Using ArcGIS with OAuth 2.0. Aaron CTO, Esri R&D Center Portland
|
|
|
- Scarlett Watts
- 9 years ago
- Views:
Transcription
1 Using ArcGIS with OAuth 2.0 Aaron CTO, Esri R&D Center Portland
2 Before OAuth Apps stored the user s password Apps got complete access to a user s account Users couldn t revoke access to an app except by changing their password Compromised apps exposed the user s password
3 Before OAuth Services recognized the problems with password authentication Many services implemented things similar to OAuth Flickr: FlickrAuth frobs and tokens - Google: AuthSub - Facebook: requests signed with MD5 hashes - Yahoo: BBAuth ( Browser-Based Auth )
4 The OAuth 2.0 Spec
5 Definitions Resource Owner: The User Resource Server: The API Authorization Server: Often the same as the API server Client: The Third-Party Application
6 Use Cases Web-server apps Browser-based apps Username/password access Application access Mobile apps
7 Use Cases Grant Types Web-server apps authorization_code Browser-based apps implicit Application access client_credentials Mobile apps implicit
8 Creating an App
9 developers.arcgis.com
10 Create an Application
11 Get your app s client_id
12 Set the redirect_uri
13 Mobile Apps Implicit Grant
14 Create a Sign-In Button
15 Launch Safari to the ArcGIS Online Authorization Endpoint github.com/esri/oauth2-demo-ios
16 The User Signs In
17 Redirect back to your app ArcGIS Online redirects back to your app using a custom URI scheme. Access token is included in the redirect, just like browser-based apps. oauthdemo://auth #access_token=baaeemo2nocqbaffoertd
18 Parse the token from the URL github.com/esri/oauth2-demo-ios
19 The User is Signed In!
20 Mobile Apps Use the Implicit grant type No server-side code needed Client secret not used Mobile app makes API requests directly
21 Web Server Apps Authorization Code Grant
22 Create a Log In link Link to: oauth2/authorize? response_type=code&client_id=your_cli ENT_ID&redirect_uri=REDIRECT_URI
23 Create a Log In link Link to: oauth2/authorize? response_type=code&client_id=your_cli ENT_ID&redirect_uri=REDIRECT_URI
24 Create a Log In link Link to: oauth2/authorize? response_type=code&client_id=your_cli ENT_ID&redirect_uri=REDIRECT_URI
25 Create a Log In link Link to: oauth2/authorize? response_type=code&client_id=your_cli ENT_ID&redirect_uri=REDIRECT_URI
26 User visits the authorization page authorize? response_type=code&client_id=your_client_id &redirect_uri=redirect_uri
27 On success, user is redirected back to your site with auth code On error, user is redirected back to your site with error code
28 Server exchanges auth code for an access token Your server makes the following request POST sharing/oauth2/token Post Body: grant_type=authorization_code &code=code_from_query_string &redirect_uri=redirect_uri &client_id=your_client_id &client_secret=your_client_secret
29 Server exchanges auth code for an access token Your server gets a response like the following { "access_token":"rst5o30zqmlgv3ia", "expires_in":3600, "refresh_token":"e1qok2rrua48lxi, "username":"aaronpk" } or if there was an error { } "error":"invalid_request"
30 Browser-Based Apps Implicit Grant
31 Create a Log In link Link to: oauth2/authorize? response_type=token&client_id=your_cl IENT_ID&redirect_uri=REDIRECT_URI
32 User visits the authorization page authorize? response_type=token&client_id=your_client_id &redirect_uri=redirect_uri
33 On success, user is redirected back to your site with the access token in the fragment On error, user is redirected back to your site with error code
34 Browser-Based Apps Use the Implicit grant type No server-side code needed Client secret not used Browser makes API requests directly
35 Grant Type Summary authorization_code: Web-server apps implicit: Mobile and browser-based apps password: Username/password access client_credentials: Application access
36 Authorization Code User visits auth page response_type=code User is redirected to your site with auth code Your server exchanges auth code for access token POST /token code=xxxxxxx&grant_type=authorization_cod e
37 Implicit User visits auth page response_type=token User is redirected to your site with access token Token is only available to the browser since it s in the fragment
38 Client Credentials Your server exchanges client ID/secret for access token POST /token client_id=xxxxxxx&client_secret=yyyyyyy& grant_type=client_credentials
39 Application Access Client Credentials Grant
40 Client Credentials Grant POST sharing/oauth2/token Post Body: grant_type=client_credentials &client_id=your_client_id &client_secret=your_client_secret Response: { } "access_token":"rst5ojbzrn430zqmlgv3ia", "expires_in":3600
41 Accessing Resources So you have an access token. Now what?
42 Use the access token to make requests Now you can make requests using the access token. GET
43 Eventually the access token may expire When you make a request with an expired token, you will get this response { } "error":"expired_token" Now you need to get a new access token!
44 Get a new access token using a refresh token Your server makes the following request POST oauth2/token grant_type=refresh_token &reresh_token=e1qoxg7ik2rrua48lxiv &client_id=your_client_id &client_secret=your_client_secret Your server gets a similar response as the original call to oauth/token with new tokens. { "access_token":"rst5ojbzrn430zqmlgv3ia", "expires_in":3600, "username":"aaronpk" }
45 Other
46 developers.arcgis.com/en/authentication/
47 oauth.net/2
48 Links github.com/esri/oauth2-demo-ios developers.arcgis.com
49 github.com/aaronpk
OAuth 2.0. Weina Ma [email protected]
OAuth 2.0 Weina Ma [email protected] Agenda OAuth overview Simple example OAuth protocol workflow Server-side web application flow Client-side web application flow What s the problem As the web grows, more
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
ACR Connect Authentication Service Developers Guide
ACR Connect Authentication Service Developers Guide Revision History Date Revised by Version Description 29/01/2015 Sergei Rusinov 1.0 Authentication using NRDR account Background The document describes
Web 2.0 Lecture 9: OAuth and OpenID
Web 2.0 Lecture 9: OAuth and OpenID doc. Ing. Tomáš Vitvar, Ph.D. [email protected] @TomasVitvar http://www.vitvar.com Leopold-Franzens Universität Innsbruck and Czech Technical University in Prague Faculty
Traitware Authentication Service Integration Document
Traitware Authentication Service Integration Document February 2015 V1.1 Secure and simplify your digital life. Integrating Traitware Authentication This document covers the steps to integrate Traitware
Authenticate and authorize API with Apigility. by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team
Authenticate and authorize API with Apigility by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team About me Enrico Zimuel (@ezimuel) Software Engineer since 1996 PHP Engineer at Zend Technologies
Security and ArcGIS Web Development. Heather Gonzago and Jeremy Bartley
Security and ArcGIS Web Development Heather Gonzago and Jeremy Bartley Agenda Types of apps Traditional token-based authentication OAuth2 authentication User login authentication Application authentication
EHR OAuth 2.0 Security
Hospital Health Information System EU HIS Contract No. IPA/2012/283-805 EHR OAuth 2.0 Security Final version July 2015 Visibility: Restricted Target Audience: EHR System Architects EHR Developers EPR Systems
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
Social Application Guide
Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved
Login with Amazon. Getting Started Guide for Websites. Version 1.0
Login with Amazon Getting Started Guide for Websites Version 1.0 Login with Amazon: Getting Started Guide for Websites Copyright 2016 Amazon Services, LLC or its affiliates. All rights reserved. Amazon
OAuth: Where are we going?
OAuth: Where are we going? What is OAuth? OAuth and CSRF Redirection Token Reuse OAuth Grant Types 1 OAuth v1 and v2 "OAuth 2.0 at the hand of a developer with deep understanding of web security will likely
How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For
GETTING STARTED WITH KITEWORKS DEVELOPER GUIDE Version 1.0 Version 1.0 Copyright 2014 Accellion, Inc. All rights reserved. These products, documents, and materials are protected by copyright law and distributed
Login with Amazon. Developer Guide for Websites
Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.
Configuration Guide - OneDesk to SalesForce Connector
Configuration Guide - OneDesk to SalesForce Connector Introduction The OneDesk to SalesForce Connector allows users to capture customer feedback and issues in OneDesk without leaving their familiar SalesForce
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
OAuth 2.0: Theory and Practice. Daniel Correia Pedro Félix
OAuth 2.0: Theory and Practice Daniel Correia Pedro Félix 1 whoami Daniel Correia Fast learner Junior Software Engineer Passionate about everything Web-related Currently working with the SAPO SDB team
Salesforce Opportunities Portlet Documentation v2
Salesforce Opportunities Portlet Documentation v2 From ACA IT-Solutions Ilgatlaan 5C 3500 Hasselt [email protected] Date 29.04.2014 This document will describe how the Salesforce Opportunities portlet
Enterprise Access Control Patterns For REST and Web APIs
Enterprise Access Control Patterns For REST and Web APIs Francois Lascelles Layer 7 Technologies Session ID: STAR-402 Session Classification: intermediate Today s enterprise API drivers IAAS/PAAS distributed
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
#07 Web Security CLIENT/SERVER COMPUTING AND WEB TECHNOLOGIES
1 Major security issues 2 #07 Web Security CLIENT/SERVER COMPUTING AND WEB TECHNOLOGIES Prevent unauthorized users from accessing sensitive data Authentication: identifying users to determine if they are
2-FACTOR AUTHENTICATION WITH
2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Force.com REST API Developer's Guide
Force.com REST API Developer's Guide Version 35.0, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Mashery OAuth 2.0 Implementation Guide
Mashery OAuth 2.0 Implementation Guide June 2012 Revised: 7/18/12 www.mashery.com Mashery, Inc. 717 Market Street, Suite 300 San Francisco, CA 94103 Contents C hapter 1. About this Guide...5 Introduction...
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
AIRTEL INDIA OPEN API. Application Developer Guide for OAuth2 Authentication and Authorization. Document Version 1.1
AIRTEL INDIA OPEN API Application Developer Guide for OAuth2 Authentication and Authorization Document Version 1.1 This Application Developer Guide has been prepared for Airtel India. Copyright Intel Corporation
Office365Mon Developer API
Office365Mon Developer API Office365Mon provides a set of services for retrieving report data, and soon for managing subscriptions. This document describes how you can create an application to programmatically
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios
BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios 2 OpenTopic TOC Contents What is BIG-IP Edge Client app for ios?... 3 About supported authentication types... 3 About establishing
www.store.belvg.com skype ID: store.belvg email: [email protected] US phone number: +1-424-253-0801
1 Table of Contents Table of Contents: 1. Introduction to Google+ All in One... 3 2. How to Install... 4 3. How to Create Google+ App... 5 4. How to Configure... 8 5. How to Use... 13 2 Introduction to
Authorization and Authentication
CHAPTER 2 Cisco WebEx Social API requests must come through an authorized API consumer or API client and be issued by an authenticated Cisco WebEx Social user. The Cisco WebEx Social API uses the Open
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Research on the Security of OAuth-Based Single Sign-On Service
Research on the Security of OAuth-Based Single Sign-On Service R. Zhu 1,2, J. Xiang 1,2, and D. Zha 3 1 Data Assurance and Communication Security Research Center, CAS, Beijing, China 2 State Key Laboratory
Globus Auth. Steve Tuecke. The University of Chicago
Globus Auth Enabling an extensible, integrated ecosystem of services and applications for the research and education community. Steve Tuecke The University of Chicago Cloud has transformed how platforms
RCS Liferay Google Analytics Portlet Installation Guide
RCS Liferay Google Analytics Portlet Installation Guide Document Revisions Date Revision By 07/02/12 1 Pablo Rendón 2 Table of Contents RCS Liferay-Google Analytics...1 Document Revisions...2 General Description...4
Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014
Adeptia Suite 6.2 Application Services Guide Release Date October 16, 2014 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 Document Information DOCUMENT INFORMATION
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
I) Add support for OAuth in CAS server
Table of contents I)Add support for OAuth in CAS server...2 II)How to add OAuth client support in CAS server?...3 A)Add dependency...3 B)Add the identity providers needed...3 C)Add the OAuth action in
OAuth. Network Security. Online Services and Private Data. A real-life example. Material and Credits. OAuth. OAuth
Network Security Dr. Ing. Simone Cirani Parma, May 28th, 2013 Online Services and Private Data The evolution of online services, such as social networks, has had a huge impact on the amount of data and
GoCoin: Merchant integration guide
GoCoin: Merchant integration guide More information can be found at help.gocoin.com Preface This guide is intended for Merchants who wish to use the GoCoin API to accept and process payments in Cryptocurrency.
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Administering Jive for Outlook
Administering Jive for Outlook TOC 2 Contents Administering Jive for Outlook...3 System Requirements...3 Installing the Plugin... 3 Installing the Plugin... 3 Client Installation... 4 Resetting the Binaries...4
Comparative analysis - Web-based Identity Management Systems
Comparative analysis - Web-based Identity Management Systems Oscar Manso, Morten Christiansen and Gert Mikkelsen THE ALEXANDRA INSTITUTE 15 December 2014 2/45 Contents 1. Introduction... 2 2. Current State
Developing Applications with Salesforce Chatter
Developing Applications with Salesforce Chatter Rakesh Gupta Sagar Pareek Chapter No. 5 "Understanding Chatter REST API" In this package, you will find: A Biography of the authors of the book A preview
Simple But Not Secure: An Empirical Security Analysis of OAuth 2.0-Based Single Sign-On Systems
Simple But Not Secure: An Empirical Security Analysis of OAuth 2.0-Based Single Sign-On Systems San-Tsai Sun University of British Columbia Vancouver, Canada [email protected] ABSTRACT Social login is
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Enabling SSO for native applications
Enabling SSO for native applications Paul Madsen Ping Identity Session ID: IAM F42B Session Classification: Intermediate Mobile Modes Source - 'How to Connect with Mobile Consumers' Yahoo! Overview Enterprise
itds OAuth Integration Paterva itds OAuth Integration Building and re-using OAuth providers within Maltego 2014/09/22
Paterva itds OAuth Integration itds OAuth Integration Building and re-using OAuth providers within Maltego AM 2014/09/22 Contents Maltego OAuth Integration... 3 Introduction... 3 OAuth within the Maltego
Google Cloud Print Administrator Configuration Guide
Google Cloud Print Administrator Configuration Guide 1 December, 2014 Advanced Customer Technologies Ricoh AMERICAS Holdings, Inc. Table of Contents Scope and Purpose... 4 Overview... 4 System Requirements...
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
Implementing 2-Legged OAuth in Javascript (and CloudTest)
Implementing 2-Legged OAuth in Javascript (and CloudTest) Introduction If you re reading this you are probably looking for information on how to implement 2-Legged OAuth in Javascript. I recently had to
Identity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com @leastprivilege
Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com think mobile! Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Title page. Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7
Title page Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7 APPLICATION API DEVELOPER GUIDE 3HE-10590-AAAA-TQZZA Issue 1 December 2015 Legal notice Legal notice Alcatel, Lucent, Alcatel-Lucent and the
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server This blog will explain how to use Microsoft Azure as a Federated Authenticator for WSO2 Identity Server 5.0.0. In this example
Salesforce Integration User Guide Version 1.1
1 Introduction Occasionally, a question or comment in customer community forum cannot be resolved right away by a community manager and must be escalated to another employee via a CRM system. Vanilla s
Yandex.Money API API for Apps
16.10.2014 .. Version 1.8 Document build date: 16.10.2014. This volume is a part of Yandex technical documentation. Yandex helpdesk site: http://help.yandex.ru 2008 2014 Yandex LLC. All rights reserved.
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Page 1 Introduction The ecommerce Hub provides a uniform API to allow applications to use various endpoints such as Shopify. The following
Cryptonite. SSO: Single Sign-On Security Overview. Áron SZABÓ. H.A.C.K. Hackerspace Budapest (hsbp.org) 2015-04-10
Cryptonite SSO: Single Sign-On Security Overview Áron SZABÓ H.A.C.K. Hackerspace Budapest (hsbp.org) 2015-04-10 1 Single Sign-On protocols Kerberos + RADIUS/DIAMETER + LDAP IETF RFC 4120 The Kerberos Network
Securing RESTful Web Services Using Spring and OAuth 2.0
Securing RESTful Web Services Using Spring and OAuth 2.0 1.0 EXECUTIVE SUMMARY While the market is hugely 1 accepting REST based architectures due to their light weight nature, there is a strong need to
Remote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
Absorb Single Sign-On (SSO) V3.0
Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and
Qlik REST Connector Installation and User Guide
Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All
Mobile Banking. Click To Begin
Mobile Banking Click To Begin Click On Your Type Of Phone iphone Please select the method you would like to use for accessing your account from the options below: APP (Downloadable Application from itunes)
MYOB EXO BUSINESS WHITE PAPER
MYOB EXO BUSINESS WHITE PAPER Social Media in MYOB EXO Business EXO BUSINESS MYOB ENTERPRISE SOLUTIONS Contents Introduction... 3 How Social Media Integration Works... 3 The Authentication Process... 3
Portal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
docs.hortonworks.com
docs.hortonworks.com Hortonworks Data Platform: Administering Ambari Copyright 2012-2015 Hortonworks, Inc. Some rights reserved. The Hortonworks Data Platform, powered by Apache Hadoop, is a massively
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Google Drive. Administrator's Guide
Google Drive Administrator's Guide November 2015 www.lexmark.com Contents 2 Contents Overview... 3 Configuring the application...4 Acquiring a Google account... 4 Accessing the configuration page for the
This manual will illustrate how to integrate your WordPress Blog or website with the Docebo Learning Management System.
This manual will illustrate how to integrate your WordPress Blog or website with the Docebo Learning Management System. Direct Log in: The Docebo LMS offers a login box that can be added to you WordPress
Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough
Agenda Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough Enter OAuth 2.0 Defines authorization & authentication framework for RESTful APIs An open
Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice
Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair
Using the Educator Dashboard
Reference Guide Using the Educator Dashboard What s Inside How to Create Accounts Get to Know the Educator Dashboard How to Manage Licenses and Create Educators How to Give Accommodations to Students First
An Oracle White Paper Dec 2013. Oracle Access Management OAuth Service
An Oracle White Paper Dec 2013 Oracle Access Management OAuth Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
OAuth Guide Release 6.0
[1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Secure Coding SSL, SOAP and REST. Astha Singhal Product Security Engineer salesforce.com
Secure Coding SSL, SOAP and REST Astha Singhal Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may
SETTING UP YOUR JAVA DEVELOPER ENVIRONMENT
SETTING UP YOUR JAVA DEVELOPER ENVIRONMENT Summary This tipsheet describes how to set up your local developer environment for integrating with Salesforce. This tipsheet describes how to set up your local
