Forum Discussion
TomWechsler
Feb 28, 2021MVP
Protecting your Identities from attacks like consent phishing
Hi Cloud Friends,
Today, developers build apps by integrating user and enterprise data from cloud platforms to enhance and personalize experiences. These cloud platforms are rich in data, b...
Anu_11
Oct 14, 2022Copper Contributor
If we totally block the users consent to apps, users can't install even the quality applications. So, it better to enable the Admin consent workflow to securely approve the app consent requests.
Useful, right?
Also, we can review the existing application permissions in our O365 and remove the malicious applications immediately.
- It_fanaticAug 21, 2023Copper Contributor
Anu_11 exactly my thoughts.
We enabled the option that apps of verified vendors can be consented to with uncritical permissions. For all others they have to go through the workflow process.