{"id":4729,"date":"2025-06-25T11:12:25","date_gmt":"2025-06-25T11:12:25","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/25\/beware-the-hidden-risk-in-your-entra-environment\/"},"modified":"2025-06-25T11:12:25","modified_gmt":"2025-06-25T11:12:25","slug":"beware-the-hidden-risk-in-your-entra-environment","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/25\/beware-the-hidden-risk-in-your-entra-environment\/","title":{"rendered":"Beware the Hidden Risk in Your Entra Environment"},"content":{"rendered":"<p>\u200bIf you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk.\u00a0<br \/>\nA gap in access control in Microsoft Entra\u2019s subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them.\u00a0<br \/>\nAll the guest user needs are the permissions to create subscriptions in\u00a0If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk.\u00a0<br \/>\nA gap in access control in Microsoft Entra\u2019s subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them.\u00a0<br \/>\nAll the guest user needs are the permissions to create subscriptions in\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bIf you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk.\u00a0 A gap in access control in Microsoft Entra\u2019s subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them.\u00a0 All the guest&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/25\/beware-the-hidden-risk-in-your-entra-environment\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Beware the Hidden Risk in Your Entra Environment<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4730,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4729"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4729"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4729\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4730"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}