Skip to content

Commit bd486e4

Browse files
authored
Merge pull request #98242 from martincoetzer/patch-7
Update active-directory-ops-guide-auth.md
2 parents e8c90e3 + 5150ad7 commit bd486e4

File tree

1 file changed

+16
-8
lines changed

1 file changed

+16
-8
lines changed

articles/active-directory/fundamentals/active-directory-ops-guide-auth.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -287,28 +287,36 @@ If legacy authentication is widely used in your environment, you should plan to
287287

288288
### Consent grants
289289

290-
In an illicit consent grant attack, the attacker creates an Azure AD-registered application that requests access to data such as contact information, email, or documents. Users might be granting consent to malicious applications via phishing attacks, or indirectly by not being careful when landing on malicious websites.
290+
In an illicit consent grant attack, the attacker creates an Azure AD-registered application that requests access to data such as contact information, email, or documents. Users might be granting consent to malicious applications via phishing attacks when landing on malicious websites.
291291

292-
Below are the permissions you might want to scrutinize for Microsoft cloud services:
292+
Below are a list of apps with permissions you might want to scrutinize for Microsoft cloud services:
293293

294-
- Applications with app or delegated \*.ReadWrite Permissions
295-
- Applications with delegated permissions can read, send, or manage email on behalf of the user
296-
- Applications that are granted the using the following permissions:
294+
- Apps with app or delegated \*.ReadWrite Permissions
295+
- Apps with delegated permissions can read, send, or manage email on behalf of the user
296+
- Apps that are granted the using the following permissions:
297297

298298
| Resource | Permission |
299-
| -------------------------- | -------------------- |
299+
| :- | :- |
300300
| Office 365 Exchange Online | EAS.AccessAsUser.All |
301301
| | EWS.AccessAsUser.All |
302302
| | Mail.Read |
303303
| Microsoft Graph | Mail.Read |
304304
| | Mail.Read.Shared |
305305
| | Mail.ReadWrite |
306306

307-
To avoid this scenario, you should refer to [Detect and Remediate Illicit Consent Grants in Office 365](https://docs.microsoft.com/office365/securitycompliance/detect-and-remediate-illicit-consent-grants) to identify and fix any applications with illicit grants or applications that have more grants than are necessary. Schedule regular reviews of app permissions and remove them when not needed; or remove self-service altogether and establish governance procedures.
307+
- Apps granted full user impersonation of the signed-in user. For example:
308+
309+
|Resource | Permission |
310+
| :- | :- |
311+
| Azure AD Graph | Directory.AccessAsUser.All |
312+
| Microsoft Graph | Directory.AccessAsUser.All |
313+
| Azure REST API | user_impersonation |
314+
315+
To avoid this scenario, you should refer to [detect and remediate illicit consent grants in Office 365](https://docs.microsoft.com/office365/securitycompliance/detect-and-remediate-illicit-consent-grants) to identify and fix any applications with illicit grants or applications that have more grants than are necessary. Next, [remove self-service altogether](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-user-consent) and [establish governance procedures](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-admin-consent-workflow). Finally, schedule regular reviews of app permissions and remove them when they are not needed.
308316

309317
#### Consent grants recommended reading
310318

311-
- [Azure Active Directory (AD) Graph API Permission Scopes](https://msdn.microsoft.com/library/azure/ad/graph/howto/azure-ad-graph-api-permission-scopes)
319+
- [Microsoft Graph permissions](https://docs.microsoft.com/graph/permissions-reference)
312320

313321
### User and group settings
314322

0 commit comments

Comments
 (0)