Listen to this Post
Slides from the talk are available here: Microsoft Entra Token & Session Cookie Security Slides
You Should Know:
Understanding Tokens and Session Cookies in Microsoft Entra
Microsoft Entra (formerly Azure AD) uses tokens and session cookies for authentication and authorization. Here’s a deep dive into securing them:
1. Types of Tokens in Microsoft Entra
- ID Tokens: Used for user authentication.
- Access Tokens: Grant permissions to access resources.
- Refresh Tokens: Used to obtain new access tokens without re-authentication.
2. Securing Session Cookies
Session cookies (ESTSAUTH
, ESTSAUTHPERSISTENT
) maintain user sessions. To enhance security:
– Enable HTTP-only and Secure flags:
Set-AzureADApplication -ObjectId <AppObjectId> -TokenEncryptionKeyId $null -IsFallbackPublicClient $false
– Implement Short-Lived Tokens:
New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"AccessTokenLifetime":"01:00:00"}}')
3. Detecting Token Theft
Use Microsoft Defender for Identity to detect anomalous token usage:
Get-AzureADAuditSignInLogs -Filter "createdDateTime gt 2023-10-01" | Where-Object {$_.RiskEventTypes -contains "LeakedCredentials"}
4. Mitigating Session Hijacking
- Rotate Signing Keys:
az rest --method POST --uri 'https://graph.microsoft.com/v1.0/application/applications/<appId>/microsoft.graph.rotateApplicationSigningKey'
- Revoke Sessions:
Revoke-AzureADUserAllRefreshToken -ObjectId <UserObjectId>
5. Linux Command for Token Analysis
Use `jq` to decode JWT tokens:
echo "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..." | cut -d '.' -f 2 | base64 -d | jq
6. Windows Command for Session Monitoring
Check active Entra sessions:
Get-AzureADUser -SearchString "[email protected]" | Get-AzureADUserLoggedOnDevice
What Undercode Say
Securing tokens and session cookies is critical in modern identity management. Implementing short-lived tokens, HTTPS enforcement, and session monitoring reduces attack surfaces. Automation via PowerShell and Azure CLI ensures consistent security policies.
Expected Output:
- Secure session cookies with HTTP-only flags.
- Monitor token usage via Azure AD logs.
- Revoke compromised sessions immediately.
Prediction
As identity attacks evolve, expect AI-driven anomaly detection in Microsoft Entra to become standard, reducing manual monitoring efforts.
Note: For full details, refer to the official Microsoft Entra documentation.
References:
Reported By: UgcPost 7330930117684191234 – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅