SlideShare une entreprise Scribd logo
1  sur  21
What is XAuth?
Xauth defined Extended Authentication,  an open platform for extending authenticated user services across the web.
EXTENDED AUTHENTICATION A proposed Web standard that detects which social networks the website visitor is already logged into
BENEFIT Enables the site to offer only the website visitor’s preferred sites as options for sharing instead of a long list of every possible sharing site
BENEFIT Facilitates including second-tier sharing services (such as Google Buzz) with greater ease Speeds page load time
HOW IT WORKS Participating services generate a browser token for each of their users.  The XAuth Token can be anything, so services have the flexibility to define whatever level of access they choose
HOW IT WORKS Publishers can then recognize when site visitors are logged in to those online services and present them with meaningful, relevant options. Users can choose to authenticate directly from the publisher site and use the service to share, interact with friends, or participate in the site's community.
IMPLEMENTATION Meebo is putting XAuth into its Meebo bar, which appears on a number of publisher websites
Xauth SUPPORTERS Google, Microsoft, Yahoo MySpace, Disqus and Meebo’s publishing partners including Time Inc. and MTV Networks
What about OAuth? Oauth is an  open protocol  to allow  secure API authorization  in a  simple  and  standard  method from desktop and web applications.
OAuth OAuth allows the User to grant access to their private resources on one site (called the Service Provider), to another site (called the Consumer, not to be confused with you, the User).
What about OpenID? While OpenID is all about using a single identity to sign into many sites,  OAuth is about giving access to your stuff without sharing your identity at all (or its secret parts).
OAuth OAuth attempts to provide a standard way for developers to offer their services via an API without forcing their users to expose their passwords 
Industry Protocols Google AuthSub AOL OpenAuth Yahoo BBAuth Upcoming API  Flickr API Amazon Web Services API 
Xauth vs. OAuth XAuth tells you  where to ask for OAuth from
Xauth and OAuth Example: XAuth tells a webpage "this is where the site visitor does social networking."
Xauth and OAuth Then,  OAuth is the way the user logs in there,  granting the site permission to access their info without seeing their password
Xauth COMPETITION ,[object Object],[object Object],[object Object]
FACEBOOK ,[object Object],[object Object],[object Object]
CHALLENGE Privacy: Enables third-party site to identify the services you belong to
[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Similaire à What is XAuth?

Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network Intergration
Dinesh Kumar
 
OAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guessOAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guess
Mehdi Medjaoui
 

Similaire à What is XAuth? (20)

Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network Intergration
 
OAuth Android Göteborg
OAuth Android GöteborgOAuth Android Göteborg
OAuth Android Göteborg
 
Open authentication (oauth)
Open authentication (oauth)Open authentication (oauth)
Open authentication (oauth)
 
Technology for Teachers
Technology for TeachersTechnology for Teachers
Technology for Teachers
 
Facebook_Oauth
Facebook_OauthFacebook_Oauth
Facebook_Oauth
 
Facebook_Oauth
Facebook_OauthFacebook_Oauth
Facebook_Oauth
 
Building AJAX Applications Using Yahoo! Web Services
Building AJAX Applications Using Yahoo! Web ServicesBuilding AJAX Applications Using Yahoo! Web Services
Building AJAX Applications Using Yahoo! Web Services
 
Oauth 2.0
Oauth 2.0Oauth 2.0
Oauth 2.0
 
About OExchange
About OExchangeAbout OExchange
About OExchange
 
OAuth Tokens
OAuth TokensOAuth Tokens
OAuth Tokens
 
Openid & Oauth: An Introduction
Openid & Oauth: An IntroductionOpenid & Oauth: An Introduction
Openid & Oauth: An Introduction
 
Making Web 2.0 Real Part 2 - Rich Interfaces
Making Web 2.0 Real Part 2 - Rich InterfacesMaking Web 2.0 Real Part 2 - Rich Interfaces
Making Web 2.0 Real Part 2 - Rich Interfaces
 
O auth
O authO auth
O auth
 
OAuth
OAuthOAuth
OAuth
 
Oauth
OauthOauth
Oauth
 
OExchange Technical Intro
OExchange Technical IntroOExchange Technical Intro
OExchange Technical Intro
 
Twitter Update for Social Developers London - March 2013
Twitter Update for Social Developers London - March 2013Twitter Update for Social Developers London - March 2013
Twitter Update for Social Developers London - March 2013
 
OAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guessOAuth In The Real World : 10 actual implementations you can't guess
OAuth In The Real World : 10 actual implementations you can't guess
 
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
 
Widget and Web Ecosystem - Updated
Widget and Web Ecosystem - UpdatedWidget and Web Ecosystem - Updated
Widget and Web Ecosystem - Updated
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

What is XAuth?

  • 2. Xauth defined Extended Authentication, an open platform for extending authenticated user services across the web.
  • 3. EXTENDED AUTHENTICATION A proposed Web standard that detects which social networks the website visitor is already logged into
  • 4. BENEFIT Enables the site to offer only the website visitor’s preferred sites as options for sharing instead of a long list of every possible sharing site
  • 5. BENEFIT Facilitates including second-tier sharing services (such as Google Buzz) with greater ease Speeds page load time
  • 6. HOW IT WORKS Participating services generate a browser token for each of their users. The XAuth Token can be anything, so services have the flexibility to define whatever level of access they choose
  • 7. HOW IT WORKS Publishers can then recognize when site visitors are logged in to those online services and present them with meaningful, relevant options. Users can choose to authenticate directly from the publisher site and use the service to share, interact with friends, or participate in the site's community.
  • 8. IMPLEMENTATION Meebo is putting XAuth into its Meebo bar, which appears on a number of publisher websites
  • 9. Xauth SUPPORTERS Google, Microsoft, Yahoo MySpace, Disqus and Meebo’s publishing partners including Time Inc. and MTV Networks
  • 10. What about OAuth? Oauth is an  open protocol  to allow  secure API authorization  in a  simple and  standard  method from desktop and web applications.
  • 11. OAuth OAuth allows the User to grant access to their private resources on one site (called the Service Provider), to another site (called the Consumer, not to be confused with you, the User).
  • 12. What about OpenID? While OpenID is all about using a single identity to sign into many sites, OAuth is about giving access to your stuff without sharing your identity at all (or its secret parts).
  • 13. OAuth OAuth attempts to provide a standard way for developers to offer their services via an API without forcing their users to expose their passwords 
  • 14. Industry Protocols Google AuthSub AOL OpenAuth Yahoo BBAuth Upcoming API Flickr API Amazon Web Services API 
  • 15. Xauth vs. OAuth XAuth tells you where to ask for OAuth from
  • 16. Xauth and OAuth Example: XAuth tells a webpage "this is where the site visitor does social networking."
  • 17. Xauth and OAuth Then, OAuth is the way the user logs in there, granting the site permission to access their info without seeing their password
  • 18.
  • 19.
  • 20. CHALLENGE Privacy: Enables third-party site to identify the services you belong to
  • 21.