AppTotal automatically and reactively scans OAuth applications from different SaaS platforms (e.g. Azure/Office 365, Google Workspace, Slack) and produces a quantified risk score for each app based on dozens of features. These features include permissions, configuration, app activity, app resources, and much more.
Organizations and security researchers use AppTotal to assess OAuth apps they have connected or would like to connect to their SaaS platforms.
Canonic Security is a business applications security platform that helps companies control and manage third-party apps, add-ons, and other platform-native integrations. We let employees connect the apps & integrations they want to IT-approved applications while giving insight into app access and vulnerability intelligence.
Just send an email to [email protected].
In the search box on the AppTotal home page, you can simply type in the client ID of the OAuth app you’re looking for, or start typing the app name. Use the platform switcher for better search results.
You can find the client ID of an OAuth app in the consent page URL. In the URL, look for the client_id parameter, and submit it to AppTotal.
[How to find apps on Slack] (doc:how-to-find-apps-on-slack)
App and publisher authenticity verification process made proactively by Canonic Security's app intelligence team.
Note: A Canonic verified app can still be malicious or pose a risk due to compromised publisher, vulnerabilities and over privileged permissions.
The app’s developer can be either an individual or an organization.
The public identifier for OAuth apps, a unique ID across tenants. Note that some platforms may called it in different name. For example, on Azure it called Application ID.
The app’s category as specified in the marketplace, by the developer, or by AppTotal classification.
The app client type as registered on the platform, usually this one is an optional configuration. A type can be a web app, mobile, browser extension, device.
Whether the app is 3rd/1st party and other metadata tags.
- First-party - apps represent native services owned by the SaaS provider. For example, Google Drive, Gmail, Microsoft SharePoint, and Exchange are first-party apps and have a unique client ID assigned by the SaaS provider.
- Third-party - apps registered by a vendor other than the SaaS provider. Usually, these apps are publicly available to anyone.
- Internal app - apps registered for internal use and integration, available only to users within the tenant it was registered. Mainly used for automation within the SaaS environment and integrations with internal systems.
Whether the app went through the platform’s (e.g. Google, Microsoft, Slack) publisher verification process. Note that this process is required for very specific cases therefor most apps aren't submitted for review by the SaaS provider.
App's risk score is calculated based on its permissions, severity of its security risks, and its publisher rating.
Risks comprised of security posture findings and risk indicators.
Permission level is determined by the app's requested scopes, based on the scope's operation (e.g. read/write) and the affected resources (e.g., Gmail, OneDrive, Teams).
App's API activity as recorded by our SaaS sandbox.
IP addresses that API activity was originated from.
App's redirect URLs as registered during the app registration.
|Apps that have no other access other than signing in on behalf of the authorized user||Apps that have access to a user's account data||Apps that may read or edit system configuration or platform settings||Apps that have access to anything that the authorized user has access to|
The OAuth permission scopes as seen requested by the app, their description according to the SaaS platform, and their severity (low/med/high) according to the affected service/resource (e.g. Gmail, OneDrive, Teams) and the operation (read/write).
The terms of service URL as registered during the app registration. This is usually optional on app registration.
The app developer compliance certificates according to the publisher declaration.
The app developer data retention policy as mentioned in the legal documents.
Detailed list of findings and risk indicators. Findings are security posture issues identified on the analyzed app. Issues related to security posture include bad security practices in app configurations, as well as vulnerabilities in app-related assets. Risk indicators are properties of the app that affect its risk score, but do not always indicate whether or not the app is malicious.
Threat intelligence insights collected by Canonic Security’s app intelligence.
Updated about 1 year ago