Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765]
|
|
|
- Loren Cain
- 10 years ago
- Views:
Transcription
1 Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765] Irena Shaigorodsky Java One, hops://github.com/ishaigor/rest- retro- sample 1
2 Quick Survey How many Use or plan to use rich REST based UI for sensi?ve informa?on? Know what OAuth is? Use or plan to use rich REST based UI with OAuth? Designed rich REST based UI with OAuth in mind before the audit? Use spring/spring- security/spring- security- Oauth? 2
3 Agenda Security Cost OAuth 2.0 Sample deep- dive 3
4 Why My Company Needs Security? Cost of security breach in US [1] $188 per record average size: 28,765 records customer loss Customer driven [1] 2013 Cost of Data Breach Study: Global Analysis by Ponemon Ins?tute sponsored by Symantec 4
5 OAuth 2.0 An open protocol to allow secure authoriza?on in a simple and standard method from web, mobile and desktop applica?ons. [1] The OAuth 2.0 authoriza?on framework enables a third- party applica?on to obtain limited access to an HTTP service. [1] [1] hop://oauth.net/ 5
6 OAuth 2.0 Lingo Resource Resource Owner Resource Server OAuth 2.0 scope OAuth 2.0 client Endpoints Authoriza?on Endpoint Token Endpoint Tokens Access Token Refresh Token Authoriza?on Grant 6 hop://wiki.scn.sap.com/wiki/display/security/oauth+2.0+terminology
7 OAuth 2.0 Flows Authoriza*on Code Grant Flow Google Facebook Resource Owner Password Creden?al Flow Client Creden?al Flow Implicit Grant Flow JavaScript client 7
8 Securing REST calls: OAuth 2.0 Authoriza?on Code Grant Flow hop://docs.oracle.com/cd/e39820_01/doc.11121/gateway_docs/content/images/oauth/oauth_web_server_flow.png 8
9 OAuth 2.0 Flows Authoriza?on Code Grant Flow Google Facebook Resource Owner Password Creden*al Flow Client Creden?al Flow Implicit Grant Flow JavaScript client 9
10 Securing REST calls: OAuth 2.0 Resource Owner Password Creden?al Flow 10 hop://docs.oracle.com/cd/e39820_01/doc.11121/gateway_docs/content/images/oauth/oauth_username_password_flow.png
11 OAuth 2.0 Flows Authoriza?on Code Grant Flow Google Facebook Resource Owner Password Creden?al Flow Client Creden*al Flow Implicit Grant Flow JavaScript client 11
12 Securing REST calls: OAuth 2.0 Client Creden?al Flow hop://docs.oracle.com/cd/e39820_01/doc.11121/gateway_docs/content/images/oauth/oauth_client_creden?als_flow.png 12
13 OAuth 2.0 Flows Authoriza?on Code Grant Flow Google Facebook Resource Owner Password Creden?al Flow Client Creden?al Flow Implicit Grant Flow JavaScript client 13
14 Securing REST calls: OAuth 2.0 Implicit Grant Flow hop://docs.oracle.com/cd/e39820_01/doc.11121/gateway_docs/content/images/oauth/oauth_user_agent_flow.png 14
15 Sample deep- dive hops://github.com/ishaigor/rest- retro- sample Unprotected JavaScript Widget Unprotected REST Words Service Spring MVC Legacy protected JSP / JavaScript Widget Spring Security AngularJS Protected Widget Protected service Spring Security OAuth Protected client Spring Security Oauth HTTP Authoriza?on Header Protected gateway Spring Integra?on Customiza?on 15
16 Meet the unprotected REST Service (Spring 16
17 Meet secure legacy client with unprotected Rich UI (Spring Security, Spring MVC, AngularJS) ng- infinite- scroll AbstractDispatcherServletIni?alizer springsecurityfilterchain Authen?ca?onManagerBuilder WebSecurity HOpSecurity Persistence Data source Group authori?es by user name 17
18 Spring Security: User Details 18
19 Meet secure legacy client with unprotected Rich UI (Spring Security, Spring MVC, AngularJS) cont d <%@ taglib prefix="authz" uri="hop:// <authz:authorize ifallgranted="role_user"> </ authz:authorize> 19
20 Sample deep- dive hops://github.com/ishaigor/rest- retro- sample Unprotected JavaScript Widget Unprotected REST Words Service Spring MVC Legacy protected JSP / JavaScript Widget Spring Security AngularJS Protected Widget Protected service Spring Security OAuth Protected client Spring Security Oauth HTTP Authoriza?on Header Protected gateway Spring Integra?on Customiza?on 20
21 Protected Service (Spring Security, Spring MVC) Authoriza?onServerConfigurerAdapter Authoriza?onServerEndpointsConfigurer Authoriza?onServerSecurityConfigurer OAuth2MethodSecurityExpressionHandler 21
22 Protected Service (Spring Security, Spring MVC) cont d ResourceServerConfigurerAdapter ResourceServerSecurityConfigurer HOpSecurity.csrf().requireCsrfProtec?onMatcher(new AntPathRequestMatcher("/ oauth/authorize")).disable() Persistence TokenStore ClientTokenServices Authoriza?onCodeServices ApprovalStore ApprovalStoreUserApprovalHandler 22
23 Protected Service (Spring Security, Spring MVC) cont d 23
24 Protected Service (Spring Security, Spring MVC): BaseOAuth2ProtectedResourceDetails Integra?onTest Integra?onTestHelper 24
25 Protected client, protected Rich UI (Spring Security, Spring MVC, Spring Security OAuth 2.0) Authen?ca?onManager erasecreden?als Applica?onListener<AbstractAuthen?ca?onEvent> ResourceOwnerPasswordAccessTokenProvider CustomAuthen?ca?onDetailsSource CustomAuthen?ca?onDetails WebAuthen?ca?onDetailsSource 25
26 Protected service with Spring Limita?ons: Added security overhead No unprotected internal access 26
27 Sample deep- dive hops://github.com/ishaigor/rest- retro- sample Unprotected JavaScript Widget Unprotected REST Words Service Spring MVC Legacy protected JSP / JavaScript Widget Spring Security AngularJS Protected Widget Protected service Spring Security OAuth Protected client Spring Security Oauth HTTP Authoriza?on Header Protected gateway Spring Integra?on Customiza?on 27
28 Security Gateway Pass Through with Spring Integra?on int- hop:inbound- gateway int- hop:outbound- gateway int:channel int:annota?on- config int- jmx:mbean- export 28
29 Security Gateway Pass Through with Spring Integra?on: customiza?on OutboundHeaderMapper RangeEnforcer CustomOAuth2WebSecurityExpressionHandler CustomSecurityExpressionMethods ClientHOpRequestFactory 29
30 Resources hop://oauth.net/2/ hop://projects.spring.io/spring- security/ hop://projects.spring.io/spring- security- oauth/ hops://github.com/ishaigor/rest- retro- sample hop://binarymuse.github.io/nginfinitescroll/ 30
31 Security Roadmap OAuth 2.0 Bearer for JavaScript /external REST IdP with SSO WS-Security /SAML for SOAP Digest / Signatures Encryption OAuth 2.0 SAML OAuth 2.0 MAC Address REST Services Exposure Merge user iden??es in a single directory Centralize iden?ty management Build secure APIs with our customers Other enhancements 31
32 Next steps on the road map: IdP with SSO IdP Iden?ty Provider centralized user directory Iden?ty management services Self- services Light linked iden??es from applica?on side SSO Single Sign On Central Authen?ca?on Service A library of clients for Java,.NET, PHP, Perl, Apache, uportal, and others Integrates with uportal, Sakai, BlueSocket, TikiWiki, Mule, Liferay, Moodle and others 32
33 33
How To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V
Configuring CAS-based SSO with ActiveVOS on Apache Tomcat Technical Note Version: 1.3 Dated: August 2013 2013 Informatica Corporation ActiveVOS is a trademark of Informatica, Inc. All other company and
OAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com @leastprivilege
OAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access control Windows/.NET
The Role of Identity Enabled Web Services in Cloud Computing
The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS. Single Sign-On (SSO) Solution
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS Single Sign-On (SSO) Solution For University Information Systems (UIS) May 9, 2013 2 University of Colorado
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough
Agenda Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough Enter OAuth 2.0 Defines authorization & authentication framework for RESTful APIs An open
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com @leastprivilege
Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com think mobile! Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access
Enterprise Access Control Patterns For REST and Web APIs
Enterprise Access Control Patterns For REST and Web APIs Francois Lascelles Layer 7 Technologies Session ID: STAR-402 Session Classification: intermediate Today s enterprise API drivers IAAS/PAAS distributed
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
SIP Authoriza.on Framework Use Cases. Rifaat Shekh- Yusef, Jon Peterson IETF 91, SIPCore WG Honolulu, Hawaii, USA November 13, 2014
SIP Authoriza.on Framework Use Cases Rifaat Shekh- Yusef, Jon Peterson IETF 91, SIPCore WG Honolulu, Hawaii, USA November 13, 2014 1 Overview AuthorizaLon Framework components: AuthenLcaLon: The process
Federated Identity and Single Sign-On using CA API Gateway
WHITE PAPER DECEMBER 2014 Federated Identity and Single Sign-On using Federation for websites, Web services, APIs and the Cloud K. Scott Morrison VP Engineering and Chief Architect 2 WHITE PAPER: FEDERATED
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Sakai and uportal Integration Options
Sakai and uportal Integration Options Cris J. Holdorph Unicon, Inc. 2008 JA-SIG Conference April 27 30, 2008 Copyright Unicon, Inc., 2008. This work is the intellectual property of Unicon, Inc. Permission
THE NEW DIGITAL EXPERIENCE
[email protected] SECURING THE NEW DIGITAL EXPERIENCE Dr Steffo Weber, Oracle BridgFilling the UX gap for mobile enterprise applications. May,-2014 Latest Entries Protecting IDPs from malformed SAML
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
Novell Access Manager
Novell Access Manager Product Overview Kiran Mova Agenda Introduction Architecture IDP AG SSL VPN Administration Console How it works? Web SSO Federation SSO Protect HTTP Resources Protect non-http Resources
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
Web Cloud Architecture
Web Cloud Architecture Introduction to Software Architecture Jay Urbain, Ph.D. [email protected] Credits: Ganesh Prasad, Rajat Taneja, Vikrant Todankar, How to Build Application Front-ends in a Service-Oriented
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
THE NEW DIGITAL EXPERIENCE
[email protected] [email protected] SECURING THE NEW DIGITAL EXPERIENCE Steffo Weber, Oracle & Max Liesegang, esentri BridgFilling the UX gap for mobile enterprise applications. May,-2014
Lost in Authentication CAS Clients and Best Practices
Lost in Authentication CAS Clients and Best Practices Parker Neff Software Architect Unicon, Inc. Bill Thompson Software Architect Unicon, Inc. Jasig 2011 Spotlight on Open Source Westin Westminster Denver,
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
Mastering health IT complexity with Fine-Grained REST APIs
Mastering health IT complexity with Fine-Grained REST APIs Orion Health White Paper Dale Moberg, Ph.D 1 Securing APIs The future shape of personalized and precise medicine rests on expectations of a deluge
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Developing an Interoperable Blackboard Proxy Tool
Developing an Interoperable Blackboard Proxy Tool George Kroner Developer Relations Engineer Blackboard Inc. Lance Neumann Sr. Software Architect Blackboard Inc. Agenda Building Blocks Proxy Tools Overview
Privileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
Replacing a commercial integration platform with an open source ESB. Magnus Larsson [email protected] Cadec 2010-01- 20
Replacing a commercial integration platform with an open source ESB Magnus Larsson [email protected] Cadec 2010-01- 20 Agenda The customer Phases Problem defini?on Proof of concepts
Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
Apigee Gateway Specifications
Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
Identity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
OAuth Guide Release 6.0
[1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Globus Auth. Steve Tuecke. The University of Chicago
Globus Auth Enabling an extensible, integrated ecosystem of services and applications for the research and education community. Steve Tuecke The University of Chicago Cloud has transformed how platforms
Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems [email protected]
Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems [email protected] Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service
NextRow - AEM Training Program Course Catalog
NextRow - AEM Training Program Course Catalog Adobe Experience Manager Training Program Course Catalog NextRow provides Adobe CQ training solutions designed to meet your unique project demands. To optimize
Keeping access control while moving to the cloud. Presented by Zdenek Nejedly Computing & Communications Services University of Guelph
Keeping access control while moving to the cloud Presented by Zdenek Nejedly Computing & Communications Services University of Guelph 1 Keeping access control while moving to the cloud Presented by Zdenek
Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy [email protected] CTO, Forum Systems
Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy [email protected] CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary
How To Build A Web App
UNCLASSIFIED Next Gen Web Architecture for the Cloud Era Chief Scientist, Raytheon Saturn 2013 28 Apr - 3 May Copyright (2013) Raytheon Agenda Existing Web Application Architecture SOFEA Lessons learned
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
Creating federated authorisation
Creating federated authorisation for a Django survey application Ed Crewe Background - the survey application Federated authorisation What do I mean by this? 1. Users login at a third party identity provider
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
User Management Interfaces for Earth Observation Services Abstract Test Suite
User Management Interfaces for Earth Observation Services Abstract Test Suite Primary Author Andrew Woolf, STFC Rutherford Appleton Laboratory Revision history Version Contributors Date Changes 0.1 Andrew
The Challenges of Web single sign-on
Serge Vereecke Security Architect IBM Security Services [email protected] The Challenges of Web single sign-on GSE Event September 7, 2012 Agenda Single sign-on technology Why single sign-on Challenges
Enable Your Applications for CAC and PIV Smart Cards
Enable Your Applications for CAC and PIV Smart Cards Executive Summary Since HSPD-2 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry [email protected]; Abstract. J2EE based Web applications have largely spread over our multiple
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V
Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V Agenda What is SSO? How does it work? Tools for SSO on ClearPath Integrating Active Directory
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps
Sofia Event Center 14-15 May 2014 Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps Radi Atanassov SharePoint MCM & MVP
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
Improving performance for security enabled web services. - Dr. Colm Ó héigeartaigh
Improving performance for security enabled web services - Dr. Colm Ó héigeartaigh Agenda Introduction to Apache CXF WS-Security in CXF 3.0.0 Securing Attachments in CXF 3.0.0 RS-Security in CXF 3.0.0 Some
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
BOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA
Open Source Identity and Access Management Expert Panel, Part II 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA slide 2 Expert Panel Emmanuel Lécharny, Apache Software Foundation Howard
SAML and OAUTH Technologies WebSphere Application Server
SAML and OAUTH Technologies WebSphere Application Server Bill O'Donnell STSM WebSphere Foundation Security Architect Session TAW-1701 Session TAW-1698 Please Note IBM s statements regarding its plans,
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
OAuth: Where are we going?
OAuth: Where are we going? What is OAuth? OAuth and CSRF Redirection Token Reuse OAuth Grant Types 1 OAuth v1 and v2 "OAuth 2.0 at the hand of a developer with deep understanding of web security will likely
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University
UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt. Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig
OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig Agenda 1. Motivation behind draft-maler-ace-oauth-uma-00.txt. 2. Mapping of existing
Passwords are for Chumps
Copyright 2014 Splunk Inc. Passwords are for Chumps David Veuve SE, Splunk Who Am I?! David Veuve Sales Engineer for Major Accounts in Northern California! [email protected]! Former Splunk Customer (For
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
Authen'cator Leakage Through Backup Channels on Android
Authen'cator Leakage Through Backup Channels on Android Guangdong Bai Na'onal University of Singapore Web services are increasingly delivered through mobile apps Social Networking Online Banking Email
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST
ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST Considerations for choosing a secure, scalable, and reliable enterprise mobile backend platform OVERVIEW Organizations often struggle with identifying
Interoperable Provisioning in a Distributed World
Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302 Contacts Mark Diodati ([email protected])
KBase and Globus Online Nexus. Shreyas Cholia NERSC/LBL
DOE Systems Biology Knowledgebase KBase and Globus Online Nexus Shreyas Cholia NERSC/LBL What is KBase? Knowledgebase enabling predic6ve systems biology. Powerful modeling framework. Community- driven,
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Cloud to Cloud Integrations with Force.com. Sandeep Bhanot Developer Evangelist @cloudysan
Cloud to Cloud Integrations with Force.com Sandeep Bhanot Developer Evangelist @cloudysan Safe Harbor Salesforce.com Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
This Record of activity confirms that Jonathan Scrase has completed the following courses within the Microsoft Virtual Academy:
Introduction to Office 365 Development DevOps - Visual Studio Release Management Jump Start Building Blocks: JavaScript and C# (Initialize) Cross-Platform Development with Visual Studio Introduction to
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
