Identity // Tokens, Federation and Tenant Trust

Identity, Entra, Okta and SSO Abuse

Identity has become its own offensive domain. Modern estates route privilege through tokens, federation, consent, tenant configuration and automated provisioning just as much as through passwords. If the identity layer is weak, everything that trusts it becomes soft in exactly the places where defenders thought they had centralised control.

domain huboperator referencepublic sources

Domain overview

This domain focuses on Entra ID, Okta, SSO and SaaS-connected trust. It covers token theft, refresh-token replay, OAuth consent abuse, SCIM and provisioning drift, federation trust, tenant misconfigurations, conditional access bypass paths, application registrations and the awkward edges between workforce identity and workload identity.

How to approach this surface

  • Identity abuse often starts with normal-looking tokens, consents or app registrations. The trick is understanding what those artifacts can later mint or reach.
  • Federation reduces friction, but it also creates delegated trust that attackers can inherit if validation or administrative boundaries are weak.
  • Provisioning systems deserve offensive attention. SCIM and lifecycle automation can accidentally create persistence, role drift and quiet access revival.
  • Conditional access is only as good as the signals it trusts. Device claims, network location, browser state and session age all become assumptions to test.
  • Treat workforce identity, workload identity and SaaS trust as one graph. That is where modern real-world escalation often happens.

Related certification and framework context

Curated public references

Brief index