SlideShare una empresa de Scribd logo
1 de 34
Descargar para leer sin conexión
Copyright ©2013 Ping Identity Corporation. All rights reserved.1
OAuth2
John Bradley, Sr. Technical Architect, Ping Identity
Copyright ©2013 Ping Identity Corporation. All rights reserved.2
Copyright ©2013 Ping Identity Corporation. All rights reserved.2
OAuth 2.0
Copyright ©2013 Ping Identity Corporation. All rights reserved.3
•  More and more, enterprise data is moving to the cloud
–  Email, calendar, documents, contacts, music, photos, tasks,
video, notes, travel details, financials, social graph, location,
etc.
•  Traditionally accessible via browser interface
•  Increasingly also accessed from
–  Other clouds (websites)
–  Mobile apps
–  Desktop apps
–  Other devices
•  Salesforce.com expects that within the next year - 1/3
of access will be via browser with the ‘rest’ being via
API
If you’re API and you know it ….
Copyright ©2013 Ping Identity Corporation. All rights reserved.4
On consumer web, once
prevalent API authentication
model was the so-called
‘password anti-pattern’
Copyright ©2013 Ping Identity Corporation. All rights reserved.5
Password anti-pattern
Site asks YOU for your GOOGLE password
so it can access your Google stuff.
Copyright ©2013 Ping Identity Corporation. All rights reserved.6
•  Teaches users to be
indiscriminate with theirs
passwords
•  Distributed passwords present
breach risk
•  Doesn’t support granular
permissions, e.g. X can read but
not write
•  The hosting site is not involved in
the authorization step
•  Doesn’t support (easy) revocation
– to be sure of turning off access
users must change password
Tsk tsk!
Copyright ©2013 Ping Identity Corporation. All rights reserved.7
•  http://oauth.net/
– An open protocol to allow
secure API authorization in
a simple and standard
method from desktop and
web applications.
OAuth: Antidote to the Anti-Pattern
Copyright ©2013 Ping Identity Corporation. All rights reserved.8
OAuth Timeline
Community
IETF
WRAP
2010 2011200920082007
OAuth 1.0
OAuth 1.0a
OAuth 2.0 RFC 6749
Info RFC 5849
JWT
Copyright ©2013 Ping Identity Corporation. All rights reserved.9
•  WG Specification complete,
Now named RFC 6749
•  Separates token issuance
role from resource server
•  Supports number of different
mechanisms by which an
access token can be
obtained
•  Early versions deprecated
Oauth 1.0a’s token and
message signing –
justification was difficulty
developers have with
signatures
OAuth 2.0 overview
Copyright ©2013 Ping Identity Corporation. All rights reserved.10
Actors
•  client: An application obtaining
authorization and making
protected resource requests.
•  resource server (RS): A server
capable of accepting and
responding to protected
resource requests.
•  authorization server (AS): A
server capable of issuing
tokens after successfully
authenticating the resource
owner and obtaining
authorization.
Client
Authorization
Server
Resource
Server
Get a token
Copyright ©2013 Ping Identity Corporation. All rights reserved.11
•  token: A string/structure (often
opaque to the client)
representing an access
authorization issued to the
client.
–  access token: A token used by
the client to make authenticated
requests on behalf of the
resource owner.
–  refresh token: A token used by
the client to obtain a new access
token without having to involve
the resource owner.
Tokens
http://jspinbrain.blogspot.com/
Copyright ©2013 Ping Identity Corporation. All rights reserved.12
•  May be Opaque or Structured for the
RS
•  Opaque to the client
– Format can be changed without modifying
clients
– Clients can work with multiple AS using
different token formats
•  Access tokens expire
Access Token
Copyright ©2013 Ping Identity Corporation. All rights reserved.13
•  Revocation of Refresh tokens stop
expired access tokens from being
refreshed.
•  Allow for refresh of Access token
without re-prompting the user.
•  The use of short lived access tokens
with refresh tokens relieves the RS from
needing to share state with the AS via a
back channel.
Refresh Token
Copyright ©2013 Ping Identity Corporation. All rights reserved.14
End to end flow (code flow)
Get authorization grant
Trade grant for access token
Use access token
Copyright ©2013 Ping Identity Corporation. All rights reserved.15
•  Authorization code one type of ‘authorization grant’
•  OAuth 2.0 defines others
–  Implicit (for clients that can’t keep a secret, e.g. Javascript
or embedded apps)
–  Resource owner password credentials (when the Client
can be trusted (temporarily) with the user password)
–  Client credentials (when the authorization is determined by
the client identity, and not a user’s permissions)
–  Extension point (for whatever else you might think of
exchanging for an access token)
•  It’s this flexibility that allows OAuth to support variety
of client types
Other ways to get an access token
Copyright ©2013 Ping Identity Corporation. All rights reserved.16
•  Client specifies desired
scope of permissions when
requesting authorization
•  AS builds appropriate
consent UI (when relevant)
•  ‘Issued’ scope may be less
than requested scope
•  OAuth 2.0 does not itself
define any scopes
•  Client should resist the urge
to ask for authorizations
‘just in case’
Scope
Copyright ©2013 Ping Identity Corporation. All rights reserved.17
OAuth Identity permutations
Client Resource
Client Resource
Client Resource
Access control to User data –
permissions based on Client
Access control to business data
– permissions based on Client
Client Resource
Access control to Business data
– permissions based on both
User & Client
Access control to User data –
permissions based on both
User & Client
Copyright ©2013 Ping Identity Corporation. All rights reserved.18
•  Growing number of OAuth 2.0
implementations
–  Salesforce, for
•  authenticating REST API calls
•  Web server redirect flow
•  Trading SAML assertion for OAuth access token
–  Microsoft –Azure ACS
•  Evolution of OAuth WRAP support
–  Facebook – authentication & authorization for
Graph API
–  Google OpenID Connect & most API
–  PayPal OpenID Connect & X.commerce API
OAuth 2.0 adoption
Copyright ©2013 Ping Identity Corporation. All rights reserved.19
OAuth 2.0 Security Model
•  Following WRAP, early
versions of OAuth 2.0
deprecated signatures/
HMACs and relied on
transport layer protections
•  SSL
–  SHOULD for Client
accessing resource
–  MUST for Client obtaining
access token
•  Much ‘discussion’ in
community as to the
appropriateness of a bearer
token model
Copyright ©2013 Ping Identity Corporation. All rights reserved.20
Security Model cont’d
•  Compromise is for OAuth 2.0 to support
both a bearer token model as well as
(optional) client signatures
•  Monolithic spec is broken into
– ‘How to get a token’ spec RFC 6749
– ‘How to use’ a token specs
• Bearer RFC 6750
• Proof of Possession
Copyright ©2013 Ping Identity Corporation. All rights reserved.21
Code Flow
Copyright ©2013 Ping Identity Corporation. All rights reserved.22
•  A client is tricked by a resource into
presenting a access token via a http 403 error
response indicating insufficient_scope
•  The client can replay a bearer token at a real
resource that accepts the token.
Confused Deputy
Copyright ©2013 Ping Identity Corporation. All rights reserved.23
•  JWT defines a token format that
can encode claims transferred
between two parties. The claims
are encoded as a JSON object ,
this bae64urlencoded, then
digitally signed or encrypted
using JOSE.
•  Logically similar to SAML
assertion
•  Advantages
–  simple to construct (form encoded
key value pairs)
–  compact on the wire
•  Not specific to OAuth, will need
to be profiled for access tokens
JSON Web Token
Copyright ©2013 Ping Identity Corporation. All rights reserved.24
OAuth relationship to SAML
•  SAML SSO can provide user
authentication mechanism for obtaining
consent
–  OAuth is orthogonal to how the user
authenticates to the AS
•  SAML’s SSO flow can be used to distribute
OAuth access tokens
–  As an optimization of doing a SAML-based
SSO sequence followed by OAuth sequence
•  SAML assertion can be traded for access
token
–  more on this later in use case discussion
Copyright ©2013 Ping Identity Corporation. All rights reserved.25
Copyright ©2013 Ping Identity Corporation. All rights reserved.25
OAuth 2.0
Use cases
Copyright ©2013 Ping Identity Corporation. All rights reserved.26
Use cases
Use case API User Client AS RS Notes
Consumer
IDP
Profile &
activity
stream
Consumer Enterprise Social IdP Social IdP Authz step
required
Cloud API Enterprise
data &
services
Employee Enterprise SaaS SaaS Leverages
SSO & trust
Mobile social
collaboration
Work-
related
updates
Employee Phone app Enterprise Enterprise Options for
authentication
Copyright ©2013 Ping Identity Corporation. All rights reserved.27
Consumer IDPs
•  Enterprise has a consumer-facing aspect, e.g. retail, customer service, etc
•  Wants to accept identity from 3rd party consumer IdPs, e.g. Facebook, Twitter,
etc
•  For user
–  No new account to create/manage
•  For enterprise
–  Smaller registration hurdle for customers
–  No pwd to manage/support
–  Access to rich profile & activity data
–  Option for social publishing back to Consumer IdP
Copyright ©2013 Ping Identity Corporation. All rights reserved.28
Consumer IDPs
Enterprise
Consumer IdP
AS
RS
API call (token)
Authz code
?
Facebook et al
Browser
token
code
1
2
3
4
Rich profile data 5
Copyright ©2013 Ping Identity Corporation. All rights reserved.29
Cloud APIs
•  Enterprise has existing SAML-
based SSO set-up with cloud
provider
•  Wants to use OAuth-protected
REST APIs offered by
Salesforce to retrieve data from
Database.com for local analysis
•  Uses OAuth assertion flow to
trade SAML assertion (normally
sent to SaaS by SAML SSO) for
OAuth access token
•  Subsequently uses access
token on calls to Database.com
API
http://www.database.com/what
Copyright ©2013 Ping Identity Corporation. All rights reserved.30
Cloud APIs
Enterprise Salesforce
AS
Database.com
SAML assertion
token
API call (token)
1
2
3
Client
Copyright ©2013 Ping Identity Corporation. All rights reserved.31
Mobile social collaboration
•  Enterprise is customer of Salesforce, encourages
employees to use Chatter for work-related collaboration
•  Seesmic for Android is Chatter client (also Twitter etc)
•  Seesmic retrieves access token from Salesforce hosted
AS
•  Relies on browser-based authentication & authorization
for access token retrieval
•  In this scenario, employee presents corporate
credentials to Salesforce, which then verifies them with
enterprise. SSO also possible
•  Seesmic uses access tokens to call Chatter API
Copyright ©2013 Ping Identity Corporation. All rights reserved.32
Mobile social collaboration
Enterprise
SaaS provider
AS RS
API call (token)Browser
Social collaboration app
token
Authn &
consent
1
2
3
tokens
validation
4
5
Copyright ©2013 Ping Identity Corporation. All rights reserved.33
Seesmic as Salesforce Chatter Client
Seesmic pops a browser window to
AS, within which user authenticates
and grants authorizations
Copyright ©2013 Ping Identity Corporation. All rights reserved.34
Questions?
•  Related whitepaper at
pingidentity.com – ‘Essentials of
OAuth’
•  John Bradley tweets at @ve7jtb

Más contenido relacionado

La actualidad más candente

4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010Fabrizio Volpe
 
TrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACMTrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACMhackingtrialpay
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCloudIDSummit
 
Gluecon oauth-03
Gluecon oauth-03Gluecon oauth-03
Gluecon oauth-03Paul Madsen
 
Enterprise Access Control Patterns for Rest and Web APIs
Enterprise Access Control Patterns for Rest and Web APIsEnterprise Access Control Patterns for Rest and Web APIs
Enterprise Access Control Patterns for Rest and Web APIsCA API Management
 
Saas webinar-dec6-01
Saas webinar-dec6-01Saas webinar-dec6-01
Saas webinar-dec6-01Paul Madsen
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2Justin Richer
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with EverythingDave Hay
 
Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1Novell
 
Anil saldhana cloudidentitybestpractices
Anil saldhana cloudidentitybestpracticesAnil saldhana cloudidentitybestpractices
Anil saldhana cloudidentitybestpracticesAnil Saldanha
 
Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Vladimir Dzhuvinov
 
Cloud Foundry UAA as an Identity Gateway
Cloud Foundry UAA as an Identity GatewayCloud Foundry UAA as an Identity Gateway
Cloud Foundry UAA as an Identity GatewayVMware Tanzu
 
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...Hitachi, Ltd. OSS Solution Center.
 
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Hitachi, Ltd. OSS Solution Center.
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsNovell
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CloudIDSummit
 
An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based EncryptionVertoda System
 
Mobile Application Scan and Testing
Mobile Application Scan and TestingMobile Application Scan and Testing
Mobile Application Scan and TestingBlueinfy Solutions
 

La actualidad más candente (20)

4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010
 
TrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACMTrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACM
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David Chase
 
Gluecon oauth-03
Gluecon oauth-03Gluecon oauth-03
Gluecon oauth-03
 
Enterprise Access Control Patterns for Rest and Web APIs
Enterprise Access Control Patterns for Rest and Web APIsEnterprise Access Control Patterns for Rest and Web APIs
Enterprise Access Control Patterns for Rest and Web APIs
 
Saas webinar-dec6-01
Saas webinar-dec6-01Saas webinar-dec6-01
Saas webinar-dec6-01
 
Apache con@home 2021_sha
Apache con@home 2021_shaApache con@home 2021_sha
Apache con@home 2021_sha
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything
 
Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1
 
Anil saldhana cloudidentitybestpractices
Anil saldhana cloudidentitybestpracticesAnil saldhana cloudidentitybestpractices
Anil saldhana cloudidentitybestpractices
 
Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0
 
Cloud Foundry UAA as an Identity Gateway
Cloud Foundry UAA as an Identity GatewayCloud Foundry UAA as an Identity Gateway
Cloud Foundry UAA as an Identity Gateway
 
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
 
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
 
Android attacks
Android attacksAndroid attacks
Android attacks
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
 
An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based Encryption
 
Mobile Application Scan and Testing
Mobile Application Scan and TestingMobile Application Scan and Testing
Mobile Application Scan and Testing
 

Similar a CIS13: Introduction to OAuth 2.0

Who’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileWho’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileNordic APIs
 
CIS13: Federation Protocol Cross-Section
CIS13: Federation Protocol Cross-SectionCIS13: Federation Protocol Cross-Section
CIS13: Federation Protocol Cross-SectionCloudIDSummit
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...APIsecure_ Official
 
O auth2 with angular js
O auth2 with angular jsO auth2 with angular js
O auth2 with angular jsBixlabs
 
Oauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 supportOauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 supportGaurav Sharma
 
Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Nino Ho
 
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Tatsuo Kudo
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellCA API Management
 
Securing ap is oauth and fine grained access control
Securing ap is   oauth and fine grained access controlSecuring ap is   oauth and fine grained access control
Securing ap is oauth and fine grained access controlAaronLieberman5
 
De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 Leonard Moustacchis
 
2018 Oct IIW User Managed Access (UMA)
2018 Oct IIW User Managed Access (UMA)2018 Oct IIW User Managed Access (UMA)
2018 Oct IIW User Managed Access (UMA)George Fletcher
 
Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Adam Lewis
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public SafetyAdam Lewis
 

Similar a CIS13: Introduction to OAuth 2.0 (20)

Who’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileWho’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and Mobile
 
CIS13: Federation Protocol Cross-Section
CIS13: Federation Protocol Cross-SectionCIS13: Federation Protocol Cross-Section
CIS13: Federation Protocol Cross-Section
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
 
Introduction to OAuth2.0
Introduction to OAuth2.0Introduction to OAuth2.0
Introduction to OAuth2.0
 
OAuth
OAuthOAuth
OAuth
 
O auth2 with angular js
O auth2 with angular jsO auth2 with angular js
O auth2 with angular js
 
OAuth
OAuthOAuth
OAuth
 
Oauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 supportOauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 support
 
API Security with OAuth2.0.
API Security with OAuth2.0.API Security with OAuth2.0.
API Security with OAuth2.0.
 
Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares
 
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
 
Securing ap is oauth and fine grained access control
Securing ap is   oauth and fine grained access controlSecuring ap is   oauth and fine grained access control
Securing ap is oauth and fine grained access control
 
Oauth2.0
Oauth2.0Oauth2.0
Oauth2.0
 
De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2
 
OAuth2 primer
OAuth2 primerOAuth2 primer
OAuth2 primer
 
2018 Oct IIW User Managed Access (UMA)
2018 Oct IIW User Managed Access (UMA)2018 Oct IIW User Managed Access (UMA)
2018 Oct IIW User Managed Access (UMA)
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
 
Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
 

Más de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Más de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

CIS13: Introduction to OAuth 2.0

  • 1. Copyright ©2013 Ping Identity Corporation. All rights reserved.1 OAuth2 John Bradley, Sr. Technical Architect, Ping Identity
  • 2. Copyright ©2013 Ping Identity Corporation. All rights reserved.2 Copyright ©2013 Ping Identity Corporation. All rights reserved.2 OAuth 2.0
  • 3. Copyright ©2013 Ping Identity Corporation. All rights reserved.3 •  More and more, enterprise data is moving to the cloud –  Email, calendar, documents, contacts, music, photos, tasks, video, notes, travel details, financials, social graph, location, etc. •  Traditionally accessible via browser interface •  Increasingly also accessed from –  Other clouds (websites) –  Mobile apps –  Desktop apps –  Other devices •  Salesforce.com expects that within the next year - 1/3 of access will be via browser with the ‘rest’ being via API If you’re API and you know it ….
  • 4. Copyright ©2013 Ping Identity Corporation. All rights reserved.4 On consumer web, once prevalent API authentication model was the so-called ‘password anti-pattern’
  • 5. Copyright ©2013 Ping Identity Corporation. All rights reserved.5 Password anti-pattern Site asks YOU for your GOOGLE password so it can access your Google stuff.
  • 6. Copyright ©2013 Ping Identity Corporation. All rights reserved.6 •  Teaches users to be indiscriminate with theirs passwords •  Distributed passwords present breach risk •  Doesn’t support granular permissions, e.g. X can read but not write •  The hosting site is not involved in the authorization step •  Doesn’t support (easy) revocation – to be sure of turning off access users must change password Tsk tsk!
  • 7. Copyright ©2013 Ping Identity Corporation. All rights reserved.7 •  http://oauth.net/ – An open protocol to allow secure API authorization in a simple and standard method from desktop and web applications. OAuth: Antidote to the Anti-Pattern
  • 8. Copyright ©2013 Ping Identity Corporation. All rights reserved.8 OAuth Timeline Community IETF WRAP 2010 2011200920082007 OAuth 1.0 OAuth 1.0a OAuth 2.0 RFC 6749 Info RFC 5849 JWT
  • 9. Copyright ©2013 Ping Identity Corporation. All rights reserved.9 •  WG Specification complete, Now named RFC 6749 •  Separates token issuance role from resource server •  Supports number of different mechanisms by which an access token can be obtained •  Early versions deprecated Oauth 1.0a’s token and message signing – justification was difficulty developers have with signatures OAuth 2.0 overview
  • 10. Copyright ©2013 Ping Identity Corporation. All rights reserved.10 Actors •  client: An application obtaining authorization and making protected resource requests. •  resource server (RS): A server capable of accepting and responding to protected resource requests. •  authorization server (AS): A server capable of issuing tokens after successfully authenticating the resource owner and obtaining authorization. Client Authorization Server Resource Server Get a token
  • 11. Copyright ©2013 Ping Identity Corporation. All rights reserved.11 •  token: A string/structure (often opaque to the client) representing an access authorization issued to the client. –  access token: A token used by the client to make authenticated requests on behalf of the resource owner. –  refresh token: A token used by the client to obtain a new access token without having to involve the resource owner. Tokens http://jspinbrain.blogspot.com/
  • 12. Copyright ©2013 Ping Identity Corporation. All rights reserved.12 •  May be Opaque or Structured for the RS •  Opaque to the client – Format can be changed without modifying clients – Clients can work with multiple AS using different token formats •  Access tokens expire Access Token
  • 13. Copyright ©2013 Ping Identity Corporation. All rights reserved.13 •  Revocation of Refresh tokens stop expired access tokens from being refreshed. •  Allow for refresh of Access token without re-prompting the user. •  The use of short lived access tokens with refresh tokens relieves the RS from needing to share state with the AS via a back channel. Refresh Token
  • 14. Copyright ©2013 Ping Identity Corporation. All rights reserved.14 End to end flow (code flow) Get authorization grant Trade grant for access token Use access token
  • 15. Copyright ©2013 Ping Identity Corporation. All rights reserved.15 •  Authorization code one type of ‘authorization grant’ •  OAuth 2.0 defines others –  Implicit (for clients that can’t keep a secret, e.g. Javascript or embedded apps) –  Resource owner password credentials (when the Client can be trusted (temporarily) with the user password) –  Client credentials (when the authorization is determined by the client identity, and not a user’s permissions) –  Extension point (for whatever else you might think of exchanging for an access token) •  It’s this flexibility that allows OAuth to support variety of client types Other ways to get an access token
  • 16. Copyright ©2013 Ping Identity Corporation. All rights reserved.16 •  Client specifies desired scope of permissions when requesting authorization •  AS builds appropriate consent UI (when relevant) •  ‘Issued’ scope may be less than requested scope •  OAuth 2.0 does not itself define any scopes •  Client should resist the urge to ask for authorizations ‘just in case’ Scope
  • 17. Copyright ©2013 Ping Identity Corporation. All rights reserved.17 OAuth Identity permutations Client Resource Client Resource Client Resource Access control to User data – permissions based on Client Access control to business data – permissions based on Client Client Resource Access control to Business data – permissions based on both User & Client Access control to User data – permissions based on both User & Client
  • 18. Copyright ©2013 Ping Identity Corporation. All rights reserved.18 •  Growing number of OAuth 2.0 implementations –  Salesforce, for •  authenticating REST API calls •  Web server redirect flow •  Trading SAML assertion for OAuth access token –  Microsoft –Azure ACS •  Evolution of OAuth WRAP support –  Facebook – authentication & authorization for Graph API –  Google OpenID Connect & most API –  PayPal OpenID Connect & X.commerce API OAuth 2.0 adoption
  • 19. Copyright ©2013 Ping Identity Corporation. All rights reserved.19 OAuth 2.0 Security Model •  Following WRAP, early versions of OAuth 2.0 deprecated signatures/ HMACs and relied on transport layer protections •  SSL –  SHOULD for Client accessing resource –  MUST for Client obtaining access token •  Much ‘discussion’ in community as to the appropriateness of a bearer token model
  • 20. Copyright ©2013 Ping Identity Corporation. All rights reserved.20 Security Model cont’d •  Compromise is for OAuth 2.0 to support both a bearer token model as well as (optional) client signatures •  Monolithic spec is broken into – ‘How to get a token’ spec RFC 6749 – ‘How to use’ a token specs • Bearer RFC 6750 • Proof of Possession
  • 21. Copyright ©2013 Ping Identity Corporation. All rights reserved.21 Code Flow
  • 22. Copyright ©2013 Ping Identity Corporation. All rights reserved.22 •  A client is tricked by a resource into presenting a access token via a http 403 error response indicating insufficient_scope •  The client can replay a bearer token at a real resource that accepts the token. Confused Deputy
  • 23. Copyright ©2013 Ping Identity Corporation. All rights reserved.23 •  JWT defines a token format that can encode claims transferred between two parties. The claims are encoded as a JSON object , this bae64urlencoded, then digitally signed or encrypted using JOSE. •  Logically similar to SAML assertion •  Advantages –  simple to construct (form encoded key value pairs) –  compact on the wire •  Not specific to OAuth, will need to be profiled for access tokens JSON Web Token
  • 24. Copyright ©2013 Ping Identity Corporation. All rights reserved.24 OAuth relationship to SAML •  SAML SSO can provide user authentication mechanism for obtaining consent –  OAuth is orthogonal to how the user authenticates to the AS •  SAML’s SSO flow can be used to distribute OAuth access tokens –  As an optimization of doing a SAML-based SSO sequence followed by OAuth sequence •  SAML assertion can be traded for access token –  more on this later in use case discussion
  • 25. Copyright ©2013 Ping Identity Corporation. All rights reserved.25 Copyright ©2013 Ping Identity Corporation. All rights reserved.25 OAuth 2.0 Use cases
  • 26. Copyright ©2013 Ping Identity Corporation. All rights reserved.26 Use cases Use case API User Client AS RS Notes Consumer IDP Profile & activity stream Consumer Enterprise Social IdP Social IdP Authz step required Cloud API Enterprise data & services Employee Enterprise SaaS SaaS Leverages SSO & trust Mobile social collaboration Work- related updates Employee Phone app Enterprise Enterprise Options for authentication
  • 27. Copyright ©2013 Ping Identity Corporation. All rights reserved.27 Consumer IDPs •  Enterprise has a consumer-facing aspect, e.g. retail, customer service, etc •  Wants to accept identity from 3rd party consumer IdPs, e.g. Facebook, Twitter, etc •  For user –  No new account to create/manage •  For enterprise –  Smaller registration hurdle for customers –  No pwd to manage/support –  Access to rich profile & activity data –  Option for social publishing back to Consumer IdP
  • 28. Copyright ©2013 Ping Identity Corporation. All rights reserved.28 Consumer IDPs Enterprise Consumer IdP AS RS API call (token) Authz code ? Facebook et al Browser token code 1 2 3 4 Rich profile data 5
  • 29. Copyright ©2013 Ping Identity Corporation. All rights reserved.29 Cloud APIs •  Enterprise has existing SAML- based SSO set-up with cloud provider •  Wants to use OAuth-protected REST APIs offered by Salesforce to retrieve data from Database.com for local analysis •  Uses OAuth assertion flow to trade SAML assertion (normally sent to SaaS by SAML SSO) for OAuth access token •  Subsequently uses access token on calls to Database.com API http://www.database.com/what
  • 30. Copyright ©2013 Ping Identity Corporation. All rights reserved.30 Cloud APIs Enterprise Salesforce AS Database.com SAML assertion token API call (token) 1 2 3 Client
  • 31. Copyright ©2013 Ping Identity Corporation. All rights reserved.31 Mobile social collaboration •  Enterprise is customer of Salesforce, encourages employees to use Chatter for work-related collaboration •  Seesmic for Android is Chatter client (also Twitter etc) •  Seesmic retrieves access token from Salesforce hosted AS •  Relies on browser-based authentication & authorization for access token retrieval •  In this scenario, employee presents corporate credentials to Salesforce, which then verifies them with enterprise. SSO also possible •  Seesmic uses access tokens to call Chatter API
  • 32. Copyright ©2013 Ping Identity Corporation. All rights reserved.32 Mobile social collaboration Enterprise SaaS provider AS RS API call (token)Browser Social collaboration app token Authn & consent 1 2 3 tokens validation 4 5
  • 33. Copyright ©2013 Ping Identity Corporation. All rights reserved.33 Seesmic as Salesforce Chatter Client Seesmic pops a browser window to AS, within which user authenticates and grants authorizations
  • 34. Copyright ©2013 Ping Identity Corporation. All rights reserved.34 Questions? •  Related whitepaper at pingidentity.com – ‘Essentials of OAuth’ •  John Bradley tweets at @ve7jtb