The OAuth Token Flow
- Using a client browser or app the user navigates to an application protected by Azure AD Authentication.
- The App redirects them to Azure AD to complete authentication.
- The user supplies their credential and/or multi-factor authentication.
- Azure AD issues tokens and they are stored within the client.
- The browser or application presents these tokens to access the application.
The Pass-the-cookie attack
~ At some point the user’s device has been compromised.
- The attacker readers and copies the issued tokens.
- The attacker replays these tokens to access the resource as the user.
Note that Pass-the-cookie attacks can occur against any online authentication broker and are not limited to Azure AD.