What can I do to prevent my token from leaking and malicious operation during its validity period?

Alex Ren (Medalsoft) 41 Reputation points
2023-02-06T10:57:28.6066667+00:00
Microsoft Graph
Microsoft Graph
A Microsoft programmability model that exposes REST APIs and client libraries to access data on Microsoft 365 services.
13,028 questions
0 comments No comments
{count} votes

Accepted answer
  1. Vasil Michev 113.4K Reputation points MVP
    2023-02-06T14:35:06.8866667+00:00

    Can you control the entire environment, including client devices and network connectivity? If the answer is no - you cannot prevent potential token abuse. The best thing you can do is follow the best practices to secure your application, and potentially implement support for the Continuous access revocation feature.

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.