Device code authentication abuse
What Is Device Code Authentication?

Attack
Parameter
Value
Detect
What logs are available?
Sign-In Logs:
What will Interactive Sign-In logs show?


What will Non-Interactive Sign-In logs show?


What will UAL logs show?



Mitigate
Last updated