Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
omniauth-microsoft_graph
Advanced tools
Microsoft Graph OAuth2 Strategy for OmniAuth. Can be used to authenticate with Office365 or other MS services, and get a token for the Microsoft Graph Api, formerly the Office365 Unified Api.
Add this line to your application's Gemfile:
gem 'omniauth-microsoft_graph'
And then execute:
$ bundle
Or install it yourself as:
$ gem install omniauth-microsoft_graph
Register a new app in the Azure Portal / App registrations to get the AZURE_APPLICATION_CLIENT_ID
and AZURE_APPLICATION_CLIENT_SECRET
below.
Rails.application.config.middleware.use OmniAuth::Builder do
provider :microsoft_graph, ENV['AZURE_APPLICATION_CLIENT_ID'], ENV['AZURE_APPLICATION_CLIENT_SECRET']
end
Just add {login_hint: "email@example.com"}
to your url generation to form:
/auth/microsoft_graph?login_hint=email@example.com
Because Microsoft allows users to set vanity emails on their accounts, the value of the user's "email" doesn't establish membership in that domain. Put another way, user malicious@hacker.biz can edit their email in Active Directory to ceo@yourcompany.com, and (depending on your auth implementation) may be able to log in automatically as that user.
To establish membership in the claimed email domain, we use two strategies:
email
domain matches userPrincipalName
domain (which by definition is a verified domain)id_token
includes the xms_edov
("Email Domain Ownership Verified") claim, with a truthy valueThe xms_edov
claim is optional, and must be configured in the Azure console before it's available in the token. Refer to Clerk's guide for instructions on configuring the claim.
If you're not able or don't need to support domain verification, you can bypass for an individual domain:
Rails.application.config.middleware.use OmniAuth::Builder do
provider :microsoft_graph,
ENV['AZURE_APPLICATION_CLIENT_ID'],
ENV['AZURE_APPLICATION_CLIENT_SECRET'],
skip_domain_verification: %w[contoso.com]
end
Or, you can disable domain verification entirely. We strongly recommend that you do not disable domain verification if at all possible.
Rails.application.config.middleware.use OmniAuth::Builder do
provider :microsoft_graph,
ENV['AZURE_APPLICATION_CLIENT_ID'],
ENV['AZURE_APPLICATION_CLIENT_SECRET'],
skip_domain_verification: true
end
nOAuth: How Microsoft OAuth Misconfiguration Can Lead to Full Account Takeover from Descope
This version requires OmniAuth v2. If you are using Rails, you will need to include or upgrade omniauth-rails_csrf_protection
. If you upgrade and get an error in your logs complaining about "authenticity error" or similiar, make sure to do bundle update omniauth-rails_csrf_protection
git checkout -b my-new-feature
)git commit -am 'Add some feature'
)git push origin my-new-feature
)FAQs
Unknown package
We found that omniauth-microsoft_graph demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.