Microsoft Corporation
Using IP heuristics to protect access tokens from theft and replay
Last updated:
Abstract:
An embodiment disclosed herein is related to computing systems and method for a computing system to generate an access token that includes an IP address from a request. In the embodiment, a request is received for access to one secured data items. The request may include user credentials that specify that a user making the request is permitted to access the secured data items. The user credentials are validated and an Internet Protocol (IP) address that the request was sent from is determined. An access token is generated that includes the IP address that the request was sent from.
Status:
Grant
Type:
Utility
Filling date:
30 Oct 2019
Issue date:
5 Apr 2022