Consent phishing is a growing attack vector
Attackers register malicious applications that request broad OAuth permissions. When a user clicks "Accept," the attacker gains persistent API access to that user's email, files, and directory data.
OAuth consent grant attacks are one of the most common ways attackers gain persistent access to Microsoft 365 data. The Entra OAuth Consent Auditor scans your tenant for risky, overprivileged, or illicit OAuth grants and flags the ones that need investigation.
Why it matters
Attackers register malicious applications that request broad OAuth permissions. When a user clicks "Accept," the attacker gains persistent API access to that user's email, files, and directory data.
Legitimate applications often request more permissions than they need, or retain permissions after their purpose has ended. Each one is an expanded attack surface if the app or its credentials are compromised.
Admin consent grants apply tenant-wide and give applications access to all users' data. A single overly broad admin consent can expose the entire organization.
The built-in Entra admin center does not provide a consolidated view of consent grants, risk levels, or permission scope across all applications. This tool surfaces what the native UI obscures.
Built with
FAQ
Built by Orygn
Orygn builds custom software, security tooling, and identity-focused systems. This tool is part of a broader set of open-source Entra ID security utilities for tenant hygiene and threat detection.
View on GitHub