SlideShare una empresa de Scribd logo
1 de 21
What is XAuth?
Xauth defined Extended Authentication,  an open platform for extending authenticated user services across the web.
EXTENDED AUTHENTICATION A proposed Web standard that detects which social networks the website visitor is already logged into
BENEFIT Enables the site to offer only the website visitor’s preferred sites as options for sharing instead of a long list of every possible sharing site
BENEFIT Facilitates including second-tier sharing services (such as Google Buzz) with greater ease Speeds page load time
HOW IT WORKS Participating services generate a browser token for each of their users.  The XAuth Token can be anything, so services have the flexibility to define whatever level of access they choose
HOW IT WORKS Publishers can then recognize when site visitors are logged in to those online services and present them with meaningful, relevant options. Users can choose to authenticate directly from the publisher site and use the service to share, interact with friends, or participate in the site's community.
IMPLEMENTATION Meebo is putting XAuth into its Meebo bar, which appears on a number of publisher websites
Xauth SUPPORTERS Google, Microsoft, Yahoo MySpace, Disqus and Meebo’s publishing partners including Time Inc. and MTV Networks
What about OAuth? Oauth is an  open protocol  to allow  secure API authorization  in a  simple  and  standard  method from desktop and web applications.
OAuth OAuth allows the User to grant access to their private resources on one site (called the Service Provider), to another site (called the Consumer, not to be confused with you, the User).
What about OpenID? While OpenID is all about using a single identity to sign into many sites,  OAuth is about giving access to your stuff without sharing your identity at all (or its secret parts).
OAuth OAuth attempts to provide a standard way for developers to offer their services via an API without forcing their users to expose their passwords 
Industry Protocols Google AuthSub AOL OpenAuth Yahoo BBAuth Upcoming API  Flickr API Amazon Web Services API 
Xauth vs. OAuth XAuth tells you  where to ask for OAuth from
Xauth and OAuth Example: XAuth tells a webpage "this is where the site visitor does social networking."
Xauth and OAuth Then,  OAuth is the way the user logs in there,  granting the site permission to access their info without seeing their password
Xauth COMPETITION ,[object Object],[object Object],[object Object]
FACEBOOK ,[object Object],[object Object],[object Object]
CHALLENGE Privacy: Enables third-party site to identify the services you belong to
[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

Similar a What is XAuth?

Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network IntergrationDinesh Kumar
 
Open authentication (oauth)
Open authentication (oauth)Open authentication (oauth)
Open authentication (oauth)Michael Maurice
 
Technology for Teachers
Technology for TeachersTechnology for Teachers
Technology for Teachersedfactor
 
Building AJAX Applications Using Yahoo! Web Services
Building AJAX Applications Using Yahoo! Web ServicesBuilding AJAX Applications Using Yahoo! Web Services
Building AJAX Applications Using Yahoo! Web Servicesgoodfriday
 
About OExchange
About OExchangeAbout OExchange
About OExchangeWill Meyer
 
Openid & Oauth: An Introduction
Openid & Oauth: An IntroductionOpenid & Oauth: An Introduction
Openid & Oauth: An IntroductionSteve Ivy
 
Making Web 2.0 Real Part 2 - Rich Interfaces
Making Web 2.0 Real Part 2 - Rich InterfacesMaking Web 2.0 Real Part 2 - Rich Interfaces
Making Web 2.0 Real Part 2 - Rich InterfacesMolecular Inc
 
OExchange Technical Intro
OExchange Technical IntroOExchange Technical Intro
OExchange Technical IntroWill Meyer
 
Twitter Update for Social Developers London - March 2013
Twitter Update for Social Developers London - March 2013Twitter Update for Social Developers London - March 2013
Twitter Update for Social Developers London - March 2013Angus Fox
 
OAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guessOAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guessMehdi Medjaoui
 
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...iXora Solution Ltd.
 

Similar a What is XAuth? (20)

Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network Intergration
 
OAuth Android Göteborg
OAuth Android GöteborgOAuth Android Göteborg
OAuth Android Göteborg
 
Open authentication (oauth)
Open authentication (oauth)Open authentication (oauth)
Open authentication (oauth)
 
Technology for Teachers
Technology for TeachersTechnology for Teachers
Technology for Teachers
 
Facebook_Oauth
Facebook_OauthFacebook_Oauth
Facebook_Oauth
 
Facebook_Oauth
Facebook_OauthFacebook_Oauth
Facebook_Oauth
 
Building AJAX Applications Using Yahoo! Web Services
Building AJAX Applications Using Yahoo! Web ServicesBuilding AJAX Applications Using Yahoo! Web Services
Building AJAX Applications Using Yahoo! Web Services
 
Oauth 2.0
Oauth 2.0Oauth 2.0
Oauth 2.0
 
About OExchange
About OExchangeAbout OExchange
About OExchange
 
OAuth Tokens
OAuth TokensOAuth Tokens
OAuth Tokens
 
Openid & Oauth: An Introduction
Openid & Oauth: An IntroductionOpenid & Oauth: An Introduction
Openid & Oauth: An Introduction
 
Making Web 2.0 Real Part 2 - Rich Interfaces
Making Web 2.0 Real Part 2 - Rich InterfacesMaking Web 2.0 Real Part 2 - Rich Interfaces
Making Web 2.0 Real Part 2 - Rich Interfaces
 
O auth
O authO auth
O auth
 
OAuth
OAuthOAuth
OAuth
 
Oauth
OauthOauth
Oauth
 
OExchange Technical Intro
OExchange Technical IntroOExchange Technical Intro
OExchange Technical Intro
 
Twitter Update for Social Developers London - March 2013
Twitter Update for Social Developers London - March 2013Twitter Update for Social Developers London - March 2013
Twitter Update for Social Developers London - March 2013
 
OAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guessOAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guess
 
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
 
Widget and Web Ecosystem - Updated
Widget and Web Ecosystem - UpdatedWidget and Web Ecosystem - Updated
Widget and Web Ecosystem - Updated
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

What is XAuth?

  • 2. Xauth defined Extended Authentication, an open platform for extending authenticated user services across the web.
  • 3. EXTENDED AUTHENTICATION A proposed Web standard that detects which social networks the website visitor is already logged into
  • 4. BENEFIT Enables the site to offer only the website visitor’s preferred sites as options for sharing instead of a long list of every possible sharing site
  • 5. BENEFIT Facilitates including second-tier sharing services (such as Google Buzz) with greater ease Speeds page load time
  • 6. HOW IT WORKS Participating services generate a browser token for each of their users. The XAuth Token can be anything, so services have the flexibility to define whatever level of access they choose
  • 7. HOW IT WORKS Publishers can then recognize when site visitors are logged in to those online services and present them with meaningful, relevant options. Users can choose to authenticate directly from the publisher site and use the service to share, interact with friends, or participate in the site's community.
  • 8. IMPLEMENTATION Meebo is putting XAuth into its Meebo bar, which appears on a number of publisher websites
  • 9. Xauth SUPPORTERS Google, Microsoft, Yahoo MySpace, Disqus and Meebo’s publishing partners including Time Inc. and MTV Networks
  • 10. What about OAuth? Oauth is an  open protocol  to allow  secure API authorization  in a  simple and  standard  method from desktop and web applications.
  • 11. OAuth OAuth allows the User to grant access to their private resources on one site (called the Service Provider), to another site (called the Consumer, not to be confused with you, the User).
  • 12. What about OpenID? While OpenID is all about using a single identity to sign into many sites, OAuth is about giving access to your stuff without sharing your identity at all (or its secret parts).
  • 13. OAuth OAuth attempts to provide a standard way for developers to offer their services via an API without forcing their users to expose their passwords 
  • 14. Industry Protocols Google AuthSub AOL OpenAuth Yahoo BBAuth Upcoming API Flickr API Amazon Web Services API 
  • 15. Xauth vs. OAuth XAuth tells you where to ask for OAuth from
  • 16. Xauth and OAuth Example: XAuth tells a webpage "this is where the site visitor does social networking."
  • 17. Xauth and OAuth Then, OAuth is the way the user logs in there, granting the site permission to access their info without seeing their password
  • 18.
  • 19.
  • 20. CHALLENGE Privacy: Enables third-party site to identify the services you belong to
  • 21.