Attackers connect rogue devices to organizations’ network with stolen Office 365 credentials

Attackers are trying out a new technique to widen the reach of their phishing campaigns: by using stolen Office 365 credentials, they try to connect rogue Windows devices to the victim organizations’ network by registering it with their Azure AD…. Continue reading Attackers connect rogue devices to organizations’ network with stolen Office 365 credentials

Stateless session inactivity timeout using refreshToken and accessToken

I am developing a mobile and web application that need the user to re-authenticate if they have been idled for a specific duration.
The authentication flow is just a typical OAuth password grant type with a combination of JWT accessToken a… Continue reading Stateless session inactivity timeout using refreshToken and accessToken

Reverse-engineering the pin code authentication flow for mobile apps

I am developing a mobile application for financial usage. I want to make it as secure as the existing apps in the market. Many apps ask the user to enter a PIN code to unlock the app after period of time or when the user wants to perform s… Continue reading Reverse-engineering the pin code authentication flow for mobile apps

Would having two identity providers prevent the theoretical possibility of impersonation by an IdP?

I am slowly accepting that OAuth2 is quite amazing, but I’m still worried about the fact that an IdP could theoretically impersonate me as discussed in Can an identity provider impersonate me? (Can Facebook post Stack Overflow questions un… Continue reading Would having two identity providers prevent the theoretical possibility of impersonation by an IdP?

When using a cookie to header CSRF protection with JWTs, how to implement refresh tokens?

Scenario
I’m working in the oAuth flow for a new app, which is currently laid out like this

A React web App
A Rails backend
FusionAuth as an Authorization server

We are using the oAuth2.0 authorization code grant flow:
To login, the brow… Continue reading When using a cookie to header CSRF protection with JWTs, how to implement refresh tokens?