
Summary
This rule aims to detect applications utilizing the Resource Owner Password Credentials (ROPC) authentication flow, which is considered risky due to its requirement for users to provide their passwords directly to applications. ROPC can expose user credentials to potential security threats, as the application has direct access to the user's password, making it susceptible to credential theft. This detection mechanism searches Azure Sign-in logs for any entries where the authentication method is identified as ROPC. It primarily targets user accounts that should ideally be authenticated through more secure methods, as ROPC should be avoided to enhance security posture. The false positive entries include legacy applications or automated testing environments that may still utilize ROPC due to their inability to adopt newer, more secure methods of authentication.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
Created: 2022-06-01