Securing RESTful Web Services Using Spring and OAuth 2.0
|
|
|
- Caroline Pope
- 10 years ago
- Views:
Transcription
1 Securing RESTful Web Services Using Spring and OAuth EXECUTIVE SUMMARY While the market is hugely 1 accepting REST based architectures due to their light weight nature, there is a strong need to secure these web services from various forms of web attacks. Since it is stateless in nature, the mechanisms of securing these services are different from standard web application where it is easily handled by session management, but in the case of REST, no session can be maintained as the calling point may or may not be a web browser. There are several mechanisms available to secure the web service. Some of these options are: HTTP Basic, HTTP Digest, Client certificates and two legged oauth 1.0, OAuth 2.0 All of the above mechanisms can be picked along with the transport layer security using SSL. These methods have their own pros and cons which can be easily referenced from various books and web. This paper will primarily focus on implementing security using Spring Security for OAuth 2, an implementation of OAuth 2.0 Open Authorization standard 2. CONTENTS SECTION PAGE 1.0 EXECUTIVE SUMMARY BUSINESS CHALLENGES OAUTH 2.0 OVERVIEW SPRING SECURITY FOR OAUTH APPLYING CLUSTER AWARE CACHE REFERENCES APPENDIX A OAUTH 2.0 OVERVIEW APPENDIX B ABOUT HUGHES SYSTIQUE CORPORATION As of 03/08/11, REST based web services constitute more than 50% of the API market available in the market. ( BUSINESS CHALLENGES As against other API implementations, REST kind of API implementation has proliferated inside the enterprise and outside. At the same time, the APIs security is still in question and not mature. Because of the following reasons: REST architecture does not have pre-defined security methods/procedures. So developers define their own side of implementation. REST API is vulnerable to the same class of web attacks as standard web based applications. These include: Injection attacks, Replay attacks, Cross-site scripting, Broken authentication etc. Limited documentation/library/framework available to implement standardized OAuth 2.0 specification (see references) 1 HSC PROPRIETARY
2 3.0 OAUTH 2.0 OVERVIEW OAuth 2.0 is an open authorization protocol specification defined by IETF OAuth WG (Working Group) which enables applications to access each other s data. The prime focus of this protocol is to define a standard where an application, say gaming site, can access the user s data maintained by another application like facebook, google or other resource server. The subsequent section explains the implementation of OAuth 2.0 in RESTful API using Spring Security for OAuth for Implicit Grant Type. Those who are not familier with the OAuth roles and grant types can refer to APPENDIX A OAuth 2.0 Overview. The following diagram gives an overview of steps involved in OAuth authentication considering a generic implicit grant scenario. Figure 1: Steps involved in User Authentication 1. User enters credentials which are passed over to Authorization Server in Http Authentication header in encrypted form. The communication channel is secured with SSL. 2. Auth server authenticates the user with the credentials passed and generates a token for limited time and finally returns it in response. 3. The client application calls API to resource server, passing the token in http header or as a query string. 4. Resource server extracts the token and authorizes it with Authorization server. 5. Once the authorization is successful, a valid response is sent to the caller. 2 HSC PROPRIETARY
3 4.0 SPRING SECURITY FOR OAUTH 2.0 Spring Security provides a library (Apache License) for OAuth 2.0 framework for all 4 types of Authorization grants. NOTE: From the implementation details perspective, this paper focuses on Implicit grant type used mostly in browser based client and mobile client applications where the user directly accesses resource server. 4.1 Spring Security Configuration The xml configuration used for Implicit grant type is explained below Enable Spring Security configuration: To enable spring security in your project, add this xml in the classpath and enable security filters in web.xml file as: <filter> <filter-name>springsecurityfilterchain</filter-name> <filter-class> org.springframework.web.filter.delegatingfilterproxy </filter-class> </filter> <filter-mapping> <filter-name>springsecurityfilterchain</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> Token Service Token Service is the module which Spring Security OAuth 2.0 implementation libraries provides and it is responsible to generate and store the token as per the default token service implementation. <bean id="tokenservices" class="org.springframework.security.oauth2.provider.token.defaulttokenservice s"> <property name="accesstokenvalidityseconds" value="86400" /> <property name="tokenstore" ref="tokenstore" /> <property name="supportrefreshtoken" value="true" /> <property name="clientdetailsservice" ref="clientdetails" /> </bean> The tokenstore ref bean represents the token store mechanism details. In memory token store is used for good performance considering the web server has optimum memory management to store the tokens. Other alternative is to use a database to store the tokens. Below is the bean configuration used: Bean configuration: <bean id="tokenstore" class="org.springframework.security.oauth2.provider.token.inmemorycachetokens tore"> </bean> 3 HSC PROPRIETARY
4 4.1.3 Authentication Manager Authentication Manager is the module which Spring Security OAuth 2.0 implementation libraries provide and it is responsible to do the authentication based on the user credentials provided in request header [or by other means i.e using query parameters] before the framework issues a valid token to the requester. Authentication Manager will further tie with the Authentication provider. Authentication provider will be chosen based on the underline system used to store operator details. Spring OAuth library supports various AAA systems that can be integrated and act as Authentication Provider. Below part of the section explains the LDAP system used as AuthenticationProvider which stores the operator details. Figure 2: OAuth security layer access LDAP for operator access control The LDAP configuration is given below: group-search-filter="(uniquemember={0})" group-searchbase="${operatorroot}"> </ldap-authentication-provider> </authentication-manager> More details can be found at user-search- <authentication-manager alias="authenticationmanager" xmlns=" <ldap-authentication-provider user-search-filter="(uid={0})" base="${operatorbindstring}" <ldap-server xmlns=" url="${providerurl}" manager-dn="${securityprincipal}" manager-password="${credentials}" /> 4 HSC PROPRIETARY
5 Authentication manager will create a context object for the LDAP and verify the provided operator credentials in the request header with the details stored in the LDAP. Once authentication is successful, request will be delegated to the token service. If Authentication is success then Token Service will first check whether a valid token is already available or not. If a valid [non-expired] token is available then that token will be returned otherwise a new token will be generated based on the token generator and added to the database and also returned as response body. Success response body is given below. { "expires_in": "599", "token_type": "bearer", "access_token": "2a5249a3-b26e-4bb3-853c-6446d674ceb3" } If authentication fails then 401 Unauthorized will be returned as response header Generate/Get access token As per the OAuth 2.0 specification, user has to make a request for the token with certain parameter and the framework should provide a valid token to the user once authentication is done. To access any API resource first client has to make a request for the token by providing his/her credentials in basic auth header. Authentication Manager will do the authentication based on the credentials provided in auth header. Below http block will receive the token request initiated by the user. <http pattern="/**" create-session="stateless" entry-point-ref="oauthauthenticationentrypoint" xmlns=" <intercept-url pattern="/**" access="is_authenticated_fully"/> <anonymous enabled="false" /> <custom-filter ref="resourceserverfilter" before="pre_auth_filter" /> <access-denied-handler ref="oauthaccessdeniedhandler" /> </http> Access token request format Below is the URL format of the token generation API: &redirect_uri= SERVER_URL>/HSCAPI/tokenService/accessToken Request Header: Authorization: <base64 encoded <username:password>> As per the OAuth 2.0 specification token request must be initiated along with these parameters. Details are given below: response_type: It tells that this request represents the token request. client_id: It represents the 3rd party user if token request is initiated by that. In our case there are no 3rd party users who need access to the application on behalf of operator. redirect_uri: The URL where request will be redirected with token and other details if authentication is success. 5 HSC PROPRIETARY
6 4.2 API authorization based on user details stored in LDAP On successful authentication via OAuth2AuthenticationProcessingFilter (authentication filter), the API Authorization layer is invoked. For customized authorization implementation, Authorization server is implemented and called from AuthenticationProcessingFilter by extending the class Authorization Server This module is responsible to approve the token request initiated by the client. The decision would be approved by user approval handler after verifying client credentials provided in the request. token-services- <oauth:authorization-server client-details-service-ref="clientdetails" ref="tokenservices" user-approval-handler-ref="userapprovalhandler"> <oauth:implicit /> <oauth:refresh-token /> </oauth:authorization-server> <oauth:client-details-service id="clientdetails"> <oauth:client client-id="hsc" resource-ids="hscapi" authorized-grant-types="implicit" authorities="role_client" scope="read,write" secret="secret" redirect-uri="${redirect-uri}" /> </oauth:client-details-service> User Approval Handler This handler is used to approve the token request initiated by client. In case of implicit grant type it has functionality of automatic approve for a white list of client configured in the spring-security.xml file. <bean id="userapprovalhandler" class="oauth2.handlers.hscapiuserapprovalhandler"> <property name="autoapproveclients"> <set> <value>hsc</value> </set> </property> <property name="tokenservices" ref="tokenservices" /> </bean> The authorization server, checks for the access of the URI and http method for the user (API caller). If user is not authorized 401-Unauthorized status is set as response and authentication object is not set to the security context. 5.0 APPLYING CLUSTER AWARE CACHE The OAuth token management can be done using some persisted mechanism or it can be maintained as part of process memory. Application of memory cache for OAuth short lived token management can be used for optimal performance. And if the application is required to run in a clustered environment, a cluster aware cache mechanism is the way to go. 6 HSC PROPRIETARY
7 Rest of the section explains the usage of JBoss cache for token management. Below is the configuration used to enable jboss caching, if JBoss AS 5.1 is the app server: Path: $JBOSS_HOME/.../deploy/cluster/jboss-cache-manager.sar/META-INF/jboss-cache-managerjboss-beans.xml <entry><key>api-token-store-cache</key> <value> <bean class="org.jboss.cache.config.configuration"> name="apitokenstorecacheconfig" <!-- Provides batching functionality for caches that don't want to interact with regular JTA Transactions --> <property name="transactionmanagerlookupclass">org.jboss.cache.transaction.batchmodetra nsactionmanagerlookup</property> <!-- Name of cluster. Needs to be the same for all members --> <!--property name="clustername">${jboss.partition.name:defaultpartition}- SessionCache</property--> <!-- Use a UDP (multicast) based stack. Need JGroups flow control (FC) because we are using asynchronous replication. -- > <property name="multiplexerstack">${jboss.default.jgroups.stack:udp}</property> <property name="fetchinmemorystate">true</property> <property name="nodelockingscheme">pessimistic</property> <property name="isolationlevel">repeatable_read</property> <property name="uselockstriping">false</property> <property name="cachemode">repl_async</property> <!-- Number of milliseconds to wait until all responses for a synchronous call have been received. Make this longer than lockacquisitiontimeout.--> <property name="syncrepltimeout">17500</property> <!-- Max number of milliseconds to wait for a lock acquisition --> <property name="lockacquisitiontimeout">15000</property> <!-- The max amount of time (in milliseconds) we wait until the state (ie. the contents of the cache) are retrieved from existing members at startup. --> <property name="stateretrievaltimeout">60000</property> > <!-- Not needed for a web session cache that doesn't use FIELD --> <property name="useregionbasedmarshalling">true</property> <!-- Must match the value of "useregionbasedmarshalling" -- <property name="inactiveonstartup">true</property> 7 HSC PROPRIETARY
8 </bean> </value> </entry> <!-- Disable asynchronous RPC marshalling/sending --> <property name="serializationexecutorpoolsize">0</property> <!-- We have no asynchronous notification listeners --> <property name="listenerasyncpoolsize">0</property> More details of the configuration can be found here Cache Manager Access and object storage: First retrieve cache manager and start the cache: CacheManagerLocator locator = CacheManagerLocator.getCacheManagerLocator(); //This configuration is loaded from file //$JBOSS_HOME/.../deploy/cluster/jboss-cache-manager.sar/META- INF/jboss-cache-manager-jboss-beans.xml cachemanager = (org.jboss.ha.cachemanager.cachemanager)locator.getcachemanager(null); cache = cachemanager.getcache("api-token-store-cache", true); cache.start(); cache.addcachelistener(new TokenListener()); Get the root node: Node<String, Object> rootnode = cache.getroot(); Define fully qualified names for cache collections nodes: //Define Fully-qualified names for the token store collections Fqn accesstokenstorefqn = Fqn.fromString("/accessTokenStore"); Fqn auth2accesstsfqn = Fqn.fromString("/authenticationToAccessTokenStore"); Fqn usernametoaccesstokenstorefqn = Fqn.fromString("/userNameToAccessTokenStore"); Fqn clientidtoaccesstokenstorefqn = Fqn.fromString("/clientIdToAccessTokenStore"); Fqn authenticationstorefqn = Fqn.fromString("/authenticationStore"); Fqn expirymapfqn = Fqn.fromString("/expiryMap"); Fqn flushcounterfqn = Fqn.fromString("/flushCounter"); Add token store collections to the cache at respective nodes defined by Fqns (Fully Qualified Names): Node<String, Object> tsnode = rootnode.addchild(accesstokenstorefqn); tsnode.put("accesstokenstore", accesstokenstore); Note: If you are using custom class loading mechanism, you might need to define cache regions and activate them: Region cacheregion = cache.getregion(rootfqn, true); cacheregion.registercontextclassloader(this.getclass().getclassloader()); cacheregion.activate(); cacheregion.setactive(true); 8 HSC PROPRIETARY
9 6.0 REFERENCES APPENDIX A OAUTH 2.0 OVERVIEW OAuth 2.0 defines following entities, a brief description is also provided. Roles Resource Owner: A Person or application that owns the data to be shared. Resource Server: Server where the owner resources are stored. E.g Google, Facebook resource server Client Application: Application requesting the access to the user data to the resource server Authorization Server: Server authorizing the client app to access the resources of the resource server Client Types There are two types of client defined by OAuth 2.0 specification. Confidential: This type keeps the user credentials confidential to the world. E.g an application where only the super or admin user can access the auth server to get access to the client credentials. Public: Such applications are not capable to keep a client password confidential. Other Entities ClientID: It is the ID shared by the Authorization Server to the client application at the time of client application registration to the Authorization server. This is typically a onetime process of registration. No user s data is shared to the client app in this process. Client Secret: It is the client application secret given by the authorization server during client application registration. Redirect URI: During registration, the client also registers a redirect URI. This URI is used by the Authorization server to redirect the page to given URI when resource owner allows client application to access its resources. Authorization Grant There are four types of grants as mentioned in the OAuth 2.0 specification (see references) 9 HSC PROPRIETARY
10 Authorization Code: This type of grant is best suited for social networking sites like facebook, twitter, google giving access to user data to other applications (client applications) on user permission. The resource owner accesses the client application. The client application tells the user to login to the client application via an authorization server. On user login request at client application site, the user is directed to the authorization server by the client application. The client application sends its client ID with the request. The Auth server knows which client is trying to request for user s protected data. After successful login, the user is asked if he wants to grant access to its resources to the client application. On approval, the page is redirected to the redirect URI of the client. The auth server also sends a unique authorization code. The client application then sends the auth code, its client ID and client secret to the auth server. The auth server sends back the access token for limited time duration. The client application can then use this access token to request resources from the resource server. Figure 3: Authorization Code Grant Type Work Flow Implicit: This type of grant is mostly used in browser based applications where user and client app represents one entity or native client application. It is similar to authorization code grant type except that fact that the access token is returned as soon as the user finished authorization along with the redirect URI. In this case since the token is returned to the user, it is prone to being hacked. It is thus strongly recommended to use TLS for the implementation. 10 HSC PROPRIETARY
11 Figure 4: Implicit Grant Type Work Flow Resource Owner Password Credentials In resource owner password credentials authorization grant, the owner gives the client application access to its credentials. The client application can then use the user name and password to access resources. This type of grant is not secure. Client Credentials The client application needs to access resources or call functions in the resource server, which are not related to a specific resource owner. 11 HSC PROPRIETARY
12 8.0 APPENDIX B: ABOUT HUGHES SYSTIQUE CORPORATION HUGHES Systique Corporation (HSC), part of the HUGHES group of companies, is a leading Consulting and Software company focused on Communications and Automotive Telematics. HSC is headquartered in Rockville, Maryland USA with its development centre in Gurgaon, India. SERVICES OFFERED: Technology Consulting & Architecture: Leverage extensive knowledge and experience of our domain experts to define product requirements, validate technology plans, and provide network level consulting services and deployment of several successful products from conceptualization to market delivery. Development & Maintenance Services: We can help you design, develop and maintain software for diverse areas in the communication industry. We have a well-defined software development process, comprising of complete SDLC from requirement analysis to the deployment and post production support. Testing : We have extensive experience in testing methodologies and processes and offer Performance testing (with bench marking metrics), Protocol testing, Conformance testing, Stress testing, White-box and black-box testing, Regression testing and Interoperability testing to our clients System Integration : As system integrators of choice HSC works with global names to architect, integrate, deploy and manage their suite of OSS, BSS, VAS and IN in wireless (VoIP & IMS), wireline and hybrid networks.: NMS, Service Management & Provisioning. DOMAIN EXPERTISE: Terminals Terminal Platforms : iphone, Android, Symbian, Windows CE/Mobile, BREW, PalmOS Middleware Experience & Applications : J2ME, IMS Client & OMA PoC, Access Wired Access : PON & DSL, IP-DSLAM, Wireless Access : WLAN/WiMAX / LTE, UMTS, 2.5G, 2G,Satellite Communication Core Network IMS/3GPP, IPTV, SBC, Interworking, Switching solutions, VoIP Applications Technologies : C, Java/J2ME, C++, Flash/lite,SIP, Presence, Location, AJAX/Mash Middleware: GlassFish, BEA, JBOSS, WebSphere, Tomcat, Apache etc. Management & Back Office: Billing & OSS, Knowledge of COTS products, Mediation, CRM Network Management : NM Protocols, Java technologies,, Knowledge of COTS NM products, FCAPS, Security & Authentication Platforms Embedded: Design, Development and Porting - RTOS, Device Drivers, Communications / Switching devices, Infrastructure components. Usage and Understanding of Debugging tools. FPGA & DSP : Design, System Prototyping. Re-engineering, System Verification, Testing Automotive Telematics In Car unit (ECU) software design with CAN B & CAN C Telematics Network Design (CDMA, GSM, GPRS/UMTS) BENEFITS Reduced Time to market : Complement your existing skills, Experience in development-todeployment in complex communication systems, with key resources available at all times Stretch your R&D dollars : Best Shore strategy to outsourcing, World class processes, Insulate from resource fluctuations 12 HSC PROPRIETARY
13 PROPRIETARY NOTICE All rights reserved. This publication and its contents are proprietary to Hughes Systique Corporation. No part of this publication may be reproduced in any form or by any means without the written permission of Hughes Systique Corporation, Shady Grove Road, Suite 330, Rockville, MD Copyright 2006 Hughes Systique Coporation CONTACT INFORMATION: Phone: Fax: Web: Blog : blog.hsc.com 13 HSC PROPRIETARY
Wi-Fi Direct 1.0 EXECUTIVE SUMMARY CONTENTS
Wi-Fi Direct 1.0 EXECUTIVE SUMMARY Wi-Fi Direct is a new technology defined by the Wi-Fi Alliance wherein capable devices can connect directly to each other quickly, securely and conveniently to do tasks
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Enterprise Architecture For Next Generation Telecommunication Service Providers CONTACT INFORMATION:
Enterprise Architecture For Next Generation Telecommunication Service Providers CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: [email protected] web: www.hsc.com PROPRIETARY NOTICE
Login with Amazon. Developer Guide for Websites
Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.
How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For
GETTING STARTED WITH KITEWORKS DEVELOPER GUIDE Version 1.0 Version 1.0 Copyright 2014 Accellion, Inc. All rights reserved. These products, documents, and materials are protected by copyright law and distributed
EHR OAuth 2.0 Security
Hospital Health Information System EU HIS Contract No. IPA/2012/283-805 EHR OAuth 2.0 Security Final version July 2015 Visibility: Restricted Target Audience: EHR System Architects EHR Developers EPR Systems
Test Automation Tools for Mobile Applications: A brief survey
Test Automation Tools for Mobile Applications: A brief survey 1.0 EXECUTIVE SUMMARY While UI test automation is well understood for the desktop market, with a plethora of good tools available, the mobile
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Spring Security 3. http://www.springsource.com/download/community?project=spring%20security
Spring Security 3 1. Introduction http://www.springsource.com/download/community?project=spring%20security 2. Security Namespace Configuration Web.xml configuration: springsecurityfilterchain
Contents. 2 Alfresco API Version 1.0
The Alfresco API Contents The Alfresco API... 3 How does an application do work on behalf of a user?... 4 Registering your application... 4 Authorization... 4 Refreshing an access token...7 Alfresco CMIS
Authenticate and authorize API with Apigility. by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team
Authenticate and authorize API with Apigility by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team About me Enrico Zimuel (@ezimuel) Software Engineer since 1996 PHP Engineer at Zend Technologies
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
OAuth: Where are we going?
OAuth: Where are we going? What is OAuth? OAuth and CSRF Redirection Token Reuse OAuth Grant Types 1 OAuth v1 and v2 "OAuth 2.0 at the hand of a developer with deep understanding of web security will likely
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
AIRTEL INDIA OPEN API. Application Developer Guide for OAuth2 Authentication and Authorization. Document Version 1.1
AIRTEL INDIA OPEN API Application Developer Guide for OAuth2 Authentication and Authorization Document Version 1.1 This Application Developer Guide has been prepared for Airtel India. Copyright Intel Corporation
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
Login with Amazon. Getting Started Guide for Websites. Version 1.0
Login with Amazon Getting Started Guide for Websites Version 1.0 Login with Amazon: Getting Started Guide for Websites Copyright 2016 Amazon Services, LLC or its affiliates. All rights reserved. Amazon
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
I) Add support for OAuth in CAS server
Table of contents I)Add support for OAuth in CAS server...2 II)How to add OAuth client support in CAS server?...3 A)Add dependency...3 B)Add the identity providers needed...3 C)Add the OAuth action in
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
vcommander will use SSL and session-based authentication to secure REST web services.
vcommander REST API Draft Proposal v1.1 1. Client Authentication vcommander will use SSL and session-based authentication to secure REST web services. 1. All REST API calls must take place over HTTPS 2.
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
OAuth 2.0. Weina Ma [email protected]
OAuth 2.0 Weina Ma [email protected] Agenda OAuth overview Simple example OAuth protocol workflow Server-side web application flow Client-side web application flow What s the problem As the web grows, more
OAuth Guide Release 6.0
[1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Access Gateway Guide Access Manager 4.0 SP1
Access Gateway Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
Advanced OpenEdge REST/Mobile Security
Advanced OpenEdge REST/Mobile Security Securing your OpenEdge Web applications Michael Jacobs August 2013 Legal Disclaimer The contents of these materials are confidential information of Progress Software
ACR Connect Authentication Service Developers Guide
ACR Connect Authentication Service Developers Guide Revision History Date Revised by Version Description 29/01/2015 Sergei Rusinov 1.0 Authentication using NRDR account Background The document describes
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
WHITE PAPER. Domo Advanced Architecture
WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization
Configuring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
Oracle Service Bus. Situation. Oracle Service Bus Primer. Product History and Evolution. Positioning. Usage Scenario
Oracle Service Bus Situation A service oriented architecture must be flexible for changing interfaces, transport protocols and server locations - service clients have to be decoupled from their implementation.
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
SuperOffice Pocket CRM
SuperOffice Pocket CRM Version 7.5 Installation Guide Page 1 Table of Contents Introduction... 3 Prerequisites... 3 Scenarios... 3 Recommended small scenario... 3 About this version... 4 Deployment planning...
Securing JAX-RS RESTful services. Miroslav Fuksa (software developer) Michal Gajdoš (software developer)
Securing JAX-RS RESTful services Miroslav Fuksa (software developer) Michal Gajdoš (software developer) The following is intended to outline our general product direction. It is intended for information
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS Java EE Components Java EE Vendor Specifications Containers Java EE Blueprint Services JDBC Data Sources Java Naming and Directory Interface Java Message
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Identity Server Guide Access Manager 4.0
Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF
Robert Honeyman Honeyman IT Consulting. http://www.honeymanit.co.uk [email protected]
Robert Honeyman Honeyman IT Consulting http://www.honeymanit.co.uk [email protected] Requirement for HA with SSO Centralized access control SPOF for dependent apps SSO failure = no protected
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
Force.com REST API Developer's Guide
Force.com REST API Developer's Guide Version 35.0, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Instant Chime for IBM Sametime For IBM Websphere and IBM DB2 Installation Guide
Instant Chime for IBM Sametime For IBM Websphere and IBM DB2 Installation Guide Fall 2014 Page 1 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license
Enterprise Access Control Patterns For REST and Web APIs
Enterprise Access Control Patterns For REST and Web APIs Francois Lascelles Layer 7 Technologies Session ID: STAR-402 Session Classification: intermediate Today s enterprise API drivers IAAS/PAAS distributed
UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON. Chad Watson Sr. Business Intelligence Developer
UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON Chad Watson Sr. Business Intelligence Developer UPGRADING TO XI 3.1 SP6 What Business Objects Administrators should consider before installing a Service Pack.
How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014
Adeptia Suite 6.2 Application Services Guide Release Date October 16, 2014 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 Document Information DOCUMENT INFORMATION
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style
Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features
SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features Dirk Olderdissen Solution Expert, Regional Presales EMEA SAP Brought to you by the Customer Experience Group 2014 SAP
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
Instant Chime for IBM Sametime Installation Guide for Apache Tomcat and Microsoft SQL
Instant Chime for IBM Sametime Installation Guide for Apache Tomcat and Microsoft SQL Spring 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license
Oracle WebLogic Server 11g Administration
Oracle WebLogic Server 11g Administration This course is designed to provide instruction and hands-on practice in installing and configuring Oracle WebLogic Server 11g. These tasks include starting and
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
ActiveVOS Clustering with JBoss
Clustering with JBoss Technical Note Version 1.2 29 December 2011 2011 Active Endpoints Inc. is a trademark of Active Endpoints, Inc. All other company and product names are the property of their respective
From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen
ENTERPRISE SECURITY WITH KEYCLOAK From the Intranet to Mobile By Divya Mehra and Stian Thorgersen PROJECT TIMELINE AGENDA THE OLD WAY Securing monolithic web app relatively easy Username and password
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
TIBCO Silver Fabric Continuity User s Guide
TIBCO Silver Fabric Continuity User s Guide Software Release 1.0 November 2014 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
