You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/active-directory-ops-guide-auth.md
+16-8Lines changed: 16 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -287,28 +287,36 @@ If legacy authentication is widely used in your environment, you should plan to
287
287
288
288
### Consent grants
289
289
290
-
In an illicit consent grant attack, the attacker creates an Azure AD-registered application that requests access to data such as contact information, email, or documents. Users might be granting consent to malicious applications via phishing attacks, or indirectly by not being careful when landing on malicious websites.
290
+
In an illicit consent grant attack, the attacker creates an Azure AD-registered application that requests access to data such as contact information, email, or documents. Users might be granting consent to malicious applications via phishing attacks when landing on malicious websites.
291
291
292
-
Below are the permissions you might want to scrutinize for Microsoft cloud services:
292
+
Below are a list of apps with permissions you might want to scrutinize for Microsoft cloud services:
293
293
294
-
-Applications with app or delegated \*.ReadWrite Permissions
295
-
-Applications with delegated permissions can read, send, or manage email on behalf of the user
296
-
-Applications that are granted the using the following permissions:
294
+
-Apps with app or delegated \*.ReadWrite Permissions
295
+
-Apps with delegated permissions can read, send, or manage email on behalf of the user
296
+
-Apps that are granted the using the following permissions:
To avoid this scenario, you should refer to [Detect and Remediate Illicit Consent Grants in Office 365](https://docs.microsoft.com/office365/securitycompliance/detect-and-remediate-illicit-consent-grants) to identify and fix any applications with illicit grants or applications that have more grants than are necessary. Schedule regular reviews of app permissions and remove them when not needed; or remove self-service altogether and establish governance procedures.
307
+
- Apps granted full user impersonation of the signed-in user. For example:
308
+
309
+
|Resource | Permission |
310
+
| :- | :- |
311
+
| Azure AD Graph | Directory.AccessAsUser.All |
312
+
| Microsoft Graph | Directory.AccessAsUser.All |
313
+
| Azure REST API | user_impersonation |
314
+
315
+
To avoid this scenario, you should refer to [detect and remediate illicit consent grants in Office 365](https://docs.microsoft.com/office365/securitycompliance/detect-and-remediate-illicit-consent-grants) to identify and fix any applications with illicit grants or applications that have more grants than are necessary. Next, [remove self-service altogether](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-user-consent) and [establish governance procedures](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-admin-consent-workflow). Finally, schedule regular reviews of app permissions and remove them when they are not needed.
308
316
309
317
#### Consent grants recommended reading
310
318
311
-
-[Azure Active Directory (AD) Graph API Permission Scopes](https://msdn.microsoft.com/library/azure/ad/graph/howto/azure-ad-graph-api-permission-scopes)
0 commit comments