Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765]

Size: px
Start display at page:

Download "Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765]"

Transcription

1 Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765] Irena Shaigorodsky Java One, hops://github.com/ishaigor/rest- retro- sample 1

2 Quick Survey How many Use or plan to use rich REST based UI for sensi?ve informa?on? Know what OAuth is? Use or plan to use rich REST based UI with OAuth? Designed rich REST based UI with OAuth in mind before the audit? Use spring/spring- security/spring- security- Oauth? 2

3 Agenda Security Cost OAuth 2.0 Sample deep- dive 3

4 Why My Company Needs Security? Cost of security breach in US [1] $188 per record average size: 28,765 records customer loss Customer driven [1] 2013 Cost of Data Breach Study: Global Analysis by Ponemon Ins?tute sponsored by Symantec 4

5 OAuth 2.0 An open protocol to allow secure authoriza?on in a simple and standard method from web, mobile and desktop applica?ons. [1] The OAuth 2.0 authoriza?on framework enables a third- party applica?on to obtain limited access to an HTTP service. [1] [1] hop://oauth.net/ 5

6 OAuth 2.0 Lingo Resource Resource Owner Resource Server OAuth 2.0 scope OAuth 2.0 client Endpoints Authoriza?on Endpoint Token Endpoint Tokens Access Token Refresh Token Authoriza?on Grant 6 hop://wiki.scn.sap.com/wiki/display/security/oauth+2.0+terminology

7 OAuth 2.0 Flows Authoriza*on Code Grant Flow Google Facebook Resource Owner Password Creden?al Flow Client Creden?al Flow Implicit Grant Flow JavaScript client 7

8 Securing REST calls: OAuth 2.0 Authoriza?on Code Grant Flow hop://docs.oracle.com/cd/e39820_01/doc.11121/gateway_docs/content/images/oauth/oauth_web_server_flow.png 8

9 OAuth 2.0 Flows Authoriza?on Code Grant Flow Google Facebook Resource Owner Password Creden*al Flow Client Creden?al Flow Implicit Grant Flow JavaScript client 9

10 Securing REST calls: OAuth 2.0 Resource Owner Password Creden?al Flow 10 hop://docs.oracle.com/cd/e39820_01/doc.11121/gateway_docs/content/images/oauth/oauth_username_password_flow.png

11 OAuth 2.0 Flows Authoriza?on Code Grant Flow Google Facebook Resource Owner Password Creden?al Flow Client Creden*al Flow Implicit Grant Flow JavaScript client 11

12 Securing REST calls: OAuth 2.0 Client Creden?al Flow hop://docs.oracle.com/cd/e39820_01/doc.11121/gateway_docs/content/images/oauth/oauth_client_creden?als_flow.png 12

13 OAuth 2.0 Flows Authoriza?on Code Grant Flow Google Facebook Resource Owner Password Creden?al Flow Client Creden?al Flow Implicit Grant Flow JavaScript client 13

14 Securing REST calls: OAuth 2.0 Implicit Grant Flow hop://docs.oracle.com/cd/e39820_01/doc.11121/gateway_docs/content/images/oauth/oauth_user_agent_flow.png 14

15 Sample deep- dive hops://github.com/ishaigor/rest- retro- sample Unprotected JavaScript Widget Unprotected REST Words Service Spring MVC Legacy protected JSP / JavaScript Widget Spring Security AngularJS Protected Widget Protected service Spring Security OAuth Protected client Spring Security Oauth HTTP Authoriza?on Header Protected gateway Spring Integra?on Customiza?on 15

16 Meet the unprotected REST Service (Spring 16

17 Meet secure legacy client with unprotected Rich UI (Spring Security, Spring MVC, AngularJS) ng- infinite- scroll AbstractDispatcherServletIni?alizer springsecurityfilterchain Authen?ca?onManagerBuilder WebSecurity HOpSecurity Persistence Data source Group authori?es by user name 17

18 Spring Security: User Details 18

19 Meet secure legacy client with unprotected Rich UI (Spring Security, Spring MVC, AngularJS) cont d <%@ taglib prefix="authz" uri="hop:// <authz:authorize ifallgranted="role_user"> </ authz:authorize> 19

20 Sample deep- dive hops://github.com/ishaigor/rest- retro- sample Unprotected JavaScript Widget Unprotected REST Words Service Spring MVC Legacy protected JSP / JavaScript Widget Spring Security AngularJS Protected Widget Protected service Spring Security OAuth Protected client Spring Security Oauth HTTP Authoriza?on Header Protected gateway Spring Integra?on Customiza?on 20

21 Protected Service (Spring Security, Spring MVC) Authoriza?onServerConfigurerAdapter Authoriza?onServerEndpointsConfigurer Authoriza?onServerSecurityConfigurer OAuth2MethodSecurityExpressionHandler 21

22 Protected Service (Spring Security, Spring MVC) cont d ResourceServerConfigurerAdapter ResourceServerSecurityConfigurer HOpSecurity.csrf().requireCsrfProtec?onMatcher(new AntPathRequestMatcher("/ oauth/authorize")).disable() Persistence TokenStore ClientTokenServices Authoriza?onCodeServices ApprovalStore ApprovalStoreUserApprovalHandler 22

23 Protected Service (Spring Security, Spring MVC) cont d 23

24 Protected Service (Spring Security, Spring MVC): BaseOAuth2ProtectedResourceDetails Integra?onTest Integra?onTestHelper 24

25 Protected client, protected Rich UI (Spring Security, Spring MVC, Spring Security OAuth 2.0) Authen?ca?onManager erasecreden?als Applica?onListener<AbstractAuthen?ca?onEvent> ResourceOwnerPasswordAccessTokenProvider CustomAuthen?ca?onDetailsSource CustomAuthen?ca?onDetails WebAuthen?ca?onDetailsSource 25

26 Protected service with Spring Limita?ons: Added security overhead No unprotected internal access 26

27 Sample deep- dive hops://github.com/ishaigor/rest- retro- sample Unprotected JavaScript Widget Unprotected REST Words Service Spring MVC Legacy protected JSP / JavaScript Widget Spring Security AngularJS Protected Widget Protected service Spring Security OAuth Protected client Spring Security Oauth HTTP Authoriza?on Header Protected gateway Spring Integra?on Customiza?on 27

28 Security Gateway Pass Through with Spring Integra?on int- hop:inbound- gateway int- hop:outbound- gateway int:channel int:annota?on- config int- jmx:mbean- export 28

29 Security Gateway Pass Through with Spring Integra?on: customiza?on OutboundHeaderMapper RangeEnforcer CustomOAuth2WebSecurityExpressionHandler CustomSecurityExpressionMethods ClientHOpRequestFactory 29

30 Resources hop://oauth.net/2/ hop://projects.spring.io/spring- security/ hop://projects.spring.io/spring- security- oauth/ hops://github.com/ishaigor/rest- retro- sample hop://binarymuse.github.io/nginfinitescroll/ 30

31 Security Roadmap OAuth 2.0 Bearer for JavaScript /external REST IdP with SSO WS-Security /SAML for SOAP Digest / Signatures Encryption OAuth 2.0 SAML OAuth 2.0 MAC Address REST Services Exposure Merge user iden??es in a single directory Centralize iden?ty management Build secure APIs with our customers Other enhancements 31

32 Next steps on the road map: IdP with SSO IdP Iden?ty Provider centralized user directory Iden?ty management services Self- services Light linked iden??es from applica?on side SSO Single Sign On Central Authen?ca?on Service A library of clients for Java,.NET, PHP, Perl, Apache, uportal, and others Integrates with uportal, Sakai, BlueSocket, TikiWiki, Mule, Liferay, Moodle and others 32

33 33

How To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V

How To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V Configuring CAS-based SSO with ActiveVOS on Apache Tomcat Technical Note Version: 1.3 Dated: August 2013 2013 Informatica Corporation ActiveVOS is a trademark of Informatica, Inc. All other company and

More information

OAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com @leastprivilege

OAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com @leastprivilege OAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access control Windows/.NET

More information

The Role of Identity Enabled Web Services in Cloud Computing

The Role of Identity Enabled Web Services in Cloud Computing The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions

More information

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS. Single Sign-On (SSO) Solution

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS. Single Sign-On (SSO) Solution UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS Single Sign-On (SSO) Solution For University Information Systems (UIS) May 9, 2013 2 University of Colorado

More information

Architecture of Enterprise Applications III Single Sign-On

Architecture of Enterprise Applications III Single Sign-On Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]

More information

Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough

Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough Agenda Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough Enter OAuth 2.0 Defines authorization & authentication framework for RESTful APIs An open

More information

OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900

OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4

More information

Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com @leastprivilege

Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com @leastprivilege Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com think mobile! Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access

More information

Enterprise Access Control Patterns For REST and Web APIs

Enterprise Access Control Patterns For REST and Web APIs Enterprise Access Control Patterns For REST and Web APIs Francois Lascelles Layer 7 Technologies Session ID: STAR-402 Session Classification: intermediate Today s enterprise API drivers IAAS/PAAS distributed

More information

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

SIP Authoriza.on Framework Use Cases. Rifaat Shekh- Yusef, Jon Peterson IETF 91, SIPCore WG Honolulu, Hawaii, USA November 13, 2014

SIP Authoriza.on Framework Use Cases. Rifaat Shekh- Yusef, Jon Peterson IETF 91, SIPCore WG Honolulu, Hawaii, USA November 13, 2014 SIP Authoriza.on Framework Use Cases Rifaat Shekh- Yusef, Jon Peterson IETF 91, SIPCore WG Honolulu, Hawaii, USA November 13, 2014 1 Overview AuthorizaLon Framework components: AuthenLcaLon: The process

More information

Federated Identity and Single Sign-On using CA API Gateway

Federated Identity and Single Sign-On using CA API Gateway WHITE PAPER DECEMBER 2014 Federated Identity and Single Sign-On using Federation for websites, Web services, APIs and the Cloud K. Scott Morrison VP Engineering and Chief Architect 2 WHITE PAPER: FEDERATED

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

Sakai and uportal Integration Options

Sakai and uportal Integration Options Sakai and uportal Integration Options Cris J. Holdorph Unicon, Inc. 2008 JA-SIG Conference April 27 30, 2008 Copyright Unicon, Inc., 2008. This work is the intellectual property of Unicon, Inc. Permission

More information

THE NEW DIGITAL EXPERIENCE

THE NEW DIGITAL EXPERIENCE [email protected] SECURING THE NEW DIGITAL EXPERIENCE Dr Steffo Weber, Oracle BridgFilling the UX gap for mobile enterprise applications. May,-2014 Latest Entries Protecting IDPs from malformed SAML

More information

TrustedX: eidas Platform

TrustedX: eidas Platform TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?

More information

Novell Access Manager

Novell Access Manager Novell Access Manager Product Overview Kiran Mova Agenda Introduction Architecture IDP AG SSL VPN Administration Console How it works? Web SSO Federation SSO Protect HTTP Resources Protect non-http Resources

More information

OpenLogin: PTA, SAML, and OAuth/OpenID

OpenLogin: PTA, SAML, and OAuth/OpenID OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating

More information

Web Cloud Architecture

Web Cloud Architecture Web Cloud Architecture Introduction to Software Architecture Jay Urbain, Ph.D. [email protected] Credits: Ganesh Prasad, Rajat Taneja, Vikrant Todankar, How to Build Application Front-ends in a Service-Oriented

More information

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal

More information

THE NEW DIGITAL EXPERIENCE

THE NEW DIGITAL EXPERIENCE [email protected] [email protected] SECURING THE NEW DIGITAL EXPERIENCE Steffo Weber, Oracle & Max Liesegang, esentri BridgFilling the UX gap for mobile enterprise applications. May,-2014

More information

Lost in Authentication CAS Clients and Best Practices

Lost in Authentication CAS Clients and Best Practices Lost in Authentication CAS Clients and Best Practices Parker Neff Software Architect Unicon, Inc. Bill Thompson Software Architect Unicon, Inc. Jasig 2011 Spotlight on Open Source Westin Westminster Denver,

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Mastering health IT complexity with Fine-Grained REST APIs

Mastering health IT complexity with Fine-Grained REST APIs Mastering health IT complexity with Fine-Grained REST APIs Orion Health White Paper Dale Moberg, Ph.D 1 Securing APIs The future shape of personalized and precise medicine rests on expectations of a deluge

More information

JVA-122. Secure Java Web Development

JVA-122. Secure Java Web Development JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard

More information

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal

More information

Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011

Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011 Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features

More information

Developing an Interoperable Blackboard Proxy Tool

Developing an Interoperable Blackboard Proxy Tool Developing an Interoperable Blackboard Proxy Tool George Kroner Developer Relations Engineer Blackboard Inc. Lance Neumann Sr. Software Architect Blackboard Inc. Agenda Building Blocks Proxy Tools Overview

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Replacing a commercial integration platform with an open source ESB. Magnus Larsson [email protected] Cadec 2010-01- 20

Replacing a commercial integration platform with an open source ESB. Magnus Larsson magnus.larsson@callistaenterprise.se Cadec 2010-01- 20 Replacing a commercial integration platform with an open source ESB Magnus Larsson [email protected] Cadec 2010-01- 20 Agenda The customer Phases Problem defini?on Proof of concepts

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Apigee Gateway Specifications

Apigee Gateway Specifications Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption

More information

Axway API Gateway. Version 7.4.1

Axway API Gateway. Version 7.4.1 O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Mobile Security. Policies, Standards, Frameworks, Guidelines

Mobile Security. Policies, Standards, Frameworks, Guidelines Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf

More information

OAuth Guide Release 6.0

OAuth Guide Release 6.0 [1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

Globus Auth. Steve Tuecke. The University of Chicago

Globus Auth. Steve Tuecke. The University of Chicago Globus Auth Enabling an extensible, integrated ecosystem of services and applications for the research and education community. Steve Tuecke The University of Chicago Cloud has transformed how platforms

More information

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems [email protected]

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems jmacy@forumsys.com Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems [email protected] Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service

More information

NextRow - AEM Training Program Course Catalog

NextRow - AEM Training Program Course Catalog NextRow - AEM Training Program Course Catalog Adobe Experience Manager Training Program Course Catalog NextRow provides Adobe CQ training solutions designed to meet your unique project demands. To optimize

More information

Keeping access control while moving to the cloud. Presented by Zdenek Nejedly Computing & Communications Services University of Guelph

Keeping access control while moving to the cloud. Presented by Zdenek Nejedly Computing & Communications Services University of Guelph Keeping access control while moving to the cloud Presented by Zdenek Nejedly Computing & Communications Services University of Guelph 1 Keeping access control while moving to the cloud Presented by Zdenek

More information

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud

More information

How To Use Salesforce Identity Features

How To Use Salesforce Identity Features Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy [email protected] CTO, Forum Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy [email protected] CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary

More information

How To Build A Web App

How To Build A Web App UNCLASSIFIED Next Gen Web Architecture for the Cloud Era Chief Scientist, Raytheon Saturn 2013 28 Apr - 3 May Copyright (2013) Raytheon Agenda Existing Web Application Architecture SOFEA Lessons learned

More information

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011 NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity

More information

Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540

Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...

More information

Creating federated authorisation

Creating federated authorisation Creating federated authorisation for a Django survey application Ed Crewe Background - the survey application Federated authorisation What do I mean by this? 1. Users login at a third party identity provider

More information

Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)

Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its

More information

User Management Interfaces for Earth Observation Services Abstract Test Suite

User Management Interfaces for Earth Observation Services Abstract Test Suite User Management Interfaces for Earth Observation Services Abstract Test Suite Primary Author Andrew Woolf, STFC Rutherford Appleton Laboratory Revision history Version Contributors Date Changes 0.1 Andrew

More information

The Challenges of Web single sign-on

The Challenges of Web single sign-on Serge Vereecke Security Architect IBM Security Services [email protected] The Challenges of Web single sign-on GSE Event September 7, 2012 Agenda Single sign-on technology Why single sign-on Challenges

More information

Enable Your Applications for CAC and PIV Smart Cards

Enable Your Applications for CAC and PIV Smart Cards Enable Your Applications for CAC and PIV Smart Cards Executive Summary Since HSPD-2 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and

More information

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry [email protected]; Abstract. J2EE based Web applications have largely spread over our multiple

More information

OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010

OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010 OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda

More information

Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V

Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V Agenda What is SSO? How does it work? Tools for SSO on ClearPath Integrating Active Directory

More information

SAML and OAUTH comparison

SAML and OAUTH comparison SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single

More information

Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps

Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps Sofia Event Center 14-15 May 2014 Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps Radi Atanassov SharePoint MCM & MVP

More information

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0 Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity

More information

Improving performance for security enabled web services. - Dr. Colm Ó héigeartaigh

Improving performance for security enabled web services. - Dr. Colm Ó héigeartaigh Improving performance for security enabled web services - Dr. Colm Ó héigeartaigh Agenda Introduction to Apache CXF WS-Security in CXF 3.0.0 Securing Attachments in CXF 3.0.0 RS-Security in CXF 3.0.0 Some

More information

Onegini Token server / Web API Platform

Onegini Token server / Web API Platform Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s

More information

BOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA

BOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA Open Source Identity and Access Management Expert Panel, Part II 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA slide 2 Expert Panel Emmanuel Lécharny, Apache Software Foundation Howard

More information

SAML and OAUTH Technologies WebSphere Application Server

SAML and OAUTH Technologies WebSphere Application Server SAML and OAUTH Technologies WebSphere Application Server Bill O'Donnell STSM WebSphere Foundation Security Architect Session TAW-1701 Session TAW-1698 Please Note IBM s statements regarding its plans,

More information

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user

More information

OAuth: Where are we going?

OAuth: Where are we going? OAuth: Where are we going? What is OAuth? OAuth and CSRF Redirection Token Reuse OAuth Grant Types 1 OAuth v1 and v2 "OAuth 2.0 at the hand of a developer with deep understanding of web security will likely

More information

API-Security Gateway Dirk Krafzig

API-Security Gateway Dirk Krafzig API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing

More information

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials

More information

A Standards-based Mobile Application IdM Architecture

A Standards-based Mobile Application IdM Architecture A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted

More information

OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt. Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig

OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt. Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig Agenda 1. Motivation behind draft-maler-ace-oauth-uma-00.txt. 2. Mapping of existing

More information

Passwords are for Chumps

Passwords are for Chumps Copyright 2014 Splunk Inc. Passwords are for Chumps David Veuve SE, Splunk Who Am I?! David Veuve Sales Engineer for Major Accounts in Northern California! [email protected]! Former Splunk Customer (For

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Authen'cator Leakage Through Backup Channels on Android

Authen'cator Leakage Through Backup Channels on Android Authen'cator Leakage Through Backup Channels on Android Guangdong Bai Na'onal University of Singapore Web services are increasingly delivered through mobile apps Social Networking Online Banking Email

More information

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security

More information

Agenda. How to configure

Agenda. How to configure [email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST

ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST Considerations for choosing a secure, scalable, and reliable enterprise mobile backend platform OVERVIEW Organizations often struggle with identifying

More information

Interoperable Provisioning in a Distributed World

Interoperable Provisioning in a Distributed World Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302 Contacts Mark Diodati ([email protected])

More information

KBase and Globus Online Nexus. Shreyas Cholia NERSC/LBL

KBase and Globus Online Nexus. Shreyas Cholia NERSC/LBL DOE Systems Biology Knowledgebase KBase and Globus Online Nexus Shreyas Cholia NERSC/LBL What is KBase? Knowledgebase enabling predic6ve systems biology. Powerful modeling framework. Community- driven,

More information

HOL9449 Access Management: Secure web, mobile and cloud access

HOL9449 Access Management: Secure web, mobile and cloud access HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle

More information

Lecture 11 Web Application Security (part 1)

Lecture 11 Web Application Security (part 1) Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Cloud to Cloud Integrations with Force.com. Sandeep Bhanot Developer Evangelist @cloudysan

Cloud to Cloud Integrations with Force.com. Sandeep Bhanot Developer Evangelist @cloudysan Cloud to Cloud Integrations with Force.com Sandeep Bhanot Developer Evangelist @cloudysan Safe Harbor Salesforce.com Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This

More information

Multi Factor Authentication API

Multi Factor Authentication API GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...

More information

This Record of activity confirms that Jonathan Scrase has completed the following courses within the Microsoft Virtual Academy:

This Record of activity confirms that Jonathan Scrase has completed the following courses within the Microsoft Virtual Academy: Introduction to Office 365 Development DevOps - Visual Studio Release Management Jump Start Building Blocks: JavaScript and C# (Initialize) Cross-Platform Development with Visual Studio Introduction to

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities

More information