Exploring Attack Paths Using Graph Theory: Case - Microsoft Entra ID Pass-Through Authentication Topics: Privacy and Security Models; Security; Threat Awareness; Vulnerability Analysis and Countermeasures In Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 2: ICISSP, 486-492, 2025 , Porto, Portugal