Azure AD Moves to Block OAuth App Hijacking

The new Azure AD app property lock feature (in preview) prevents attackers updating the credentials for an Azure AD enterprise app so that they can get an access token and exploit the app's permissions. This technique has been used in several attacks, notably the infamous SolarWinds exploit in 2021. The app property lock is not mandatory and it's important to keep on checking the audit log to make sure that attackers don't creep into your tenant.
Published on:
Learn moreRelated posts
Building Event-Driven Go applications with Azure Cosmos DB and Azure Functions
The Go programming languageĀ is a great fit for building serverless applications. Go applications can be easily compiled to a single, staticall...
2 days ago
July Patches for Azure DevOps Server
Today we are releasing patches that impact the latest version of our self-hosted product, Azure DevOps Server. We strongly encourage and recom...
4 days ago
Azure SDK Release (June 2025)
Azure SDK releases every month. In this post, you'll find this month's highlights and release notes. The post Azure SDK Release (June 2025) ap...
11 days ago
Exploring azd extensions: Enhance your Azure developer experience
A deep dive into the introduction of the Azure Developer CLI (azd) extensions and the azd extension framework to build extensions. The post Ex...
13 days ago