graph-blog | A simple blog , powered by a graph DB
kandi X-RAY | graph-blog Summary
kandi X-RAY | graph-blog Summary
A simple blog, powered by a graph DB
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Convert to array
- Get all post extended .
- Format the post extended table .
- Sets the categories .
- Dispatches the home page .
- Convert to array
- Get posts .
- Get a post by its slug
- Create from stdClass object .
graph-blog Key Features
graph-blog Examples and Code Snippets
Community Discussions
Trending Discussions on graph-blog
QUESTION
My organization is taking a look at the security of registered applications within Azure Active Directory (AAD) and have concerns around the ability of individuals to add client secrets and certificates for applications that are using the "application permissions" model. I'm working to help narrow the roles of individuals within the organization to restrict this, but this investigation begged the question of what a malicious insider could do if he or she could add a client secret to this application.
I've looked through the 30 Days of Microsoft Graph blog series, which is excellent, but wanted to clarify what else can be done to prevent an insider from gaining access to the permissions this application would allow.
Does the redirect URL itself protect against this kind of scenario, provided the organization retains control of all registered URLs (meaning, for example, that https://localhost isn't registered)? Based on this post under Step 3, I assume the answer is yes but wanted to make sure this is the case.
Is it technically correct to say that without the redirect URL being secured/owned by the organization, a malicious insider who could add client secrets could exploit the permissions granted by the application?
...ANSWER
Answered 2019-May-14 at 13:14If you are able to add a client secret to an app that already has been granted application permissions to something, then this user can use the new secret to get tokens and access those resources as the app.
Redirect URL is not used with application permissions, only delegated permissions. This is because there are no redirects in the client credentials grant flow, which is used when acquiring a token with app permissions. It's just an HTTP request.
So you are correct in your assumption that being able to add a new secret to an app that already has permissions can be a security issue. There are audit logs though, and I believe adding a secret/certificate is logged.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install graph-blog
PHP requires the Visual C runtime (CRT). The Microsoft Visual C++ Redistributable for Visual Studio 2019 is suitable for all these PHP versions, see visualstudio.microsoft.com. You MUST download the x86 CRT for PHP x86 builds and the x64 CRT for PHP x64 builds. The CRT installer supports the /quiet and /norestart command-line switches, so you can also script it.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page