SlideShare une entreprise Scribd logo
1  sur  50
Télécharger pour lire hors ligne
Copyright ©2013 Ping Identity Corporation. All rights reserved.1
Confidential
API Security
Bradford Stephens (Ping)
& Tim Anglade (Apigee)
Copyright ©2013 Ping Identity Corporation. All rights reserved.2
Confidential
•  Intros
•  The “Platform Imperative”
•  What does Security Mean?
•  Solutions
•  Wrap-Up
Contents
Copyright ©2013 Ping Identity Corporation. All rights reserved.3
Confidential
•  Hi!
•  Former CEO of VC-Backed database startup, Drawn to
Scale. Built a distributed SQL database, Spire, from
scratch.
•  Does a lot of work in big data, distributed systems, and
APIs.
•  Now running Developer Evangelism + Platforms @ Ping!
Bradford Intro
Copyright ©2013 Ping Identity Corporation. All rights reserved.4
Confidential
•  Hi as well!
•  Built financial infrastructure at NASDAQ, an eCommerce
startup, Invited Expert work at W3C and now APIs &
Mobile Apps
•  Spent a few years focusing heavily on distributed systems
and NOSQL databases — nosqltapes.com and
nosqlsummer.org
•  Now running Developer Programs @ Apigee!
Tim Intro
Copyright ©2013 Ping Identity Corporation. All rights reserved.5
Confidential
Business Software is Changing
CRM
Sales
Analytics
Sharepoint
Website
Transactions
Marketing
Biz Apps
Copyright ©2013 Ping Identity Corporation. All rights reserved.6
Confidential
Business Software is Changing
Biz Apps
Salesforce Box
AWS
Shopify
Omniture
Google
Apps
Copyright ©2013 Ping Identity Corporation. All rights reserved.7
Confidential
Business Software is Changing
Biz Apps
Salesforce Box
AWS
Shopify
Omniture
Google
Apps
API
API
API
API
API
API
API
Copyright ©2013 Ping Identity Corporation. All rights reserved.8
Confidential
The Enterprise Must Open
Understanding the API Economy—the billionaire club
Copyright ©2013 Ping Identity Corporation. All rights reserved.9
Confidential
The Enterprise Must Open
API Growth Rate
•  Open APIs
–  We just hit the 7,000 API mark
–  8,000 by year end
–  16,000 by 2015
•  Dark APIs
–  Dark APIs are 5x+/- Open API growth rate
–  80,000 by 2015
Copyright ©2013 Ping Identity Corporation. All rights reserved.10
Confidential
The Enterprise Must Open
•  Internal apps must be refactored
•  Close collaboration with Partners
•  Explosion of different channels and devices
•  Everything is more social
Copyright ©2013 Ping Identity Corporation. All rights reserved.11
Confidential
What even is security?
What does security mean in this open-default world?
Copyright ©2013 Ping Identity Corporation. All rights reserved.12
Confidential
The never-ending battle
•  Security is a never-ending battle between collaboration and
secrets … to get work done
•  Once we’ve chosen where we fall on the spectrum, how do
you keep security around it?
Copyright ©2013 Ping Identity Corporation. All rights reserved.13
Confidential
Major Concepts
•  Identity
•  Authentication
•  Authorization
•  Encryption
•  Accounting
Copyright ©2013 Ping Identity Corporation. All rights reserved.14
Confidential
Identity
•  Answers “Who are you?”
•  UserIDs, Digital Certificates, ATM Cards
•  A public claim asserting yourself
Copyright ©2013 Ping Identity Corporation. All rights reserved.15
Confidential
Authentication
•  Answers “How can you prove who you are?”
•  Responding to a challenge
•  Private shared secrets, best if known only to user (Private
Key)
Copyright ©2013 Ping Identity Corporation. All rights reserved.16
Confidential
Authorization
•  Answers “What are you allowed to do?”
•  Token/Ticket Mechanism
•  Certain tokens are allowed certain abilities
•  Enforcing the principle of least privilege
Copyright ©2013 Ping Identity Corporation. All rights reserved.17
Confidential
Encryption
•  Answers “How can we keep this secret?”
•  Only authorized parties can understand data
•  Non-symmetric algorithms ‘mask’ data – ‘impossible’ to
reverse engineer
Copyright ©2013 Ping Identity Corporation. All rights reserved.18
Confidential
Accounting
•  Answers “Who did what, when?”
•  Typically use a logging mechanism (Splunk)
•  “Closes the loop” between Authentication and
Authorization
•  Essential in identifying gaps and postmortems
Copyright ©2013 Ping Identity Corporation. All rights reserved.19
Confidential
So what is API Security?
•  A Secure API only allows the right people the right amount of
access to resources and data
•  Has to balance collaboration in an open-by-default world vs.
keeping important secrets
•  Many, many ways to do this
Copyright ©2013 Ping Identity Corporation. All rights reserved.20
Confidential
 
 Identity
 Authentication
 Authorization
 Channel Enc.
 Accounting
Dedicated ATM
  
 X
  
 X
  
802.1X
  
 X
  
 X
  
LDAP
 X
  
  
  
  
ActiveDirectory
 X
  
 X (partial)
  
  
Database Table
 X
  
  
  
  
RADIUS/Diameter
  
 X
 X
  
 X
VPN / IPSec
  
 X
  
 X
  
X.509
 X
 X
  
  
SSL, TLS, DTS
  
  
  
 X
  
Basic/Digest Auth, Login
 X
 X
  
  
  
2-factor
  
 X
  
  
  
Master login
 X
 X
  
  
  
API keys
  
 X
 X (partial)
  
  
OAuth 1.0
  
  
  
  
  
OAuth 1.0a
  
 X (partial)
  
  
OAuth 2.0
  
 X (partial)
  
  
OpenID
  
 X
  
  
  
OpenID Connect
  
 X
  
  
  
SAML
  
 X
 X (partial)
  
  
Shiro or other framework
  
 X
 X
  
  
Splunk or other logging
  
  
  
  
 X
Roll your own
  
  
  
  
  
Recap
Copyright ©2013 Ping Identity Corporation. All rights reserved.21
Confidential
Topology
Database
App Layer
API
User A
App 1
User B
App 2
User C
App 3
Copyright ©2013 Ping Identity Corporation. All rights reserved.22
Confidential
•  Use-cases
–  Internal APIs
–  Partner APIs
–  Public APIs (consumer, open, mobile etc.)
•  Tiers (legs)
–  Server-to-Server (internal, partner)
usually 2-legged authentication
–  End-user (consumer, mobile, open)
usually requires 3-legged authentication
API Types
Copyright ©2013 Ping Identity Corporation. All rights reserved.23
Confidential
Topology
Database
App Layer
API
User A
App 1
User B
App 2
User C
App 3
Copyright ©2013 Ping Identity Corporation. All rights reserved.24
Confidential
•  Malicious Apps
•  Well-intentioned but vulnerable App
•  Well-intentional App with Malicious Users
Common Security Concerns
Copyright ©2013 Ping Identity Corporation. All rights reserved.25
Confidential
Topology
Database
App Layer
API
User A
App 1
User B
App 2
User C
App 3
Copyright ©2013 Ping Identity Corporation. All rights reserved.26
Confidential
•  Two classes
–  Human & Business
–  Technologies
•  Secure APIs use both!
Remedies
Copyright ©2013 Ping Identity Corporation. All rights reserved.27
Confidential
1.  Registration Wall
–  Knowing is half the battle!
–  Identify problematic apps or users
–  Isolate them from other traffic
–  Provide means of communicating with
well-intentioned users
Human & Business Remedies
Copyright ©2013 Ping Identity Corporation. All rights reserved.28
Confidential
2.  Proof
–  Enhance registration by requiring proof the
account was not automatically created (captcha)
or has a legit email address (activation link)
–  Phone Activation
–  Driver’s license, …
Human & Business Remedies
Copyright ©2013 Ping Identity Corporation. All rights reserved.29
Confidential
3.  Traffic Shaping
–  Quotas
–  Throttling
–  Tiered Traffic
–  Dynamic IP Filters
–  Dynamic ISP Filters
–  Up to & including blocking
–  Processes not technologies!
Human & Business Remedies
Copyright ©2013 Ping Identity Corporation. All rights reserved.30
Confidential
4.  Audits & Certifications
–  More useful than you think
–  Checks for dark corners in your organization
–  PCI-DSS and ISO 2700X series
Human & Business Remedies
Copyright ©2013 Ping Identity Corporation. All rights reserved.31
Confidential
•  Which of these should you implement?
•  All of them? (Again, security vs. freedom.)
•  Don’t forget to impose those human &
business rules on internal users!
–  80.123456% of DDoS cases come from inside the
house.
Human & Business Remedies
Copyright ©2013 Ping Identity Corporation. All rights reserved.32
Confidential
•  Identity
•  Authentication
•  Authorization
•  Encryption (Channel Security)
•  Accounting (Auditing)
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.33
Confidential
 
 Identity
 Authentication
 Authorization
 Channel Enc.
 Accounting
Dedicated ATM
  
 X
  
 X
  
802.1X
  
 X
  
 X
  
LDAP
 X
  
 X (definitions)
  
  
ActiveDirectory
 X
  
 X (definitions)
  
  
Database Table
 X
  
  
  
  
RADIUS/Diameter
  
 X
 X
  
 X
VPN / IPSec
  
 X
  
 X
  
X.509
 X
 X
  
  
SSL, TLS, DTS
  
  
  
 X
  
Basic/Digest Auth, Login
 X
 X
  
  
  
2-factor
  
 X
  
  
  
Master login
 X
 X
  
  
  
API keys
  
 X
 X (primitives)
  
  
OAuth 1.0
  
  
  
  
  
OAuth 1.0a
  
 X (primitives)
  
  
OAuth 2.0
  
 X (primitives)
  
  
OpenID
  
 X
  
  
  
OpenID Connect
  
 X
  
  
  
SAML
  
 X
 X (primitives)
  
  
Shiro or other framework
  
 X
 X
  
  
Splunk or other logging
  
  
  
  
 X
Roll your own
  
  
  
  
  
Recap
Copyright ©2013 Ping Identity Corporation. All rights reserved.34
Confidential
1.  Dedicated ATM connection
–  You laugh, but…
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.35
Confidential
2.  Identity Providers
–  LDAP
–  ActiveDirectory (provides authorization as well)
–  User table in your database…
–  Third party: Google, Twitter, etc. — still usually
maps to a user record in your internal tables.
–  Every other combination of solutions will use one
of the first three in this list!
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.36
Confidential
3.  Network Channel Security
–  LAN level: 801.1X
–  Beyond: use VPN/IPSec
–  Both provide machine authentication and point-
to-point channel encryption
–  Both would rely on a RADIUS or Diameter server
for user authentication and authorization
management
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.37
Confidential
4.  Application/HTTP Channel Security
–  SSL, TLS
–  X.509
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.38
Confidential
4.  Authentication
–  Basic/Digest Auth (over SSL)
–  Login form then API key
–  Optional 2-factor (code generator, keyfob, etc.)
–  Plugged to LDAP, or table of API keys or
hardcoded master login (bad).
–  All or nothing keys: like giving every app full
access to your facebook account
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.39
Confidential
4.  Authentication/Authorization with OAuth
–  OAuth fundamentally tries to solve this problem, by
doing authentication but allowing to segment
authorization per app
–  “Valet Key” analogy: the App has access to the
system as you, but cannot do certain things (like
change your password)
–  That valet key is a token, that automatically expires
after a certain time
–  Allows for “3-legged Authentication”, not just API and
App or (API and User), but API, App and User
•  Use for revokes and accounting
–  You still end up doing a regular authentication
somewhere in the middle (Basic auth, login form, etc.)
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.40
Confidential
–  OAuth 1
•  Do not use OAuth 1.0: logically insecure
•  OAuth 1.0a (RFC edition) fixes that, works nicely, in
use at Twitter
•  Signatures are hard (made so you don’t have to rely on
SSL/TLS though)
•  Malicious Apps can be kicked out and all their tokens
revoked
•  Web authentication flow can use keyfobs or other multi-
factor auth systems
•  Very web-centric. The ideal use-case when it was
designed was “allow Twitter to access my Flickr photos”
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.41
Confidential
–  OAuth 2.0
•  Lead author famously walked out, not all bad though!
•  Hard to implement correctly, in a secure manner
•  Lots of grant types
•  Not as interoperable as OAuth 1 — really a framework,
for security, not a protocol anymore
•  Formalizes “scopes” for specific permissions (like “post
to wall”, “see friends”, etc.)
•  Introduces refresh tokens — stay away
•  Introduces compatibility with SAML and JWT — stay
away
•  2 token types: Bearer and MAC
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.42
Confidential
–  OAuth 2.0 Bearer Tokens
•  only ones used in practice
•  as insecure as a Bearer Bond
•  Heavily rely on channel being secure, which is rarely
the case, even over HTTPS
•  No client binding
–  App B could use a token issued for App A to log in as you
to App A
–  Facebook wrote its own extension to deal with that
•  Stay away from refresh tokens, it only serves a very
narrow use-case where two-tier refreshes are
necessary.
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.43
Confidential
5.  Authorization
–  Shiro — a Java framework to enforce
authorization rules in your apps
–  SAML — full XML protocol to handle
authentication and authorization
Technical Remedies!
Copyright ©2013 Ping Identity Corporation. All rights reserved.44
Confidential
 
 Identity
 Authentication
 Authorization
 Channel Enc.
 Accounting
Dedicated ATM
  
 X
  
 X
  
802.1X
  
 X
  
 X
  
LDAP
 X
  
 X (definitions)
  
  
ActiveDirectory
 X
  
 X (definitions)
  
  
Database Table
 X
  
  
  
  
RADIUS/Diameter
  
 X
 X
  
 X
VPN / IPSec
  
 X
  
 X
  
X.509
 X
 X
  
  
SSL, TLS, DTS
  
  
  
 X
  
Basic/Digest Auth, Login
 X
 X
  
  
  
2-factor
  
 X
  
  
  
Master login
 X
 X
  
  
  
API keys
  
 X
 X (primitives)
  
  
OAuth 1.0
  
  
  
  
  
OAuth 1.0a
  
 X (primitives)
  
  
OAuth 2.0
  
 X (primitives)
  
  
OpenID
  
 X
  
  
  
OpenID Connect
  
 X
  
  
  
SAML
  
 X
 X (primitives)
  
  
Shiro or other framework
  
 X
 X
  
  
Splunk or other logging
  
  
  
  
 X
Roll your own
  
  
  
  
  
Recap
Copyright ©2013 Ping Identity Corporation. All rights reserved.45
Confidential
 
 Identity
 Authentication
 Authorization
 Channel Enc.
 Accounting
Dedicated ATM
  
 X
  
 X
  
802.1X
  
 X
  
 X
  
LDAP
 X
  
 X (definitions)
  
  
ActiveDirectory
 X
  
 X (definitions)
  
  
Database Table
 X
  
  
  
  
RADIUS/Diameter
  
 X
 X
  
 X
VPN / IPSec
  
 X
  
 X
  
X.509
 X
 X
  
  
SSL, TLS, DTS
  
  
  
 X
  
Basic/Digest Auth, Login
 X
 X
  
  
  
2-factor
  
 X
  
  
  
Master login
 X
 X
  
  
  
API keys
  
 X
 X (primitives)
  
  
OAuth 1.0
  
  
  
  
  
OAuth 1.0a
  
 X (primitives)
  
  
OAuth 2.0
  
 X (primitives)
  
  
OpenID
  
 X
  
  
  
OpenID Connect
  
 X
  
  
  
SAML
  
 X
 X (primitives)
  
  
Shiro or other framework
  
 X
 X
  
  
Splunk or other logging
  
  
  
  
 X
Roll your own
  
  
  
  
  
Connect 5!
Copyright ©2013 Ping Identity Corporation. All rights reserved.46
Confidential
 
 Identity
 Authentication
 Authorization
 Channel Enc.
 Accounting
Dedicated ATM
  
 X
  
 X
  
802.1X
  
 X
  
 X
  
LDAP
 X
  
 X (definitions)
  
  
ActiveDirectory
 X
  
 X (definitions)
  
  
Database Table
 X
  
  
  
  
RADIUS/Diameter
  
 X
 X
  
 X
VPN / IPSec
  
 X
  
 X
  
X.509
 X
 X
  
  
SSL, TLS, DTS
  
  
  
 X
  
Basic/Digest Auth
 X
 X
  
  
  
2-factor
  
 X
  
  
  
Master login
 X
 X
  
  
  
API keys
  
 X
 X (primitives)
  
  
OAuth 1.0
  
  
  
  
  
OAuth 1.0a
  
 X (primitives)
  
  
OAuth 2.0
  
 X (primitives)
  
  
OpenID
  
 X
  
  
  
OpenID Connect
  
 X
  
  
  
SAML
  
 X
 X (primitives)
  
  
Shiro or other framework
  
 X
 X
  
  
Splunk or other logging
  
  
  
  
 X
Roll your own
  
  
  
  
  
Connect 5!
Copyright ©2013 Ping Identity Corporation. All rights reserved.47
Confidential
•  Use-cases
–  Internal APIs
–  Partner APIs
–  Public APIs (consumer, open, mobile etc.)
•  Tiers (legs)
–  Server-to-Server (internal, partner)
usually 2-legged authentication
–  End-user (consumer, mobile, open)
usually requires 3-legged authentication
API Types (again)
`
Copyright ©2013 Ping Identity Corporation. All rights reserved.48
Confidential
•  Internal, Server-to-Server APIs
–  Use OAuth 2.0 with Bearer Tokens obtained through a Client
Credentials grant (only 2-legged requirement)
–  Alternatives: 802.1X with RADIUS/Diameter, X.509
•  Partner, Server-to-Server APIs
–  Use OAuth 2.0 with Bearer obtained through a Client
Credentials grant (only 2-legged requirement)
–  Alternatives: VPN/IPSec with RADIUS/Diameter, X.509
•  Consumer, Open or End-user Internal/Partner
–  Consumer/Open APIs: use OAuth 2.0 with Bearer Tokens,
using Authentication Code or Implicit Grant flow (better
support for advanced authentication options, less trust on
clients)
•  Mobile APIs
–  use Oauth 2.0 (3-legged requirement) with Bearer Tokens
obtained through a Resource Owner grant or OS integration if
available (better UX)
Recommendations
Copyright ©2013 Ping Identity Corporation. All rights reserved.49
Confidential
•  Security vs. Freedom
•  Devil’s advocate OAuth 1.0a isn’t all bad, and
tons of people implement it for Twitter.
•  How badly do you want to protect this vs. how
badly do you want people to use it?
•  All the way to physically securing the
interface…
In conclusion…
Copyright ©2013 Ping Identity Corporation. All rights reserved.50
Confidential
•  Questions, comments:
bstephens@pingidentify.com
tim.a@apigee.com
Thanks!

Contenu connexe

Tendances

Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveApigee | Google Cloud
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World42Crunch
 
The Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIsThe Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIs42Crunch
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World42Crunch
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at ScaleNordic APIs
 
API Security and Management Best Practices
API Security and Management Best PracticesAPI Security and Management Best Practices
API Security and Management Best PracticesCA API Management
 
Layered API Security: What Hackers Don't Want You To Know
Layered API Security: What Hackers Don't Want You To KnowLayered API Security: What Hackers Don't Want You To Know
Layered API Security: What Hackers Don't Want You To KnowAaronLieberman5
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAkana
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementEldert Grootenboer
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyCheckmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyAdar Weidman
 
WEBINAR: Positive Security for APIs: What it is and why you need it!
 WEBINAR: Positive Security for APIs: What it is and why you need it! WEBINAR: Positive Security for APIs: What it is and why you need it!
WEBINAR: Positive Security for APIs: What it is and why you need it!42Crunch
 
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...Veronique Wagon
 
How Apigee Api Management Platform Helps with Digital Excellence
How Apigee Api Management Platform Helps with Digital ExcellenceHow Apigee Api Management Platform Helps with Digital Excellence
How Apigee Api Management Platform Helps with Digital ExcellenceRam Kumar
 
WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 10WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 1042Crunch
 
Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API FirewallProtecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall42Crunch
 
A Tour of Different API Management Architectures
A Tour of Different API Management ArchitecturesA Tour of Different API Management Architectures
A Tour of Different API Management ArchitecturesNordic APIs
 
OWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps DaysOWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps Days42Crunch
 
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...apidays
 

Tendances (20)

Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO Perspective
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
 
The Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIsThe Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIs
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at Scale
 
API Security and Management Best Practices
API Security and Management Best PracticesAPI Security and Management Best Practices
API Security and Management Best Practices
 
Layered API Security: What Hackers Don't Want You To Know
Layered API Security: What Hackers Don't Want You To KnowLayered API Security: What Hackers Don't Want You To Know
Layered API Security: What Hackers Don't Want You To Know
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against Hacks
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
 
APIs: The New Security Layer
APIs: The New Security LayerAPIs: The New Security Layer
APIs: The New Security Layer
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyCheckmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
 
API Security Lifecycle
API Security LifecycleAPI Security Lifecycle
API Security Lifecycle
 
WEBINAR: Positive Security for APIs: What it is and why you need it!
 WEBINAR: Positive Security for APIs: What it is and why you need it! WEBINAR: Positive Security for APIs: What it is and why you need it!
WEBINAR: Positive Security for APIs: What it is and why you need it!
 
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
 
How Apigee Api Management Platform Helps with Digital Excellence
How Apigee Api Management Platform Helps with Digital ExcellenceHow Apigee Api Management Platform Helps with Digital Excellence
How Apigee Api Management Platform Helps with Digital Excellence
 
WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 10WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 10
 
Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API FirewallProtecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall
 
A Tour of Different API Management Architectures
A Tour of Different API Management ArchitecturesA Tour of Different API Management Architectures
A Tour of Different API Management Architectures
 
OWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps DaysOWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps Days
 
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
 

Similaire à CIS13: APIs, Identity, and Securing the Enterprise

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tBeau Christensen
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxYury Leonychev
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at ScaleCloudIDSummit
 
1400 ping madsen-nordicapis-connect-01
1400 ping madsen-nordicapis-connect-011400 ping madsen-nordicapis-connect-01
1400 ping madsen-nordicapis-connect-01Nordic APIs
 
IoT meets AI in the Clouds
IoT meets AI in the CloudsIoT meets AI in the Clouds
IoT meets AI in the CloudsDr. Mirko Kämpf
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mailsAuthShield Labs
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricAtif Shaikh
 

Similaire à CIS13: APIs, Identity, and Securing the Enterprise (20)

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptx
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at Scale
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
 
1400 ping madsen-nordicapis-connect-01
1400 ping madsen-nordicapis-connect-011400 ping madsen-nordicapis-connect-01
1400 ping madsen-nordicapis-connect-01
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
IoT meets AI in the Clouds
IoT meets AI in the CloudsIoT meets AI in the Clouds
IoT meets AI in the Clouds
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data Fabric
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 

Plus de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Plus de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Dernier

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Dernier (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

CIS13: APIs, Identity, and Securing the Enterprise

  • 1. Copyright ©2013 Ping Identity Corporation. All rights reserved.1 Confidential API Security Bradford Stephens (Ping) & Tim Anglade (Apigee)
  • 2. Copyright ©2013 Ping Identity Corporation. All rights reserved.2 Confidential •  Intros •  The “Platform Imperative” •  What does Security Mean? •  Solutions •  Wrap-Up Contents
  • 3. Copyright ©2013 Ping Identity Corporation. All rights reserved.3 Confidential •  Hi! •  Former CEO of VC-Backed database startup, Drawn to Scale. Built a distributed SQL database, Spire, from scratch. •  Does a lot of work in big data, distributed systems, and APIs. •  Now running Developer Evangelism + Platforms @ Ping! Bradford Intro
  • 4. Copyright ©2013 Ping Identity Corporation. All rights reserved.4 Confidential •  Hi as well! •  Built financial infrastructure at NASDAQ, an eCommerce startup, Invited Expert work at W3C and now APIs & Mobile Apps •  Spent a few years focusing heavily on distributed systems and NOSQL databases — nosqltapes.com and nosqlsummer.org •  Now running Developer Programs @ Apigee! Tim Intro
  • 5. Copyright ©2013 Ping Identity Corporation. All rights reserved.5 Confidential Business Software is Changing CRM Sales Analytics Sharepoint Website Transactions Marketing Biz Apps
  • 6. Copyright ©2013 Ping Identity Corporation. All rights reserved.6 Confidential Business Software is Changing Biz Apps Salesforce Box AWS Shopify Omniture Google Apps
  • 7. Copyright ©2013 Ping Identity Corporation. All rights reserved.7 Confidential Business Software is Changing Biz Apps Salesforce Box AWS Shopify Omniture Google Apps API API API API API API API
  • 8. Copyright ©2013 Ping Identity Corporation. All rights reserved.8 Confidential The Enterprise Must Open Understanding the API Economy—the billionaire club
  • 9. Copyright ©2013 Ping Identity Corporation. All rights reserved.9 Confidential The Enterprise Must Open API Growth Rate •  Open APIs –  We just hit the 7,000 API mark –  8,000 by year end –  16,000 by 2015 •  Dark APIs –  Dark APIs are 5x+/- Open API growth rate –  80,000 by 2015
  • 10. Copyright ©2013 Ping Identity Corporation. All rights reserved.10 Confidential The Enterprise Must Open •  Internal apps must be refactored •  Close collaboration with Partners •  Explosion of different channels and devices •  Everything is more social
  • 11. Copyright ©2013 Ping Identity Corporation. All rights reserved.11 Confidential What even is security? What does security mean in this open-default world?
  • 12. Copyright ©2013 Ping Identity Corporation. All rights reserved.12 Confidential The never-ending battle •  Security is a never-ending battle between collaboration and secrets … to get work done •  Once we’ve chosen where we fall on the spectrum, how do you keep security around it?
  • 13. Copyright ©2013 Ping Identity Corporation. All rights reserved.13 Confidential Major Concepts •  Identity •  Authentication •  Authorization •  Encryption •  Accounting
  • 14. Copyright ©2013 Ping Identity Corporation. All rights reserved.14 Confidential Identity •  Answers “Who are you?” •  UserIDs, Digital Certificates, ATM Cards •  A public claim asserting yourself
  • 15. Copyright ©2013 Ping Identity Corporation. All rights reserved.15 Confidential Authentication •  Answers “How can you prove who you are?” •  Responding to a challenge •  Private shared secrets, best if known only to user (Private Key)
  • 16. Copyright ©2013 Ping Identity Corporation. All rights reserved.16 Confidential Authorization •  Answers “What are you allowed to do?” •  Token/Ticket Mechanism •  Certain tokens are allowed certain abilities •  Enforcing the principle of least privilege
  • 17. Copyright ©2013 Ping Identity Corporation. All rights reserved.17 Confidential Encryption •  Answers “How can we keep this secret?” •  Only authorized parties can understand data •  Non-symmetric algorithms ‘mask’ data – ‘impossible’ to reverse engineer
  • 18. Copyright ©2013 Ping Identity Corporation. All rights reserved.18 Confidential Accounting •  Answers “Who did what, when?” •  Typically use a logging mechanism (Splunk) •  “Closes the loop” between Authentication and Authorization •  Essential in identifying gaps and postmortems
  • 19. Copyright ©2013 Ping Identity Corporation. All rights reserved.19 Confidential So what is API Security? •  A Secure API only allows the right people the right amount of access to resources and data •  Has to balance collaboration in an open-by-default world vs. keeping important secrets •  Many, many ways to do this
  • 20. Copyright ©2013 Ping Identity Corporation. All rights reserved.20 Confidential   Identity Authentication Authorization Channel Enc. Accounting Dedicated ATM   X   X   802.1X   X   X   LDAP X         ActiveDirectory X   X (partial)     Database Table X         RADIUS/Diameter   X X   X VPN / IPSec   X   X   X.509 X X     SSL, TLS, DTS       X   Basic/Digest Auth, Login X X       2-factor   X       Master login X X       API keys   X X (partial)     OAuth 1.0           OAuth 1.0a   X (partial)     OAuth 2.0   X (partial)     OpenID   X       OpenID Connect   X       SAML   X X (partial)     Shiro or other framework   X X     Splunk or other logging         X Roll your own           Recap
  • 21. Copyright ©2013 Ping Identity Corporation. All rights reserved.21 Confidential Topology Database App Layer API User A App 1 User B App 2 User C App 3
  • 22. Copyright ©2013 Ping Identity Corporation. All rights reserved.22 Confidential •  Use-cases –  Internal APIs –  Partner APIs –  Public APIs (consumer, open, mobile etc.) •  Tiers (legs) –  Server-to-Server (internal, partner) usually 2-legged authentication –  End-user (consumer, mobile, open) usually requires 3-legged authentication API Types
  • 23. Copyright ©2013 Ping Identity Corporation. All rights reserved.23 Confidential Topology Database App Layer API User A App 1 User B App 2 User C App 3
  • 24. Copyright ©2013 Ping Identity Corporation. All rights reserved.24 Confidential •  Malicious Apps •  Well-intentioned but vulnerable App •  Well-intentional App with Malicious Users Common Security Concerns
  • 25. Copyright ©2013 Ping Identity Corporation. All rights reserved.25 Confidential Topology Database App Layer API User A App 1 User B App 2 User C App 3
  • 26. Copyright ©2013 Ping Identity Corporation. All rights reserved.26 Confidential •  Two classes –  Human & Business –  Technologies •  Secure APIs use both! Remedies
  • 27. Copyright ©2013 Ping Identity Corporation. All rights reserved.27 Confidential 1.  Registration Wall –  Knowing is half the battle! –  Identify problematic apps or users –  Isolate them from other traffic –  Provide means of communicating with well-intentioned users Human & Business Remedies
  • 28. Copyright ©2013 Ping Identity Corporation. All rights reserved.28 Confidential 2.  Proof –  Enhance registration by requiring proof the account was not automatically created (captcha) or has a legit email address (activation link) –  Phone Activation –  Driver’s license, … Human & Business Remedies
  • 29. Copyright ©2013 Ping Identity Corporation. All rights reserved.29 Confidential 3.  Traffic Shaping –  Quotas –  Throttling –  Tiered Traffic –  Dynamic IP Filters –  Dynamic ISP Filters –  Up to & including blocking –  Processes not technologies! Human & Business Remedies
  • 30. Copyright ©2013 Ping Identity Corporation. All rights reserved.30 Confidential 4.  Audits & Certifications –  More useful than you think –  Checks for dark corners in your organization –  PCI-DSS and ISO 2700X series Human & Business Remedies
  • 31. Copyright ©2013 Ping Identity Corporation. All rights reserved.31 Confidential •  Which of these should you implement? •  All of them? (Again, security vs. freedom.) •  Don’t forget to impose those human & business rules on internal users! –  80.123456% of DDoS cases come from inside the house. Human & Business Remedies
  • 32. Copyright ©2013 Ping Identity Corporation. All rights reserved.32 Confidential •  Identity •  Authentication •  Authorization •  Encryption (Channel Security) •  Accounting (Auditing) Technical Remedies!
  • 33. Copyright ©2013 Ping Identity Corporation. All rights reserved.33 Confidential   Identity Authentication Authorization Channel Enc. Accounting Dedicated ATM   X   X   802.1X   X   X   LDAP X   X (definitions)     ActiveDirectory X   X (definitions)     Database Table X         RADIUS/Diameter   X X   X VPN / IPSec   X   X   X.509 X X     SSL, TLS, DTS       X   Basic/Digest Auth, Login X X       2-factor   X       Master login X X       API keys   X X (primitives)     OAuth 1.0           OAuth 1.0a   X (primitives)     OAuth 2.0   X (primitives)     OpenID   X       OpenID Connect   X       SAML   X X (primitives)     Shiro or other framework   X X     Splunk or other logging         X Roll your own           Recap
  • 34. Copyright ©2013 Ping Identity Corporation. All rights reserved.34 Confidential 1.  Dedicated ATM connection –  You laugh, but… Technical Remedies!
  • 35. Copyright ©2013 Ping Identity Corporation. All rights reserved.35 Confidential 2.  Identity Providers –  LDAP –  ActiveDirectory (provides authorization as well) –  User table in your database… –  Third party: Google, Twitter, etc. — still usually maps to a user record in your internal tables. –  Every other combination of solutions will use one of the first three in this list! Technical Remedies!
  • 36. Copyright ©2013 Ping Identity Corporation. All rights reserved.36 Confidential 3.  Network Channel Security –  LAN level: 801.1X –  Beyond: use VPN/IPSec –  Both provide machine authentication and point- to-point channel encryption –  Both would rely on a RADIUS or Diameter server for user authentication and authorization management Technical Remedies!
  • 37. Copyright ©2013 Ping Identity Corporation. All rights reserved.37 Confidential 4.  Application/HTTP Channel Security –  SSL, TLS –  X.509 Technical Remedies!
  • 38. Copyright ©2013 Ping Identity Corporation. All rights reserved.38 Confidential 4.  Authentication –  Basic/Digest Auth (over SSL) –  Login form then API key –  Optional 2-factor (code generator, keyfob, etc.) –  Plugged to LDAP, or table of API keys or hardcoded master login (bad). –  All or nothing keys: like giving every app full access to your facebook account Technical Remedies!
  • 39. Copyright ©2013 Ping Identity Corporation. All rights reserved.39 Confidential 4.  Authentication/Authorization with OAuth –  OAuth fundamentally tries to solve this problem, by doing authentication but allowing to segment authorization per app –  “Valet Key” analogy: the App has access to the system as you, but cannot do certain things (like change your password) –  That valet key is a token, that automatically expires after a certain time –  Allows for “3-legged Authentication”, not just API and App or (API and User), but API, App and User •  Use for revokes and accounting –  You still end up doing a regular authentication somewhere in the middle (Basic auth, login form, etc.) Technical Remedies!
  • 40. Copyright ©2013 Ping Identity Corporation. All rights reserved.40 Confidential –  OAuth 1 •  Do not use OAuth 1.0: logically insecure •  OAuth 1.0a (RFC edition) fixes that, works nicely, in use at Twitter •  Signatures are hard (made so you don’t have to rely on SSL/TLS though) •  Malicious Apps can be kicked out and all their tokens revoked •  Web authentication flow can use keyfobs or other multi- factor auth systems •  Very web-centric. The ideal use-case when it was designed was “allow Twitter to access my Flickr photos” Technical Remedies!
  • 41. Copyright ©2013 Ping Identity Corporation. All rights reserved.41 Confidential –  OAuth 2.0 •  Lead author famously walked out, not all bad though! •  Hard to implement correctly, in a secure manner •  Lots of grant types •  Not as interoperable as OAuth 1 — really a framework, for security, not a protocol anymore •  Formalizes “scopes” for specific permissions (like “post to wall”, “see friends”, etc.) •  Introduces refresh tokens — stay away •  Introduces compatibility with SAML and JWT — stay away •  2 token types: Bearer and MAC Technical Remedies!
  • 42. Copyright ©2013 Ping Identity Corporation. All rights reserved.42 Confidential –  OAuth 2.0 Bearer Tokens •  only ones used in practice •  as insecure as a Bearer Bond •  Heavily rely on channel being secure, which is rarely the case, even over HTTPS •  No client binding –  App B could use a token issued for App A to log in as you to App A –  Facebook wrote its own extension to deal with that •  Stay away from refresh tokens, it only serves a very narrow use-case where two-tier refreshes are necessary. Technical Remedies!
  • 43. Copyright ©2013 Ping Identity Corporation. All rights reserved.43 Confidential 5.  Authorization –  Shiro — a Java framework to enforce authorization rules in your apps –  SAML — full XML protocol to handle authentication and authorization Technical Remedies!
  • 44. Copyright ©2013 Ping Identity Corporation. All rights reserved.44 Confidential   Identity Authentication Authorization Channel Enc. Accounting Dedicated ATM   X   X   802.1X   X   X   LDAP X   X (definitions)     ActiveDirectory X   X (definitions)     Database Table X         RADIUS/Diameter   X X   X VPN / IPSec   X   X   X.509 X X     SSL, TLS, DTS       X   Basic/Digest Auth, Login X X       2-factor   X       Master login X X       API keys   X X (primitives)     OAuth 1.0           OAuth 1.0a   X (primitives)     OAuth 2.0   X (primitives)     OpenID   X       OpenID Connect   X       SAML   X X (primitives)     Shiro or other framework   X X     Splunk or other logging         X Roll your own           Recap
  • 45. Copyright ©2013 Ping Identity Corporation. All rights reserved.45 Confidential   Identity Authentication Authorization Channel Enc. Accounting Dedicated ATM   X   X   802.1X   X   X   LDAP X   X (definitions)     ActiveDirectory X   X (definitions)     Database Table X         RADIUS/Diameter   X X   X VPN / IPSec   X   X   X.509 X X     SSL, TLS, DTS       X   Basic/Digest Auth, Login X X       2-factor   X       Master login X X       API keys   X X (primitives)     OAuth 1.0           OAuth 1.0a   X (primitives)     OAuth 2.0   X (primitives)     OpenID   X       OpenID Connect   X       SAML   X X (primitives)     Shiro or other framework   X X     Splunk or other logging         X Roll your own           Connect 5!
  • 46. Copyright ©2013 Ping Identity Corporation. All rights reserved.46 Confidential   Identity Authentication Authorization Channel Enc. Accounting Dedicated ATM   X   X   802.1X   X   X   LDAP X   X (definitions)     ActiveDirectory X   X (definitions)     Database Table X         RADIUS/Diameter   X X   X VPN / IPSec   X   X   X.509 X X     SSL, TLS, DTS       X   Basic/Digest Auth X X       2-factor   X       Master login X X       API keys   X X (primitives)     OAuth 1.0           OAuth 1.0a   X (primitives)     OAuth 2.0   X (primitives)     OpenID   X       OpenID Connect   X       SAML   X X (primitives)     Shiro or other framework   X X     Splunk or other logging         X Roll your own           Connect 5!
  • 47. Copyright ©2013 Ping Identity Corporation. All rights reserved.47 Confidential •  Use-cases –  Internal APIs –  Partner APIs –  Public APIs (consumer, open, mobile etc.) •  Tiers (legs) –  Server-to-Server (internal, partner) usually 2-legged authentication –  End-user (consumer, mobile, open) usually requires 3-legged authentication API Types (again) `
  • 48. Copyright ©2013 Ping Identity Corporation. All rights reserved.48 Confidential •  Internal, Server-to-Server APIs –  Use OAuth 2.0 with Bearer Tokens obtained through a Client Credentials grant (only 2-legged requirement) –  Alternatives: 802.1X with RADIUS/Diameter, X.509 •  Partner, Server-to-Server APIs –  Use OAuth 2.0 with Bearer obtained through a Client Credentials grant (only 2-legged requirement) –  Alternatives: VPN/IPSec with RADIUS/Diameter, X.509 •  Consumer, Open or End-user Internal/Partner –  Consumer/Open APIs: use OAuth 2.0 with Bearer Tokens, using Authentication Code or Implicit Grant flow (better support for advanced authentication options, less trust on clients) •  Mobile APIs –  use Oauth 2.0 (3-legged requirement) with Bearer Tokens obtained through a Resource Owner grant or OS integration if available (better UX) Recommendations
  • 49. Copyright ©2013 Ping Identity Corporation. All rights reserved.49 Confidential •  Security vs. Freedom •  Devil’s advocate OAuth 1.0a isn’t all bad, and tons of people implement it for Twitter. •  How badly do you want to protect this vs. how badly do you want people to use it? •  All the way to physically securing the interface… In conclusion…
  • 50. Copyright ©2013 Ping Identity Corporation. All rights reserved.50 Confidential •  Questions, comments: bstephens@pingidentify.com tim.a@apigee.com Thanks!