Advanced Consent & Delegation Models: OAuth Scopes, Admin Consent, and Permission Sprawl

Advanced Consent & Delegation Models: OAuth Scopes, Admin Consent, and Permission Sprawl TL;DR OAuth consent is your new attack surface. And users click “Accept” on it faster than they skip terms of service agreements. Which is to say, instantly. When users click “Sign in with Google” or “Connect to Office 365,” they’re granting third-party applications delegated access to corporate data—email, files, calendars, contacts. Five clicks, and that random productivity app now has “Mail....

December 22, 2025 · 28 min · Jay Klinkowsky

Shadow IT Discovery Through Identity Analytics: Making the Invisible Visible

Shadow IT Discovery Through Identity Analytics: Making the Invisible Visible TL;DR Here’s a fun number: 1,158. That’s how many cloud applications the average enterprise uses. Wanna guess how many IT actually sanctioned? About 35. Do the math—that’s 97% of your cloud services operating completely outside your visibility. 1,158 apps. You’ve sanctioned maybe 30. The rest? Shadow IT. And here’s the thing—you can’t see them with traditional security tools. Your firewall?...

December 15, 2025 · 32 min · Jay Klinkowsky