Abusing Entra OAuth for fun and access to internal Microsoft applications

Microsoft security culture and risk aggregation

  • Many commenters see the incident as part of a broader pattern: rushed “make it work” engineering, legacy assumptions about “internal” apps, and later bolted‑on “Zero Trust” leading to brittle stacks.
  • There is strong concern about Microsoft’s role as a central identity/infrastructure provider (Microsoft Accounts, OneDrive, LinkedIn, OpenAI hosting) and the potential for large‑scale deanonymization or state‑level abuse.
  • Several comments mock recent AI‑heavy messaging, suggesting AI is being used both as a crutch for poor engineering and as plausible deniability for mistakes.

Cloud, Zero Trust, VPNs, and defense‑in‑depth

  • One camp argues this is exactly what happens when everything “internal” is exposed to the internet under a Zero Trust paradigm; they question why internal build and tooling apps were ever publicly reachable.
  • Others reply that classic VPN/intranet models are also dangerous: once inside, lateral movement is easy, so relying on the network boundary is fragile.
  • There’s a strong thread arguing for “defense in depth”: VPN or IP allow‑listing plus strict per‑app auth, rather than replacing one with the other.
  • Some warn that VPNs can create complacency (“it’s inside, so it’s safe”) and introduce their own high‑value attack surface, while also being operationally painful.

Entra/OAuth, multi‑tenancy, and authN/authZ pitfalls

  • The core technical criticism: Entra’s multi‑tenant model and token semantics are complex enough that even internal Microsoft teams skipped validating key claims (issuer, tenant, subject), effectively accepting any token that “looked right.”
  • A former product owner clarifies Microsoft’s guidance: validate both tenant and subject (e.g., tid+oid), not just the tenant, and points to official claims‑validation docs. Others argue this should be enforced automatically, not left as “guidance.”
  • Several recommend treating every token as potentially forged: verify all relevant fields and cross‑check with internal identity data; clearly separate authentication (who you are) from authorization (what you can do).
  • Multi‑tenant design is viewed as inherently risky: mixing attackers and victims in the same identity fabric makes cross‑tenant authorization bugs catastrophic, whereas single‑tenant setups raise the bar for attackers.
  • Some advise using Entra only for authentication and doing all meaningful authorization in‑app.

Developer experience, configuration hazards, and docs

  • Entra/OAuth configuration is widely described as a “cluster” with confusing flows, inconsistent behavior around scopes, and poor discoverability of correct patterns.
  • Lack of simple tenant allow/deny lists for multi‑tenant apps forces awkward workarounds (inviting external users, custom whitelists).
  • Several note that this complexity makes it easy—even for experts—to misconfigure security.

Bug bounties and incentives

  • Commenters are outraged that such impactful findings apparently received $0, calling Microsoft’s bug bounty “a sham” and saying many serious issues are declared ineligible.
  • Some argue this disincentivizes responsible disclosure and ensures that only attackers—rather than bounty hunters—will invest deeply in Azure/Entra exploitation.