Creating relying party clients using the Nimbus OAuth 2.0 SDK with OpenID Connect extensions
|
|
- Bertram Hart
- 6 years ago
- Views:
Transcription
1 Creating relying party clients using the Nimbus OAuth 2.0 SDK with OpenID Connect extensions , Vladimir Dzhuvinov
2 Goals of the SDK Full implementation of the OIDC specs and all related OAuth 2.0 RFCs Originally created to build an OIDC provider server May also be used to build OIDC clients (relying parties) Ongoing development to stay current with latest OIDC / OAuth 2.0 / JOSE / JWT drafts
3 The OIDC protocol flows Implicit flow: authz endpoint returns ID token (optionally with inlined UserInfo claims) and access token directly to browser / client client not authenticated, minimises back-channel requests intended for mobile / browser JS apps Code flow: authz endpoint returns code code exchanged for ID token and access token at token endpoint upon client authentication intended for server based web apps
4 Implicit Flow OIDC provider server HTTP redirect with authz request query ID token (Access token) Authz Endpoint client app browser JS, mobile Access token User details (name, ,...) User Info Endpoint
5 Code Flow OIDC provider server Front-channel request through browser HTTP redirect with authz request query Code Authz Endpoint Back-channel request from app Code + client credentials ID token, Access token Access token User details (name, ,...) Token Endpoint User Info Endpoint
6 Creating an OIDC client Based on OIDC code flow Using the PayPal OIDC provider: Demonstrates: composing an authz request and redirecting to the PayPal OIDC provider exchanging the code for an ID token and access token retrieving UserInfo using the access token
7 Before we start developing Need a public HTTPS URL for the client application A free SSL cert can be quickly obtained from CACert.org Remember to install root CA certificate into your browser (CACert.org not recognised by browsers by default)
8 The double-redirect trick Allows you to develop the client app on your own machine Set a public HTTPS URL that redirects automatically to the local host URL of your app in development, e.g. redirects to =>
9 Register client app with PayPal Instructions: Record endpoint URLs, client id + secret
10 Register client app with PayPal
11 Compose OIDC authz request import com.nimbusds.oauth2.sdk.*; import com.nimbusds.oauth2.sdk.id.*; import com.nimbusds.openid.connect.sdk.*; ResponseTypeSet rts = new ResponseTypeSet(); rts.add(responsetype.code); Scope scope = new Scope(); scope.add(oidcscopetoken.openid); scope.add(oidcscopetoken. ); scope.add(oidcscopetoken.profile); ClientID clientid = new ClientID("0ddce2239c2b075732c989fc0b69d86e"); URL redirecturi = new URL(" Nonce nonce = new Nonce(8); OIDCAuthorizationRequest authzreq = new OIDCAuthorizationRequest(rts, scope, clientid, redirecturi, nonce); String querystring = authzreq.toquerystring(); URL authzendpointurl = new URL(" URL authzurl = new URL(authzEndpointURL + "?" + querystring);
12 Redirect with request to PayPal authz endpoint
13 Process the authz response at the callback URL String querystring = req.getquerystring(); OIDCAuthorizationResponse authzresponse = OIDCAuthorizationResponseParser.parse(new URL(" + querystring)); if (authzresponse instanceof OIDCAuthorizationErrorResponse) { } OIDCAuthorizationErrorResponse authzerror = (OIDCAuthorizationErrorResponse)authzResponse; out.println("authorization error: " + authzerror.geterrorobject()); return; OIDCAuthorizationSuccessResponse authzsuccess = (OIDCAuthorizationSuccessResponse)authzResponse; AuthorizationCode code = authzsuccess.getauthorizationcode();
14 Exchange the authz code for ID token and access token URL tokenendpointurl = new URL(" ClientID clientid = new ClientID("0ddce2239c2b075732c989fc0b69d86e"); Secret clientsecret = new Secret(" b29d8ec57"); ClientAuthentication clientauth = new ClientSecretBasic(clientID, clientsecret); AccessTokenRequest accesstokenrequest = new AccessTokenRequest(code, null, clientauth); HTTPRequest httprequest = accesstokenrequest.tohttprequest(tokenendpointurl); HTTPResponse httpresponse = httprequest.process(); OIDCTokenResponse tokenresponse = OIDCTokenResponseParser.parse(httpResponse); if (tokenresponse instanceof OIDCTokenErrorResponse) { OIDCTokenErrorResponse tokenerror = (OIDCTokenErrorResponse)tokenResponse; out.println("token error: " + tokenerror.geterrorobject()); return; } OIDCAccessTokenResponse tokensuccess = (OIDCAccessTokenResponse)tokenResponse; AccessToken accesstoken = tokensuccess.getaccesstoken(); RefreshToken refreshtoken = tokensuccess.getrefreshtoken(); SignedJWT idtoken = (SignedJWT)tokenSuccess.getIDToken();
15 Validate and extract ID token claims using the Nimbus JOSE + JWT lib MACVerifier hmacverifier = new MACVerifier(clientSecret.getValue().getBytes()); boolean valid = idtoken.verify(hmacverifier); out.println("id token is valid: " + valid); JSONObject jsonobject = idtoken.getjwtclaimsset().tojsonobject(); out.println("id token [claims set]: \n" + new PrettyJson().format(jsonObject)); ID token claims: { "auth_time" : , "exp" : 28800, "nonce" : "O8WV06qo", "aud" : [ "0ddce2239c2b075732c989fc0b69d86e" ], "iss" : " "user_id" : " "iat" : , "sessionindex" : "f27855f6e7844f989b4c575cdc9c47d71fdd6b24" }
16 Get UserInfo with access token // Note: The PayPal IdP uses an older OIDC draft version and // is at present not compatible with the Nimbus OIDC SDK so // we cannot use its helper call. We can however make a direct // call and simply display the raw data. URL userinfoendpointurl = new URL(" // Append the access token to form actual request URL userinforequesturl = new URL(userinfoEndpointURL, "?schema=openid&access_token=" + accesstoken.getvalue()); UserInfo: { "family_name" : "Dzhuvinov", "zoneinfo" : "Europe\/Berlin", "name" : "Vladimir Dzhuvinov", " " : "vladimir@dzhuvinov.com", "given_name" : "Vladimir", "user_id" : " }
17 Resources OIDC specs: OIDC SDK: JOSE+JWT SDK: Client app source: Test client app online:
FAS Authorization Server - OpenID Connect Onboarding
FAS Authorization Server - OpenID Connect Onboarding Table of Contents Table of Contents 1 List of Figures 2 1 FAS as an authorization server 3 2 OpenID Connect Authorization Code Request and Response
More informationFAS Authorization Server - OpenID Connect Onboarding
FAS Authorization Server - OpenID Connect Onboarding Table of Contents Table of Contents 1 List of Figures 2 1 FAS as an authorization server 3 2 OpenID Connect Authorization Code Request and Response
More informationConnect. explained. Vladimir Dzhuvinov. :
Connect explained Vladimir Dzhuvinov Email: vladimir@dzhuvinov.com : Twitter: @dzhivinov Married for 15 years to Java C Python JavaScript JavaScript on a bad day So what is OpenID Connect? OpenID Connect
More informationFAS Authorization Server - OpenID Connect Onboarding
FAS Authorization Server - OpenID Connect Onboarding 1 Table of Content FAS as an authorization server 3 1 OpenID Connect Authorization Code Request and Response 4 1.1 OPENID CONNECT AUTHORIZATION CODE
More informationfredag 7 september 12 OpenID Connect
OpenID Connect OpenID Connect Necessity for communication - information about the other part Trust management not solved! (1) OP discovery The user provides an identifier (for instance an email address)
More informationJava Relying Party API v1.0 Programmer s Guide
Java Relying Party API v1.0 Programmer s Guide 4 June 2018 Authors: Peter Höbel peter.hoebel@open-xchange.com Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by the ID4me
More informationProtect Your API with OAuth 2. Rob Allen
Protect Your API with OAuth 2 Authentication Know who is logging into your API Rate limiting Revoke application access if its a problem Allow users to revoke 3rd party applications How? Authorization header:
More informationAPI Gateway. Version 7.5.1
O A U T H U S E R G U I D E API Gateway Version 7.5.1 15 September 2017 Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.5.1 No part
More informationNetIQ Access Manager 4.3. REST API Guide
NetIQ Access Manager 4.3 REST API Guide Contents 1. Introduction... 3 2. API Overview... 3 3 Administration APIs... 3 3.1 Accessing the Administration APIs... 3 3.2 Detailed API Documentation... 4 3.3
More informationWe will resume at 3:30 pm Enjoy your break!
We will resume at 3:30 pm Enjoy your break! Presented by Mike Sloves Ray Verhoeff Building a Secure PI Web API Environment Presented by Mike Sloves Ray Verhoeff User Conference 2017 Themes 3 What do we
More informationUsing Keycloak to Provide Authentication, Authorization, and Identity Management Services for Your Gateway
Using Keycloak to Provide Authentication, Authorization, and Identity Management Services for Your Gateway Marcus Christie Science Gateways Research Center Indiana University EDS Consultant Award Number
More informationOAuth and OpenID Connect (IN PLAIN ENGLISH)
OAuth and OpenID Connect (IN PLAIN ENGLISH) NATE BARBETTINI @NBARBETTINI @OKTADEV A lot of confusion around OAuth. Terminology and jargon Incorrect advice Identity use cases (circa 2007) Simple login forms
More informationopenid connect all the things
openid connect all the things @pquerna CTO, ScaleFT CoreOS Fest 2017-2017-07-01 Problem - More Client Devices per-human - Many Cloud Accounts - More Apps: yay k8s - More Distributed Teams - VPNs aren
More informationWEB API. Nuki Home Solutions GmbH. Münzgrabenstraße 92/ Graz Austria F
WEB API v 1. 1 0 8. 0 5. 2 0 1 8 1. Introduction 2. Calling URL 3. Swagger Interface Example API call through Swagger 4. Authentication API Tokens OAuth 2 Code Flow OAuth2 Authentication Example 1. Authorization
More informationMobile Procurement REST API (MOBPROC): Access Tokens
Mobile Procurement REST API (MOBPROC): Access Tokens Tangoe, Inc. 35 Executive Blvd. Orange, CT 06477 +1.203.859.9300 www.tangoe.com TABLE OF CONTENTS HOW TO REQUEST AN ACCESS TOKEN USING THE PASSWORD
More informationUsing OAuth 2.0 to Access ionbiz APIs
Using OAuth 2.0 to Access ionbiz APIs ionbiz APIs use the OAuth 2.0 protocol for authentication and authorization. ionbiz supports common OAuth 2.0 scenarios such as those for web server, installed, and
More informationNordea e-identification Service description
Nordea e-identification Service description October 2018 1 Change log Version Description/ Changes 1.0 Initial version 1.1 Minor updates to examples & service hours October 2018 2 Contents Change log...
More informationNetIQ Access Manager 4.4. REST API Guide
NetIQ Access Manager 4.4 REST API Guide Contents 1. Introduction... 3 2. API Overview... 3 3 Administration APIs... 3 3.1 Accessing the Administration APIs... 3 3.2 Detailed API Documentation... 4 3.3
More informationOpenID Connect Opens the Door to SAS Viya APIs
Paper SAS1737-2018 OpenID Connect Opens the Door to SAS Viya APIs Mike Roda, SAS Institute Inc. ABSTRACT As part of the strategy to be open and cloud-ready, SAS Viya services leverage OAuth and OpenID
More informationBlackBerry AtHoc Networked Crisis Communication. BlackBerry AtHoc API Quick Start Guide
BlackBerry AtHoc Networked Crisis Communication BlackBerry AtHoc API Quick Start Guide Release 7.6, September 2018 Copyright 2018 BlackBerry Limited. All Rights Reserved. This document may not be copied,
More informationIdentity & Authorization Management (I.AM) Mobile integration Technical specifications. Version 1.1
Identity & Authorization Management (I.AM) Mobile integration Technical specifications Version 1.1 This document is provided to you free of charge by the ehealth platform Willebroekkaai 38 38, Quai de
More informationINTEGRATION MANUAL DOCUMENTATION E-COMMERCE
INTEGRATION MANUAL DOCUMENTATION E-COMMERCE LOGIN: In order to use Inkapay's e-commerce payment API you should be registered and verified on Inkapay, otherwise you can do this by entering to www.inkapay.com.
More informationBuilding a Secure PI Web API Environment
Building a Secure PI Web API Environment Presented by Mike Sloves Ray Verhoeff User Conference 2017 Themes 2 What do we mean by secure? Basic summary of security concepts: Minimizing the Attack Vector
More informationAruba Central Application Programming Interface
Aruba Central Application Programming Interface User Guide Copyright Information Copyright 2016 Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the
More informationCheck to enable generation of refresh tokens when refreshing access tokens
VERSION User: amadmin Server: sp.example.com LOG OUT OAuth2 Provider Save Reset Back to Services Realm Attributes Indicates required field Authorization Code Lifetime Refresh (seconds) If this field is
More informationOpenID Connect Update
OpenID Connect Update May 14, 2013 Dr. Michael B. Jones Identity Standards Architect Microsoft Working Together OpenID Connect Working Group Members Key working group participants: Nat Sakimura Nomura
More informationOpenID Connect 1.0 Guide
OpenID Connect 1.0 Guide ForgeRock Access Management 5 ForgeRock AS 201 Mission St, Suite 2900 San Francisco, CA 94105, USA +1 415-599-1100 (US) www.forgerock.com Copyright 2011-2017 ForgeRock AS. Abstract
More informationIdentity and Data Access: OpenID & OAuth
Feedback: http://goo.gl/dpubh #io2011 #TechTalk Identity and Data Access: OpenID & OAuth Ryan Boyd @ryguyrg https://profiles.google.com/ryanboyd May 11th 2011 Agenda Feedback: http://goo.gl/dpubh #io2011
More informationOpenID Connect 1.0 Guide
OpenID Connect 1.0 Guide ForgeRock Access Management 5.5 ForgeRock AS 201 Mission St, Suite 2900 San Francisco, CA 94105, USA +1 415-599-1100 (US) www.forgerock.com Copyright 2011-2017 ForgeRock AS. Abstract
More informationAdvanced API Security
Advanced API Security ITANA Group Nuwan Dias Architect 22/06/2017 Agenda 2 HTTP Basic Authentication Authorization: Basic QWxhZGRpbjpPcGVuU2VzYW1l 3 API Security is about controlling Access Delegation
More informationLogin with Amazon. Developer Guide for Websites
Login with Amazon Developer Guide for Websites Login with Amazon: Developer Guide for Websites Copyright 2017 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are
More information1000 Ways to Die in Mobile OAuth. Eric Chen, Yutong Pei, Yuan Tian, Shuo Chen,Robert Kotcher and Patrick Tague
1000 Ways to Die in Mobile OAuth Eric Chen, Yutong Pei, Yuan Tian, Shuo Chen,Robert Kotcher and Patrick Tague What is this work about? In 2014, Studied OAuth usage in 200 Android/iOS OAuth applications.
More informationNIELSEN API PORTAL USER REGISTRATION GUIDE
NIELSEN API PORTAL USER REGISTRATION GUIDE 1 INTRODUCTION In order to access the Nielsen API Portal services, there are three steps that need to be followed sequentially by the user: 1. User Registration
More informationBuilding the Modern Research Data Portal. Developer Tutorial
Building the Modern Research Data Portal Developer Tutorial Thank you to our sponsors! U. S. DEPARTMENT OF ENERGY 2 Presentation material available at www.globusworld.org/workshop2016 bit.ly/globus-2016
More informationTutorial: Building the Services Ecosystem
Tutorial: Building the Services Ecosystem GlobusWorld 2018 Steve Tuecke tuecke@globus.org What is a services ecosystem? Anybody can build services with secure REST APIs App Globus Transfer Your Service
More informationOracle Fusion Middleware. API Gateway OAuth User Guide 11g Release 2 ( )
Oracle Fusion Middleware API Gateway OAuth User Guide 11g Release 2 (11.1.2.2.0) August 2013 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.2.0) Copyright 1999, 2013, Oracle and/or its affiliates.
More informationTechnical Overview. Version March 2018 Author: Vittorio Bertola
Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which
More informationSoK: Single Sign-On Security An Evaluation of OpenID Connect
= SoK: Single Sign-On Security An Evaluation of OpenID Connect Christian Mainka, Vladislav Mladenov, Jörg Schwenk Horst Görtz Institute for IT Security Chair for Network and Data Security Ruhr University
More informationAuthentication in the Cloud. Stefan Seelmann
Authentication in the Cloud Stefan Seelmann Agenda Use Cases View Points Existing Solutions Upcoming Solutions Use Cases End user needs login to a site or service End user wants to share access to resources
More informationGPII Security. Washington DC, November 2015
GPII Security Washington DC, November 2015 Outline User data User's device GPII Configuration use cases Preferences access and privacy filtering Work still to do Demo GPII User Data Preferences Device
More informationA TECHNICAL DESIGN FOR A BLUE BADGE DIGITAL SERVICE
A TECHNICAL DESIGN FOR A BLUE BADGE DIGITAL SERVICE The findings of an Alpha Project involving GDS DWP By Steven Gevers (Verizon) and Rob Laurence (Innovate Identity) Introduction Table of Contents Introduction
More informationIntroduction to IdentityServer
Introduction to IdentityServer The open source OIDC framework for.net Brock Allen http://brockallen.com @BrockLAllen brockallen@gmail.com @IdentityServer Dominick Baier http://leastprivilege.com @leastprivilege
More informationOracle Fusion Middleware. Oracle API Gateway OAuth User Guide 11g Release 2 ( )
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.3.0) April 2014 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.3.0) Copyright 1999, 2014, Oracle and/or its
More informationBuilding the Modern Research Data Portal using the Globus Platform. Rachana Ananthakrishnan GlobusWorld 2017
Building the Modern Research Data Portal using the Globus Platform Rachana Ananthakrishnan rachana@globus.org GlobusWorld 2017 Platform Questions How do you leverage Globus services in your own applications?
More informationETSI TS V ( )
TS 124 482 V14.3.0 (2018-04) TECHNICAL SPECIFICATION LTE; Mission Critical Services (MCS) identity management; Protocol specification (3GPP TS 24.482 version 14.3.0 Release 14) 1 TS 124 482 V14.3.0 (2018-04)
More informationIntegrating with ClearPass HTTP APIs
Integrating with ClearPass HTTP APIs HTTP based APIs The world of APIs is full concepts that are not immediately obvious to those of us without software development backgrounds and terms like REST, RPC,
More informationI.AM Connect Client registration Version 1.0. This document is provided to you free of charge by the. ehealth platform
I.AM Connect Client registration Version 1.0 This document is provided to you free of charge by the ehealth platform Willebroekkaai 38 38, Quai de Willebroek 1000 BRUSSELS All are free to circulate this
More informationCombination of the PEAP Protocol with EAP-OpenID Connect
University of Piraeus Department of Digital Systems Postgraduate Program «Digital Systems Security» Academic Year 2017-2018 (ΨΣ-ΑΦ-888) MSc Dissertation Combination of the PEAP Protocol with EAP-OpenID
More informationSECURING ASP.NET CORE APPLICATIONS
SECURING ASP.NET CORE APPLICATIONS Philip Japikse (@skimedic) skimedic@outlook.com www.skimedic.com/blog Microsoft MVP, ASPInsider, MCSD, MCDBA, CSM, CSP Consultant, Teacher, Writer https://github.com/skimedic/presentations
More informationDJOAuth2 Documentation
DJOAuth2 Documentation Release 0.6.0 Peter Downs Sep 27, 2017 Contents 1 Important Links 1 2 What is DJOAuth2? 3 3 Why use DJOAuth2? 5 4 What is implemented? 7 5 Quickstart Guide 9 5.1 Requirements...............................................
More informationEnhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation
Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of
More informationPowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility
PowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
More informationInland Revenue. Build Pack. Identity and Access Services. Date: 04/09/2017 Version: 1.5 IN CONFIDENCE
Inland Revenue Build Pack Identity and Access Services Date: 04/09/2017 Version: 1.5 IN CONFIDENCE About this Document This document is intended to provide Service Providers with the technical detail required
More information4.2. Authenticating to REST Services. Q u i c k R e f e r e n c e G u i d e. 1. IdentityX 4.2 Updates
4.2 Authenticating to REST Services Q u i c k R e f e r e n c e G u i d e In IdentityX 4.1, REST services have an authentication and signing requirement that is handled by the IdentityX REST SDKs. In order
More informationovirt SSO Specification
ovirt SSO Specification Behavior Changes End user visible changes The password delegation checkbox at user portal login is now a profile setting. Sysadmin visible changes Apache negotiation URL change
More informationfor Salesforce Question-to-Case Connector
for Salesforce Question-to-Case Connector Contents 2 Contents Cloud Help for Community Managers... 3 What is the Salesforce Question-to-Case Connector... 4 Setting up the Salesforce Question-to-Case Connector...5
More informationHow to use or not use the AWS API Gateway for Microservices
How to use or not use the AWS API Gateway for Microservices Presented by Dr. Martin Merck Wednesday 26 September 2018 What is an API Gateway Traits AWS API Gateway Features of API gateway OAuth2.0 Agenda
More informationINDIGO-Datacloud Identity and Access Management Service
INDIGO-Datacloud Identity and Access Management Service RIA-653549 Presented by Andrea Ceccanti (INFN) andrea.ceccanti@cnaf.infn.it WLCG AuthZ WG Meeting Dec, 14th 2017 IAM overview INDIGO IAM The Identity
More informationIf the presented credentials are valid server will respond with a success response:
Telema EDI REST API Telema EDI REST API allows client to send and receive document to and from Telema server. In order to use EDI REST API client must have correct channel configured in Telema system.
More informationClickToCall SkypeTest Documentation
ClickToCall SkypeTest Documentation Release 0.0.1 Andrea Mucci August 04, 2015 Contents 1 Requirements 3 2 Installation 5 3 Database Installation 7 4 Usage 9 5 Contents 11 5.1 REST API................................................
More informationThe Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines
The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines Daniel Fett, Ralf Küsters, and Guido Schmitz University of Stuttgart, Germany Email: {daniel.fett,ralf.kuesters,guido.schmitz}@sec.uni-stuttgart.de
More informationOAuth 2.0 Guide. ForgeRock Access Management 5.5. ForgeRock AS 201 Mission St, Suite 2900 San Francisco, CA 94105, USA (US)
OAuth 2.0 Guide ForgeRock Access Management 5.5 ForgeRock AS 201 Mission St, Suite 2900 San Francisco, CA 94105, USA +1 415-599-1100 (US) www.forgerock.com Copyright 2011-2017 ForgeRock AS. Abstract Guide
More informationSECURING A MARATHON INSTALLATION 2016
MesosCon EU 2016 - Gastón Kleiman SECURING A MARATHON INSTALLATION 2016 2016 Mesosphere, Inc. All Rights Reserved. 1 Gastón Kleiman Distributed Systems Engineer Marathon/Mesos contributor gaston@mesosphere.io
More informationSecuring APIs and Microservices with OAuth and OpenID Connect
Securing APIs and Microservices with OAuth and OpenID Connect By Travis Spencer, CEO @travisspencer, @curityio Organizers and founders ü All API Conferences ü API Community ü Active blogosphere 2018 Platform
More informationdcache-view Olufemi S. Adeyemi On behalf of the project team INDIGO DataCloud
dcache-view Olufemi S. Adeyemi On behalf of the project team INDIGO DataCloud dcache-view Olufemi S. Adeyemi Umea 30 May 2017 dcache-view Olufemi S. Adeyemi Umea 30 May 2017 Useful flow chart Should I
More informationSAS Event Stream Processing 4.2: Security
SAS Event Stream Processing 4.2: Security Encryption on Sockets Overview to Enabling Encryption You can enable encryption on TCP/IP connections within an event stream processing engine. Specifically, you
More informationRed Hat 3Scale 2-saas
Red Hat 3Scale 2-saas API Documentation For Use with Red Hat 3Scale 2-saas Last Updated: 2018-07-11 Red Hat 3Scale 2-saas API Documentation For Use with Red Hat 3Scale 2-saas Legal Notice Copyright 2018
More informationSETTING UP YOUR.NET DEVELOPER ENVIRONMENT
SETTING UP YOUR.NET DEVELOPER ENVIRONMENT Summary Configure your local dev environment for integrating with Salesforce using.net. This tipsheet describes how to set up your local environment so that you
More informationSETTING UP YOUR.NET DEVELOPER ENVIRONMENT
SETTING UP YOUR.NET DEVELOPER ENVIRONMENT Summary Configure your local dev environment for integrating with Salesforce using.net. This tipsheet describes how to set up your local environment so that you
More informationINDIGO AAI An overview and status update!
RIA-653549 INDIGO DataCloud INDIGO AAI An overview and status update! Andrea Ceccanti (INFN) on behalf of the INDIGO AAI Task Force! indigo-aai-tf@lists.indigo-datacloud.org INDIGO Datacloud An H2020 project
More informationA Comprehensive Formal Security Analysis of OAuth 2.0
A Comprehensive Formal Security Analysis of OAuth 2.0 arxiv:1601.01229v3 [cs.cr] 27 May 2016 Daniel Fett University of Trier, Germany fett@uni-trier.de Guido Schmitz University of Trier, Germany schmitzg@uni-trier.de
More informationsanction Documentation
sanction Documentation Release 0.4 Demian Brecht May 14, 2014 Contents 1 Overview 3 2 Quickstart 5 2.1 Instantiation............................................... 5 2.2 Authorization Request..........................................
More informationGitHub-Flask Documentation
GitHub-Flask Documentation Release 3.2.0 Cenk Altı Jul 01, 2018 Contents 1 Installation 3 2 Configuration 5 3 Authenticating / Authorizing Users 7 4 Invoking Remote Methods 9 5 Full Example 11 6 API Reference
More informationAttribute Profile. Trusted Digital Identity Framework August 2018, version 1.0
Attribute Profile Trusted Digital Identity Framework August 2018, version 1.0 Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and the
More informationSlack Connector. Version 2.0. User Guide
Slack Connector Version 2.0 User Guide 2015 Ping Identity Corporation. All rights reserved. PingFederate Slack Connector User Guide Version 2.0 December, 2015 Ping Identity Corporation 1001 17th Street,
More informationAVOIDING SPEED BUMPS ON THE ROAD TO MICROSERVICES. Scott Shaw Head of Technology, ThoughtWorks Australia
AVOIDING SPEED BUMPS ON THE ROAD TO MICROSERVICES Scott Shaw Head of Technology, ThoughtWorks Australia 1 MICROSERVICE ENVY GOOGLE TRENDS DATA service oriented architecture microservices 2 THE SPEED X
More informationWeb Based Single Sign-On and Access Control
0-- Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
More informationThe production version of your service API must be served over HTTPS.
This document specifies how to implement an API for your service according to the IFTTT Service Protocol. It is recommended that you treat this document as a reference and follow the workflow outlined
More information[MS-ADFSOAL]: Active Directory Federation Services OAuth Authorization Code Lookup Protocol
[MS-ADFSOAL]: Active Directory Federation Services OAuth Authorization Code Lookup Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft
More informationBest Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April,
Best Practices: Authentication & Authorization Infrastructure Massimo Benini HPCAC - April, 03 2019 Agenda - Common Vocabulary - Keycloak Overview - OAUTH2 and OIDC - Microservices Auth/Authz techniques
More informationpython-oauth2 Documentation
python-oauth2 Documentation Release 2.0.0 Markus Meyer Oct 07, 2017 Contents 1 Usage 3 2 Installation 5 3 oauth2.grant Grant classes and helpers 7 3.1 Three-legged OAuth...........................................
More informationOPENID CONNECT 101 WHITE PAPER
OPENID CONNECT 101 TABLE OF CONTENTS 03 04 EXECUTIVE OVERVIEW WHAT IS OPENID CONNECT? Connect Terminology Relationship to OAuth 08 Relationship to SAML CONNECT IN MORE DETAIL Trust Model Discovery Dynamic
More informationOAuth 2.0 Guide. ForgeRock Access Management 5.1. ForgeRock AS 201 Mission St, Suite 2900 San Francisco, CA 94105, USA (US)
OAuth 2.0 Guide ForgeRock Access Management 5.1 ForgeRock AS 201 Mission St, Suite 2900 San Francisco, CA 94105, USA +1 415-599-1100 (US) www.forgerock.com Copyright 2011-2017 ForgeRock AS. Abstract Guide
More informationVetting Single Sign-On SDK Implementations via Symbolic Reasoning
Vetting Single Sign-On SDK Implementations via Symbolic Reasoning Ronghai Yang 1,2, Wing Cheong Lau 1, Jiongyi Chen 1, Kehuan Zhang 1 1 The Chinese University of Hong Kong and 2 Sangfor Technologies Inc.
More informationdjango-oauth2-provider Documentation
django-oauth2-provider Documentation Release 0.2.7-dev Alen Mujezinovic Aug 16, 2017 Contents 1 Getting started 3 1.1 Getting started.............................................. 3 2 API 5 2.1 provider.................................................
More informationUsage of "OAuth2" policy action in CentraSite and Mediator
Usage of "OAuth2" policy action in CentraSite and Mediator Introduction Prerequisite Configurations Mediator Configurations watt.server.auth.skipformediator The pg.oauth2 Parameters Asset Creation and
More informationIntegrating YuJa Active Learning into Google Apps via SAML
Integrating YuJa Active Learning into Google Apps via SAML 1. Overview This document is intended to guide users on how to integrate YuJa as a Service Provider (SP) using Google as the Identity Provider
More informationpython-jose Documentation
python-jose Documentation Release 0.2.0 Michael Davis May 21, 2018 Contents 1 Contents 3 1.1 JSON Web Signature........................................... 3 1.2 JSON Web Token............................................
More informationResearch Collaboration IAM Needs
Outline Research Collaboration IAM Needs Federated Identity for Authentication SAML Federations Hands-on with SAML Hands-on with OpenID Connect (OIDC) 2 Research Collaboration IAM Needs 3 What Is A Collaboration?
More informationInteraction between the Client and the Authorization Server (Symmetric Keys)
OAuth PoP Tokens REFRESHER Interaction between the Client and the Authorization Server (Symmetric Keys) +---------------+ ^ // Authorization / Server // / (I) // /+---------------+ Access / // Token /
More informationflask-jwt Documentation
flask-jwt Documentation Release 0.3.2 Dan Jacob Nov 16, 2017 Contents 1 Links 3 2 Installation 5 3 Quickstart 7 4 Configuration Options 9 5 API 11 6 Changelog 13 6.1 Flask-JWT Changelog..........................................
More informationMicrosoft Graph API Deep Dive
Microsoft Graph API Deep Dive Donald Hessing Lead Architect, Capgemini, The Netherlands Microsoft Certified Master (MCM) Agenda Introduction to Microsoft Graph API What is now and what is new in GA and
More informationSlovak Banking API Standard. Rastislav Hudec, Marcel Laznia
Slovak Banking API Standard. Rastislav Hudec, Marcel Laznia 01. Slovak Banking API Standard: Introduction 1.1 Why did SBA decide to prepare API standard? We knew that from January 13, 2018, banks in Slovakia
More informationRelease Joris Beckers
django a uth a dfsdocumentation Release 0.2.0 Joris Beckers Sep 14, 2017 Contents 1 Features 3 2 Contents 5 2.1 Installation................................................ 5 2.1.1 Requirements..........................................
More informationOAuth 2 and Native Apps
OAuth 2 and Native Apps Flows While all OAuth 2 flows can be used by native apps, only the user delegation flows will be considered in this document: Web Server, User-Agent and Device flows. The Web Server
More information[MS-ADFSOAL]: Active Directory Federation Services OAuth Authorization Code Lookup Protocol
[MS-ADFSOAL]: Active Directory Federation Services OAuth Authorization Code Lookup Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft
More informationAPI Security Management SENTINET
API Security Management SENTINET Overview 1 Contents Introduction... 2 Security Models... 2 Authentication... 2 Authorization... 3 Security Mediation and Translation... 5 Bidirectional Security Management...
More informationUsing Twitter & Facebook API. INF5750/ Lecture 10 (Part II)
Using Twitter & Facebook API INF5750/9750 - Lecture 10 (Part II) Lecture contents Connecting to popular social APIs Authentication Authorization Common calls Privacy and understanding data storage Social
More informationThe OAuth 2.0 Authorization Framework draft-ietf-oauth-v2-30
OAuth Working Group D. Hardt, Ed. Internet-Draft Microsoft Obsoletes: 5849 (if approved) D. Recordon Intended status: Standards Track Facebook Expires: January 16, 2013 July 15, 2012 The OAuth 2.0 Authorization
More informationHANDS-ON ACTIVITIES IDENTITY & ACCESS MANAGEMENT FEBRUARY, Hands-on Activities: Identity & Access Management 1
HANDS-ON ACTIVITIES IDENTITY & ACCESS MANAGEMENT FEBRUARY, 2018 Hands-on Activities: Identity & Access Management 1 1. AN INTRODUCTION TO OAUTH FLOWS Incorporate the right SSO components in an overall
More information