The Problem
The Open Authorization (OAuth) protocol enables application to application (i.e. machine identities) connectivity in SaaS environments. If the tokens involved in the authentication process become compromised, the risk of a supply-chain based attack increases significantly. Attackers can target these 3rd party OAuth applications to gain unauthorized access to business-critical data and resources.