What Token Replay Looks Like Across Systems

Token replay is one of the reasons identity compromise has become harder for security teams to contain. In a traditional credential theft scenario, the attacker needs a password, a working MFA path, or some way to trigger a new authentication event. In a token replay scenario, the attacker steals an already-issued authentication or session artifact and presents it somewhere else. The system may treat that artifact as proof that authentication already happened.

NIST defines a replay attack as one where an attacker replays previously captured messages between a legitimate claimant and verifier to masquerade as that claimant. It also defines replay resistance as the use of an authenticator output that is valid only for a specific authentication event. In practical terms, replay defense is about making sure a captured login artifact cannot be reused outside its intended session, device, channel, audience, or time window.

That distinction matters. MFA can stop many credential-based attacks, but it does not automatically stop theft of post-authentication artifacts. A user may satisfy MFA once, receive a session token, refresh token, SAML assertion, Kerberos ticket, or Kubernetes service account token, and then continue accessing systems without repeated prompts. If that artifact is stolen, replay can move the attack from “can this actor authenticate?” to “will the target system accept this already-issued proof?”


Token Replay in Microsoft 365 and Entra ID

In Microsoft 365 environments, token replay often appears as a valid user session showing up from an unusual device, geography, ASN, browser, or application path. The attacker may not know the user’s password and may never trigger a fresh MFA challenge. They are instead using a stolen sign-in session artifact, which can allow access to Exchange Online, SharePoint Online, Teams, or other cloud resources until the token expires, is revoked, or is blocked by policy.

Microsoft’s Entra Token Protection feature is aimed directly at this problem. Microsoft describes Token Protection as a Conditional Access session control that attempts to reduce token replay by allowing only device-bound sign-in session tokens, such as Primary Refresh Tokens, to be accepted by Microsoft Entra ID for access to protected resources. When supported, the PRT is cryptographically bound to the device where it was issued, so a stolen token should not work from another device.

The limitation is scope. Microsoft’s current documentation states that Token Protection supports native applications only and does not support browser-based applications. The same page lists Exchange Online, SharePoint Online, and Teams as supported cloud resources, with Windows support generally available and Apple platform support in preview.

From a detection standpoint, token replay in Entra-connected environments often looks less like a bad password event and more like session continuity from the wrong place. Analysts should look for successful sign-ins without expected interactive prompts, impossible or unlikely travel, unfamiliar device IDs, changes in user agent, unfamiliar client apps, anomalous refresh token use, and high-value application access shortly after phishing, malware, proxy, or adversary-in-the-middle activity.

Microsoft also frames token theft defense as a layered strategy: harden endpoints against malware-based token extraction, detect and mitigate successful theft, and use replay controls such as device-bound tokens or network-based enforcement. Microsoft notes that network-based policies can reduce replay of sign-in artifacts outside designated networks, with stronger coverage in some environments than device binding alone.


Token Replay in Web Applications and APIs

In web applications, token replay usually involves a bearer token. A bearer token works the way the name implies: possession is enough. If an API accepts Authorization: Bearer <token>, and that token is valid, the API may grant access without knowing whether the caller is the original client, a malicious script, a compromised host, or a copied request from another environment.

JWTs make this problem more visible because they are common in REST APIs, single-page applications, mobile backends, and microservice architectures. OWASP describes token sidejacking as an attack where a token is intercepted or stolen and then used by an attacker to access a system as the targeted user. OWASP’s recommended mitigation pattern includes adding a hardened cookie-bound user context and rejecting a token if the expected context is missing or mismatched.

This is why token validation cannot stop at “the signature is valid.” A valid signature proves that the token was issued by a trusted authority and has not been modified. It does not prove that the token is being presented by the same client, from the same session, for the same API, or within an acceptable risk context. Okta’s token lifecycle guidance reflects this by listing signature verification, expiration checks, audience checks, issuer checks, and, for ID tokens, nonce validation to help prevent replay.

A replayed API token may show up as duplicate access from unrelated IP ranges, a user token calling endpoints the user rarely touches, a mobile token used from a server environment, or the same JWT jti value appearing from multiple clients inside its validity window. In microservices, replay can be harder to spot if internal services trust upstream tokens too broadly. A token issued for one service may be accepted by another if audience validation is missing or misconfigured.

A stronger pattern is proof of possession. OAuth 2.0 DPoP, standardized in RFC 9449, gives clients a way to prove possession of a private key when presenting an access token. Instead of treating the token alone as sufficient, the client sends a signed proof tied to request details, such as HTTP method and URI, which limits the value of a copied token in another context.


Token Replay in SAML SSO

SAML replay is usually about assertion reuse. In a normal SAML flow, an identity provider issues an assertion that a service provider consumes to create a session. If an attacker captures that assertion and the service provider accepts it again, the attacker may be able to create a session without authenticating to the identity provider.

The risk increases when assertions have long validity windows, weak recipient validation, missing audience checks, poor assertion ID tracking, or incorrect clock skew settings. SAML implementations should validate signature, issuer, recipient, audience, time bounds, and assertion uniqueness. The point is to make the assertion useful only for the intended service provider, at the intended endpoint, during a narrow window, and only once.

OASIS SAML security guidance defines replay attacks as valid transmissions being maliciously or fraudulently repeated, either by the originator or by an adversary who intercepts and retransmits them. That definition maps directly to assertion replay: the XML assertion may be valid, signed, and issued by the right IdP, but it is being reused outside the expected flow.

In logs, SAML replay may appear as the same assertion ID used more than once, the same user receiving sessions from multiple IPs within seconds, SAML responses posted to unexpected ACS endpoints, or service provider sessions created without a matching fresh IdP-side event. For older enterprise applications, this can be missed if the SP logs session creation but not the assertion ID or response metadata.


Token Replay in Kerberos and Windows Environments

Kerberos has built-in replay concepts, but misconfiguration and edge cases still matter. In Kerberos, the client presents a ticket and an authenticator to a service. MIT Kerberos documentation explains that a replay cache tracks recently presented authenticators; when a duplicate authentication request appears in the replay cache, the service returns an error.

The replay cache exists for a reason. MIT’s documentation explains that, without this type of protection, an eavesdropper could record a client’s authentication messages, open a new connection, and replay the same messages. The attacker may not know the encrypted content, but repeated presentation can still cause harm in some protocol designs.

Across Windows infrastructure, replay indicators may surface through Kerberos errors, duplicate authenticator events, abnormal service ticket activity, or authentication from unexpected hosts. The stronger operational concern is that replay may sit beside related identity attacks, such as pass-the-ticket, overpass-the-hash, Kerberoasting follow-on activity, or service account abuse. These are not all the same technique, but they often share the same operational theme: the attacker is trying to use authentication material rather than repeatedly guess credentials.

A defender should treat Kerberos replay messages as more than noise when they align with privileged service access, lateral movement, domain controller anomalies, or host compromise. Replay cache errors can also come from time drift, application retries, load-balanced services, or misconfigured service principal names, so triage has to separate protocol hygiene problems from attacker reuse.


Token Replay in Kubernetes and Cloud-Native Systems

Kubernetes service account tokens are a common replay target inside cloud-native environments. A pod uses a service account token to authenticate to the Kubernetes API server, typically by sending it as a bearer token in the HTTP authorization header. Kubernetes documentation states that service accounts use signed JWTs, and the API server checks signature, expiration, object reference validity, current validity, and audience claims.

The modern Kubernetes direction is short-lived, bound service account tokens. Starting in Kubernetes v1.22, Kubernetes automatically provides pods with short-lived, rotating tokens through the TokenRequest API, rather than relying on older long-lived secret-based tokens. Kubernetes also states that TokenRequest-issued tokens are bound to the lifetime of the client object, such as a pod, and can fail validation immediately when the bound object is deleted if TokenReview is used.

Replay in Kubernetes may look like a service account token being used from a pod, namespace, node, or external source that should never possess it. It may show up as API calls after the original pod was deleted, service account use against the wrong audience, or a workload identity making unusual requests such as listing secrets, creating pods, or reading config maps across namespaces.

This matters in CI/CD and container environments, since tokens often sit inside environment variables, mounted volumes, build logs, debug output, image layers, or compromised pods. A stolen token may be replayed against the API server, a cloud metadata service, an internal API, or a downstream system that trusts Kubernetes-issued identity. Audience restriction is a major control here. Kubernetes documentation says applications should define the audience they accept and check that token audiences match expectations, reducing where a token can be used.


Token Replay Across SaaS and Federated Applications

SaaS replay often starts with phishing, malicious OAuth consent, browser token theft, endpoint malware, infostealers, adversary-in-the-middle infrastructure, or session cookie theft. The impact is often broader than one application, since federated identity allows a successful session artifact to bridge email, file storage, chat, CRM, developer platforms, and administrative consoles.

This is why replay risk is not confined to the identity provider. The identity provider may issue the token, but the relying application must still validate audience, issuer, expiration, nonce, signature, session context, and risk signals. Applications that cache sessions for long periods, fail to revoke sessions after identity risk changes, or accept tokens across multiple tenants or environments create more room for replay.

Across SaaS logs, the signal often appears as normal-looking success. The attacker may read mail, download files, enumerate groups, create inbox rules, register new OAuth apps, add forwarding addresses, change MFA methods, generate API keys, or access admin portals without triggering brute-force alerts. For that reason, replay detection has to focus on session behavior, not just login failure rates.


What Replay Looks Like in Telemetry

Across systems, token replay tends to share a few operational patterns. The same identity appears from different infrastructure without a clean authentication path. The same token or assertion identifier appears more than once. A session continues after password reset or MFA reset. A user accesses a sensitive application from a device that has no management history. An API sees a valid token from an automation host that has never used that user identity before. A Kubernetes service account performs actions outside its normal namespace. A SAML SP creates a session with no matching recent IdP event.

Good telemetry needs to preserve the fields that make these patterns visible. For OAuth and JWT-backed APIs, that means logging token issuer, audience, subject, client ID, scopes, expiration, token ID where available, source IP, user agent, device identifier, and request path. For SAML, it means assertion ID, issuer, audience, recipient, NotBefore and NotOnOrAfter values, ACS endpoint, subject, and service provider session ID. For Kerberos, it means client principal, service principal, source host, ticket activity, replay cache errors, and time sync state. For Kubernetes, it means service account name, namespace, pod UID where available, token audience, API verb, resource, source pod or node, and TokenReview failures.

The key is correlation. A single successful sign-in may look normal. A single API call may look normal. A single service account request may look normal. Replay becomes clearer when defenders connect identity telemetry, endpoint telemetry, application logs, network egress, cloud audit logs, and session state changes.


Control Strategy: Reduce Token Theft, Limit Replay, and Shorten Exposure

The first control layer is reducing token theft. Endpoint hardening matters because many replay incidents start with token extraction from browsers, local storage, memory, cookie databases, password managers, developer tooling, or synced keychains. Microsoft’s token protection guidance calls out endpoint hardening, Defender for Endpoint, Intune, network protection, tamper protection, device compliance, Credential Guard, and related controls as part of reducing token compromise risk.

The second layer is binding. Device-bound tokens, channel-bound authentication, DPoP, mTLS, hardened cookie context, audience validation, nonce validation, and Kubernetes object-bound service account tokens all serve the same defensive goal: make the token less portable. A copied token should fail when it moves to a different device, channel, application, pod, resource server, or request context.

The third layer is short lifetime and revocation. Short-lived access tokens reduce the replay window. Refresh token rotation can expose reuse when the same refresh token appears twice, and introspection can give resource servers fresher revocation state than local validation alone. Okta notes that remote token introspection can return active status, scopes, client ID, and expiration, including more current revocation status.

The fourth layer is application-side validation. Every relying party should validate issuer, audience, signature, expiration, nonce where applicable, token type, algorithm, and session context. APIs should reject tokens issued for other services. SAML service providers should reject repeated assertion IDs. Kubernetes-integrated applications should reject tokens with the wrong audience and prefer TokenReview for bound token validation.

The fifth layer is detection and response. Token replay should trigger session revocation, refresh token invalidation, user risk review, endpoint inspection, password reset where needed, MFA method review, OAuth grant review, and audit of downstream access. In Microsoft 365 incidents, that also means checking mailbox rules, app consent grants, SharePoint and OneDrive downloads, Teams access, and administrative activity. In Kubernetes, it means rotating service account tokens where applicable, deleting compromised pods, reviewing RBAC, checking audit logs, and searching for secret access.


How Can Netizen Help?

Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally. 

Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.

Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.

Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


Posted in , , , ,

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.