Protecting Against Credential and Token Theft

Protecting Against Credential and Token Theft

John Savill's Technical Training via YouTube Direct link

- Session Key

10 of 25

10 of 25

- Session Key

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Protecting Against Credential and Token Theft

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction
  2. 2 - Credential protection
  3. 3 - Authentication strengths
  4. 4 - Protection for strong authentication method registration
  5. 5 - Additional protections
  6. 6 - Shift to token theft
  7. 7 - Tokens we get
  8. 8 - Secrets on the machine
  9. 9 - Primary Refresh Token
  10. 10 - Session Key
  11. 11 - Refresh and Access Tokens
  12. 12 - Token theft
  13. 13 - Protections
  14. 14 - Entra Internet Access
  15. 15 - Machine management
  16. 16 - Token binding
  17. 17 - Proof of Possession
  18. 18 - Token brokers and MSAL
  19. 19 - Requiring token binding
  20. 20 - Demonstrated Proof of Possession standard
  21. 21 - Detection
  22. 22 - Continuous Access Evaluation
  23. 23 - Identity Protection
  24. 24 - Summary
  25. 25 - Close

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.