Completed
- Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Protecting Against Credential and Token Theft
Automatically move to the next video in the Classroom when playback concludes
- 1 - Introduction
- 2 - Credential protection
- 3 - Authentication strengths
- 4 - Protection for strong authentication method registration
- 5 - Additional protections
- 6 - Shift to token theft
- 7 - Tokens we get
- 8 - Secrets on the machine
- 9 - Primary Refresh Token
- 10 - Session Key
- 11 - Refresh and Access Tokens
- 12 - Token theft
- 13 - Protections
- 14 - Entra Internet Access
- 15 - Machine management
- 16 - Token binding
- 17 - Proof of Possession
- 18 - Token brokers and MSAL
- 19 - Requiring token binding
- 20 - Demonstrated Proof of Possession standard
- 21 - Detection
- 22 - Continuous Access Evaluation
- 23 - Identity Protection
- 24 - Summary
- 25 - Close