HomeVulnerabilityHow you can configure OAuth in Microsoft 365 Defender and hold your...

How you can configure OAuth in Microsoft 365 Defender and hold your cloud safe

Cloud authentication offers so many benefits in enterprise. It could actually enable your customers to seamlessly authenticate between functions, it’s cost-efficient, and it’s scalable, and it provides nice security choices. However as with something that’s good on this line of labor, it has the potential to be abused.

One instance of that is Open Authorization (OAuth) know-how, an open-standard protocol designed to permit third-party functions to entry person data with out sharing the person’s credentials, corresponding to passwords. It permits customers to grant restricted entry to assets from one website to a different with out exposing login data.

When used for good, it permits customers to make persistent connections. When used for evil, it could enable malicious actors to achieve a foothold on a community, even an on-premises location.

See also  Infostealers are utilizing BYOVD to steal important system knowledge
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular