%2FA%3E%26nbsp%3Bthe%20spreadsheet%20is%20contained%20within%20the%20release%20that%20is%20posted%20on%20the%20Download%20Center%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2099657%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%2C%20version%2088%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2099657%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F943088%22%20target%3D%22_blank%22%3E%40GavinHW%3C%2FA%3E%26nbsp%3Bhad%20to%20consult%20with%20the%20PM%20on%20this%20one%20as%20I%20wasn't%20positive%20on%20the%20best%20answer%20for%20you...%26nbsp%3B%20Here%20is%20his%20response%3A%3C%2FP%3E%0A%3CDIV%3E%0A%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%3EIf%20you%20specify%20%22Supported%20authentication%20schemes%22%20without%20allowing%20Basic%2C%20then%20this%20new%20policy%20has%20no%20effect.%3C%2FDIV%3E%0A%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%3EIf%20you%20add%20basic%20back%20to%20%22Supported%20authentication%20schemes%22%2C%20you%20can%20then%20set%20%22Allow%20Basic%20authentication%20for%20HTTP%22%20to%20disabled%20to%20permit%20Basic%20for%20only%20HTTPS%20connections.%3C%2FDIV%3E%0A%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2104805%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%2C%20version%2088%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2104805%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F272514%22%20target%3D%22_blank%22%3E%40Rick_Munck%3C%2FA%3E%26nbsp%3BI%20wonder%20why%20Microsoft%20recommends%26nbsp%3Bremoving%26nbsp%3B%20basic%20authentication%20from%20the%26nbsp%3B%3CSPAN%3E%22Supported%20authentication%20schemes%22%26nbsp%3B%20%3C%2FSPAN%3Eas%20a%20default%20in%20the%20security%20baseline%20and%20then%20also%20disables%20it%20over%20http%20too%20when%2C%20as%20you%20said%2C%20removing%20it%20from%20the%26nbsp%3B%3CSPAN%3E%22Supported%20authentication%20schemes%22%20renders%20the%20http%20setting%20useless%20%3F%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EI%20guess%20this%20will%20confuse%20people%20and%20might%20make%20them%20believe%20that%20it's%20save%20to%20add%20basic%20authentication%26nbsp%3Bback%20into%20the%20%22Supported%20authentication%20schemes%22%20which%20it%20is%20not.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2105168%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%2C%20version%2088%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2105168%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3CBR%20%2F%3E%3CBR%20%2F%3EWhat%20is%20the%20point%20of%20setting%20Allow%20basic%20authentication%20for%20HTTP%20to%20Disabled%2C%20if%20it%20is%20not%20added%20in%20the%20supported%20authentication%20schemes%3F%20It%20will%20still%20not%20allow%20for%20Basic%20Authentication%20over%20HTTPS%20as%20far%20as%20I%20understand.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CTABLE%20width%3D%221103%22%3E%3CTBODY%3E%3CTR%3E%3CTD%20width%3D%22344%22%3EMicrosoft%20Edge%5CHTTP%20authentication%3C%2FTD%3E%3CTD%20width%3D%22511%22%3EAllow%20Basic%20authentication%20for%20HTTP%3C%2FTD%3E%3CTD%20width%3D%22248%22%3EDisabled%3C%2FTD%3E%3C%2FTR%3E%3CTR%3E%3CTD%3EMicrosoft%20Edge%5CHTTP%20authentication%3C%2FTD%3E%3CTD%3ESupported%20authentication%20schemes%3C%2FTD%3E%3CTD%3EEnabled%3A%20ntlm%2Cnegotiate%3C%2FTD%3E%3C%2FTR%3E%3C%2FTBODY%3E%3C%2FTABLE%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2106111%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%2C%20version%2088%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2106111%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F945594%22%20target%3D%22_blank%22%3E%40Old-School-Trancer%3C%2FA%3E%26nbsp%3Bas%20mentioned%20in%20the%20above%20response%20it%20gives%20greater%20control%20as%20there%20are%20certain%20cases%20where%20one%20might%20need%20to%20allow%20Basic%20but%20restrict%20it%20to%20HTTPS.%26nbsp%3B%20We%20have%20seen%20and%20gotten%20his%20request%20from%20multiple%20customers%20which%20was%20the%20reason%20for%20adding%20the%20ability.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F528494%22%20target%3D%22_blank%22%3E%40Richard_van_Nuland%3C%2FA%3E%26nbsp%3Bplease%20review%20the%20above%20response%20to%20GavinHW%2C%20there%20are%20certain%20scenarios%20where%20both%20settings%20are%20required%20to%20better%20control%20a%20need%20from%20certain%20user%20groups%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2107348%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%2C%20version%2088%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2107348%22%20slang%3D%22en-US%22%3E%3CP%3EIt%20appears%20that%20%22Allow%20Basic%20Auth%20over%20HTTP%22%20was%20added%20to%20the%20base%20Chromium%20build%2C%20so%20it%20will%20be%20supported%20cross%20browser.%20Now%20it%20will%20be%20a%20debate%20if%20we%20want%20to%20go%20off%20baseline%20to%20re-enable%20Basic%20but%20with%20the%20HTTPS%20req%20as%20a%20control%2Fmitigation.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20will%20say%2C%20I%20prefer%20the%20Firefox%20authentication%20policy.%20It%20allows%20you%20to%20control%20per%20authentication%20scheme%20per%20origin%2C%20which%20give%20good%20granularity.%20So%20you%20can%20set%20something%20along%20the%20lines%20of%20'only%20allow%20Basic%20auth%20to%20this%20domain%20or%20URL%20and%20block%20everywhere%20else'.%20The%20Chromium%20monolithic%20approach%20of%20a%20single%20authentication%20scheme%20list%20and%20a%20single%20kerberos%20delegation%20list%20can%20be%20limiting.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

 

We are pleased to announce the enterprise-ready release of the security baseline for Microsoft Edge version 88!

 

We have reviewed the settings in Microsoft Edge version 88 and updated our guidance with the addition of one setting that we will explain below. A new Microsoft Edge security baseline package was just released to the Download Center. You can download the version 88 package from the Security Compliance Toolkit.

 

Basic Authentication

HTTP Basic Authentication is a non-secure authentication method that relies on sending the username and password to the server in plaintext (base64). When Basic Authentication is used over non-secure HTTP connections, the credentials can be trivially stolen by others on the network.

Basic Authentication for HTTP has been configurable since Internet Explorer 7. Until now, however, there wasn't a way to configure it for Microsoft Edge. With version 88 we now have that ability and are recommending the disablement of basic authentication over HTTP. Disabling Basic Authentication over HTTP falls in line with our other security baselines where we disable this method.

 

Microsoft Edge version 88 introduced 17 new computer settings and 17 new user settings. We have included a spreadsheet listing the new settings in the release to make it easier for you to find them.

 

As a friendly reminder, all available settings for Microsoft Edge are documented here, and all available settings for Microsoft Edge Update are documented here.

 

Please continue to give us feedback through the Security Baselines Discussion site or this post.

 

8 Comments
Senior Member

I have been following the baselines and already have Basic authentication disabled with 'Microsoft Edge\HTTP authentication\Supported Authentication schemes: Enabled: ntlm, negotiate'. It seems like the new recommended 'Allow Basic authentication over HTTP' would not have an effect if Basic auth is already disabled. Would setting 'disallow Basic over HTTP' make if feasible to add Basic auth back to the list of supported authentication schemes? We've had to make an exception group for embedded equipment that use Basic, and it seems that this would eliminate much of that need.

Occasional Visitor

I don't see the spreadsheet attached, can that be added

Microsoft

@MikeGnau the spreadsheet is contained within the release that is posted on the Download Center

Microsoft

@GavinHW had to consult with the PM on this one as I wasn't positive on the best answer for you...  Here is his response:

 
If you specify "Supported authentication schemes" without allowing Basic, then this new policy has no effect.
 
If you add basic back to "Supported authentication schemes", you can then set "Allow Basic authentication for HTTP" to disabled to permit Basic for only HTTPS connections.
Occasional Visitor

@Rick_Munck I wonder why Microsoft recommends removing  basic authentication from the "Supported authentication schemes"  as a default in the security baseline and then also disables it over http too when, as you said, removing it from the "Supported authentication schemes" renders the http setting useless ?

I guess this will confuse people and might make them believe that it's save to add basic authentication back into the "Supported authentication schemes" which it is not.

Senior Member

Hi,

What is the point of setting Allow basic authentication for HTTP to Disabled, if it is not added in the supported authentication schemes? It will still not allow for Basic Authentication over HTTPS as far as I understand.

Microsoft Edge\HTTP authenticationAllow Basic authentication for HTTPDisabled
Microsoft Edge\HTTP authenticationSupported authentication schemesEnabled: ntlm,negotiate
Microsoft

@Old-School-Trancer as mentioned in the above response it gives greater control as there are certain cases where one might need to allow Basic but restrict it to HTTPS.  We have seen and gotten his request from multiple customers which was the reason for adding the ability.

 

@Richard_van_Nuland please review the above response to GavinHW, there are certain scenarios where both settings are required to better control a need from certain user groups

Senior Member

It appears that "Allow Basic Auth over HTTP" was added to the base Chromium build, so it will be supported cross browser. Now it will be a debate if we want to go off baseline to re-enable Basic but with the HTTPS req as a control/mitigation.

 

I will say, I prefer the Firefox authentication policy. It allows you to control per authentication scheme per origin, which give good granularity. So you can set something along the lines of 'only allow Basic auth to this domain or URL and block everywhere else'. The Chromium monolithic approach of a single authentication scheme list and a single kerberos delegation list can be limiting.