Joonas Westlin 5/29/2019

Why you should not put secrets in native applications

Read Original

This technical article, part of an Azure AD best practices series, details the severe security risks of storing secrets (client IDs, secrets) in native applications like desktop, mobile, or SPA front-ends. It demonstrates how easily these secrets can be extracted from compiled binaries using simple tools, arguing that such apps run in untrusted environments and should use secure authentication flows instead.

Why you should not put secrets in native applications

Comments

No comments yet

Be the first to share your thoughts!

Browser Extension

Get instant access to AllDevBlogs from your browser

Top of the Week