Главная
Study mode:
on
1
- Introduction
2
- Credential protection
3
- Authentication strengths
4
- Protection for strong authentication method registration
5
- Additional protections
6
- Shift to token theft
7
- Tokens we get
8
- Secrets on the machine
9
- Primary Refresh Token
10
- Session Key
11
- Refresh and Access Tokens
12
- Token theft
13
- Protections
14
- Entra Internet Access
15
- Machine management
16
- Token binding
17
- Proof of Possession
18
- Token brokers and MSAL
19
- Requiring token binding
20
- Demonstrated Proof of Possession standard
21
- Detection
22
- Continuous Access Evaluation
23
- Identity Protection
24
- Summary
25
- Close
Description:
Explore credential and token theft protection strategies in this comprehensive 53-minute video tutorial. Learn about various authentication strengths, registration protection methods, and additional safeguards. Dive into the world of token theft, understanding different types of tokens and secrets stored on machines. Discover key protection mechanisms like Entra Internet Access, machine management, token binding, and Proof of Possession. Gain insights into token brokers, MSAL, and the Demonstrated Proof of Possession standard. Explore detection techniques, Continuous Access Evaluation, and Identity Protection. Master essential concepts to enhance your organization's security posture against credential and token theft threats.

Protecting Against Credential and Token Theft

John Savill's Technical Training
Add to list