SlideShare a Scribd company logo
1 of 86
Download to read offline
Connect	
OpenID	
OpenID Connect	
Nat Sakimura
Chairman Senior Researcher
C6b. New School Identity Frameworks Panel
Foundation
Connect	
OpenID	
OAuth 2.0	
Identity Layer on top of	
Base Protocol
Connect	
OpenID	
Q	
Identity
Connect	
OpenID	
Identity = set of attributes
related to an entity [iso 29115]
Connect	
OpenID	
Entity	
 Identity
Connect	
OpenID	
Entity	
Human	
 Machine	
 Service
Connect	
OpenID	
No direct way to perceive	
Human
Connect	
OpenID	
Blond/grey	
Silver frame
glasses	
6’5” tall
Connect	
OpenID	
Entity	
Identity	
Identity	
Sex	
Mail	
height	
Boy
Friend	
Sex	
 height	
Real
Name	
Self Recognition	
Delta between Self and 3rd Party
Recognition = interpersonal problem	
Delta between Self and 3rd Party
Recognition= interpersonal problem	
Role	
Relatio
nship	
3rd Party
Recognition	
Relationship	
Friends	
Boss	
Self Recognition	
3rd Party
Recognition	
Street
Address	
Nickname	
Birthday	
Street
Address	
Employee
number	
licnese	
performance
Connect	
OpenID	
Man	
Identity	
Identity	
Identity
Connect	
OpenID	
Man	
Work	
Husband	
Father
Connect	
OpenID	
daughter	
mother	
wife	
girl
friend
collea-
gue	
boss	
community
member friend
Woman
Connect	
OpenID	
YOU	
Identity
A	
Identity
B	
Identity
C	
Site A	
Site B	
Site C
Connect	
OpenID	
Q	
Why not just OAuth?
Connect	
OpenID	
OAuth is an Access Granting Protocol	
Betty’s
Profile	
Alice	
 Cindy	
Cindy ≠ Betty	
Alice ≠ Betty
Connect	
OpenID	
Facebook extends OAuth with
“signed request”
“ID Token”
in OpenID Connect
Connect	
OpenID	
Token Swap Attack
Connect	
OpenID	
Login with Amazon
Connect	
OpenID	
http://blog.chromium.org/2013/07/richer-
access-to-google-services-and.html?m=1
Connect	
OpenID	
Signed Request	
•  Works only with
a single identity
provider
•  Proprietary
signature format	
ID Token	
•  Works with
multiple identity
providers
•  IETF JSON Web
Signature
Connect	
OpenID	
ID Token Claims Example
{
"iss": "https://server.example.com",
"sub": "248289761001",
"aud": "0acf77d4-b486-4c99-bd76-074ed6a64ddf",
"iat": 1311280970,
"exp": 1311281970,
"nonce": "n-0S6_WzA2Mj"
}
Connect	
OpenID	
Stick with OpenID Connect
and not “OAuth Authentication”
Connect	
OpenID	
An Identity Layer provides: 	
•  is the user that got authenticated	
Who 	
•  was he authenticated	
Where	
•  was he authenticated	
When 	
•  was he authenticated	
How 	
•  attributes he can give you	
What 	
•  he is providing them	
Why
Connect	
OpenID	
	
Interoperable	
Simple
&
Mobile
Friendly	
Secure	
Flexible
Connect	
OpenID	
	
Interoperable	
Simple
&
Mobile
Friendly	
Secure	
Flexible
Connect	
OpenID	
	
Interoperable	
Simple
&
Mobile
Friendly	
Secure	
Flexible
Connect	
OpenID	
	
Interoperable	
Simple
&
Mobile
Friendly	
Secure	
Flexible
Connect	
OpenID	
	
Interoperable	
Simple
&
Mobile
Friendly	
Secure	
Flexible
Connect	
OpenID	
Interoperable 	
•  openid, profile, email, address, phone	
Standard scopes	
•  Request object and claims	
Method to ask for
more granular claims	
•  Info about the authenticated user	
ID Token	
•  Get attributes about the user	
•  Translate the tokens
UserInfo endpoint
Connect	
OpenID	
Simple & Mobile Friendly	
JSON Based	
REST Friendly	
In simplest cases,
just copy and paste	
Mobile & App
Friendly	
e.g., ID Token is signed JSON
{
"iss": "https://client.example.com",
”sub": "24400320",
"aud": "s6BhdRkqt3",
"nonce": "n-0S6_WzA2Mj",
"exp": 1311281970,
"iat": 1311280970,
"auth_time": 1311280969,
"acr": "2",
"at_hash":
"MTIzNDU2Nzg5MDEyMzQ1Ng"
}
Connect	
OpenID	
Secure	
•  ISO/IEC 29115 Entity Authentication
Assurance
•  Choice of crypto	
LoA1	
LoA2	
LoA3	
LoA4
Connect	
OpenID	
Flexible	
•  Through Request Object (JSON)	
•  Data Minimization	
Granular
Request	
•  Does not disclose data recipients
to data sources	
Aggregated
Claims	
•  Decentralized Data Storage	
Distributed
Claims
Connect	
OpenID	
Choice of your provider	
Can be Google,
eBay, AOL,
Deutsche
Telecom etc. 	
Can be your
Phone =>
Self-Issued
Provider
Connect	
OpenID	
Details
Connect	
OpenID	
Name: Alice de
Wonderland
Mail: alice@example.com
Notary: Google. 	
Official
Google
Seal
株式会
社グー
グル印
Name: Alice de
Wonderland
Mail: alice@example.com
Notary: Google. 	
SAML Authentication	
1.  Who are you. Get me
a referral letter.
Do not forget about
Your email! 	
2. Plz write me a
referral letter。	
3. Here you are	
Alice	
4. Here is the
certificate. 	
notary	
Eve	
Official
Google
Seal
Connect	
OpenID	
1.  Who are YOU? Give me
a valet key to your house.
Then I will trust that
you are the owner of the house. 	
2. Can you give me
a valet key to my house? 	
3. Here you are!	
Alice	
4. Her is the key!	
Pseudo-Authentication using OAuth	
Apartment
Controller 	
Eve
Connect	
OpenID	
OpenID Connect Authentication	
1.  Who are you. Get me
a referral letter.
Do not forget about
Your email! 	
2. Give Eve the locker
Key and a referral
letter.
3. Here you are!	
Alice	
4. Here you are	
Date:2011/5/15 11:00:04
Level of Assurance:2
Verifier:Google	
Official
Google
Seal
Butler	
Locker	
 Locker	
Eve	
Date:2011/5/15 11:00:04
Level of Assurance:2
Verifier:Google	
Official
Google
Seal
Connect	
OpenID	
OpenID Connect's Clams aggregation and
distributed claims. 	
Name: Alice de Wanderland
DoB: 1989/3/3
Sex: F
Address: 135 Broadway., NY,
NY
NY City
Official
Seal
Locker	
UserInfo Endpoint	
Site X	
Site Y	
Site Z	
Eve
Connect	
OpenID	
Applying it to Enterprise model
Connect	
OpenID	
Entity	
Identity	
Identity	
Sex	
Mail	
height	
Boy
Friend	
Sex	
 height	
Real
Name	
Self Recognition	
Delta between Self and 3rd Party
Recognition = interpersonal problem	
Delta between Self and 3rd Party
Recognition= interpersonal problem	
Role	
Relatio
nship	
3rd Party
Recognition	
Relationship	
Friends	
Boss	
Self Recognition	
3rd Party
Recognition	
Street
Address	
Nickname	
Birthday	
Street
Address	
Employee
number	
licnese	
performance
Connect	
OpenID	
Real
Name	
Professional
qualification 	
department	
Geo-location	
Employee
number	
Entity	
 Identity	
 Resource	
Authentication	
Policy Enforcement
Rules
Connect	
OpenID	
ABAC (Attribute Based Access Control)	
Based on SP800-162 figure on page viii	
identity	
Resource	
Rules
Connect	
OpenID	
Real
Name	
Professional
qualification 	
department	
Geo-location	
Employee
number	
Entity	
 Identity	
Resource	
Authentication	
 PEP
PDP
PAP	
Boss	
 Metadata	
Log	
 Log
Connect	
OpenID	
Q	
What kind of
“Identity” (set of attributes)
an enterprise needs?
Connect	
OpenID	
Current Standard Claims wont do
Connect	
OpenID	
UserInfo Claims
•  sub
•  name
•  given_name
•  family_name
•  middle_name
•  nickname
•  preferred_username
•  profile
•  picture
•  website
•  gender
•  birthdate
•  locale
•  zoneinfo
•  updated_at
•  email
•  email_verified
•  phone_number
•  phone_number_verified
•  address
Connect	
OpenID	
UserInfo Claims Example
{
"sub": "248289761001",
"name": "Jane Doe",
"given_name": "Jane",
"family_name": "Doe",
"email": "janedoe@example.com",
"email_verified": true,
"picture": "http://example.com/janedoe/me.jpg"
}
Connect	
OpenID	
Perhaps we need standard
“enterprise” claims
Connect	
OpenID	
SCIM?
Connect	
OpenID	
SCIM Enterprise User Schema Extension	
•  employeeNumber
–  Numeric or alphanumeric identifier assigned to a person, typically
based on order of hire or association with an organization.
•  costCenter
–  Identifies the name of a cost center. organization Identifies the name
of an organization.
•  division
–  Identifies the name of a division.
•  department
–  Identifies the name of a department.
•  manager
–  The User's manager. A complex type that optionally allows Service
Providers to represent organizational hierarchy by referencing the "id"
attribute of another User.
Connect	
OpenID	
Not Quite.
Connect	
OpenID	
Perhaps we need standard
“enterprise” claims
Connect	
OpenID	
Q	
When shall I start using
OpenID Connect?
Connect	
OpenID	
Timeline	
2nd
Implementers
Draft Public
Review (45
days)
2nd
Implementers
Draft Vote
(14 days)	
Final Review
(60 days)	
Final	
We are here!	
December
2013
Connect	
OpenID	
Q	
uestions?
Connect	
OpenID	
OAuth and OpenID Connect:
In the Trenches	
Wednesday, July 10, 4:00 – 5:30 PM
Salon C/D/E	
to be continued at …
Connect	
OpenID	
Details …
Connect	
OpenID	
Working Together
OpenID Connect
Connect	
OpenID	
Working Group Members
•  Key working group participants:
–  Nat Sakimura – Nomura Research Institute – Japan
–  John Bradley – Ping Identity – Chile
–  Breno de Medeiros – Google – US
–  Axel Nennker – Deutsche Telekom – Germany
–  Torsten Lodderstedt – Deutsche Telekom – Germany
–  Roland Hedberg – Umeå University – Sweden
–  Andreas Åkre Solberg – UNINETT – Norway
–  Chuck Mortimore – Salesforce – US
–  Brian Campbell – Ping Identity – US
–  George Fletcher – AOL – US
–  Justin Richer – Mitre – US
–  Nov Matake – Independent – Japan
–  Mike Jones – Microsoft – US
•  By no means an exhaustive list!
Connect	
OpenID	
Design Philosophy
Simple Things Simple	
Complex Things
Possible
Connect	
OpenID	
Simple Things Simple
UserInfo endpoint for
simple claims about
user	
Designed to work well
on mobile phones
Connect	
OpenID	
How We Make It Simple
•  Build on OAuth 2.0
•  Use JavaScript Object Notation (JSON)
•  Build only the pieces that you need
•  Goal: Easy implementation on all modern
development platforms
Connect	
OpenID	
Complex Things Possible
Encrypted Claims	
Aggregated Claims	
Distributed Claims
Connect	
OpenID	
A Look Under the Covers
•  ID Token
•  Claims Requests
•  UserInfo Claims
•  Example Protocol Messages
Connect	
OpenID	
OpenID Connect Authentication	
1.  Who are you. Get me
a referral letter.
Do not forget about
Your email! 	
2. Give Eve the locker
Key and a referral
letter.
3. Here you are!	
Alice	
4. Here you are	
Date:2011/5/15 11:00:04
Level of Assurance:2
Verifier:Google	
Official
Google
Seal
Butler	
Locker	
 Locker	
Bob	
Date:2011/5/15 11:00:04
Level of Assurance:2
Verifier:Google	
Official
Google
Seal
Access Token	
 ID Token
Connect	
OpenID	
ID Token
•  JWT representing logged-in session
•  Claims:
–  iss – Issuer
–  sub – Identifier for subject (user)
–  aud – Audience for ID Token
–  iat – Time token was issued
–  exp – Expiration time
–  nonce – Mitigates replay attacks
–  at_hash – Left hash of the access token
–  azp – Authorized Party
Connect	
OpenID	
ID Token Claims Example
{
"iss": "https://server.example.com",
"sub": "alice",
"aud": "https://bob.example.com",
"iat": 1311280970,
"exp": 1311281970,
"nonce": "n-0S6_WzA2Mj",
"at_hash": "MTIzNDU2Nzg5MDEyMzQ1Ng",
"azp": "https://cindy.example.com/"
}
Connect	
OpenID	
at_hash makes
ID Token
a detached signature
for the access token
Connect	
OpenID	
azp allows token to be used by another party	
Site X	
Cindy	
Bob	
ID Token
Access Token
Connect	
OpenID	
Using Access Token only for Authentication is
Dangerous. 	
1.  Who are you. Get me
a referral letter.
Do not forget about
Your email! 	
2. Give Eve the locker
Key and a referral
letter.
3. Here you are!	
Alice	
4. Here you are	
Butler	
Access Token	
Eve
Connect	
OpenID	
OpenID Connect's Clams aggregation and
distributed claims. 	
Name: Alice de Wanderland
DoB: 1989/3/3
Sex: F
Address: 135 Broadway., NY,
NY
NY City
Official
Seal
Locker	
UserInfo Endpoint	
Site X	
Site Y	
Site Z	
Bob
Connect	
OpenID	
Aggregated Claims
Data
Source	
Data
Source	
Identity
Provider
Relying
Party
Signed Claims	
Claim Values
Connect	
OpenID	
Distributed Claims
Identity
Provider
Signed Claims	
Relying
Party
Claim Refs	
Data
Source	
Data
Source
Connect	
OpenID	
Claims Requests
•  Basic requests made using OAuth scopes:
–  openid – Declares request is for OpenID Connect
–  profile – Requests default profile info
–  email – Requests email address & verification
status
–  address – Requests postal address
–  phone – Requests phone number & verification
status
–  offline_access – Requests Refresh Token
issuance
•  Requests for individual claims can be made
using JSON “claims” request parameter
Connect	
OpenID	
Request Object
Connect	
OpenID	
You can register it at registration
time :
request_uri	
Personally Recommended
Connect	
OpenID	
Authorization Request Example
https://server.example.com/authorize
?response_type=token%20id_token
&client_id=0acf77d4-b486-4c99-bd76-074ed6a64ddf
&redirect_uri=https%3A%2F%2Fclient.example.com%2Fcb
&scope=openid%20profile
&state=af0ifjsldkj
&nonce=n-0S6_WzA2Mj
Connect	
OpenID	
Authorization Response Example
HTTP/1.1 302 Found
Location: https://client.example.com/cb
#access_token=mF_9.B5f-4.1JqM
&token_type=bearer
&id_token=eyJhbGzI1NiJ9.eyJz9Glnw9J.F9-V4IvQ0Z
&expires_in=3600
&state=af0ifjsldkj
Connect	
OpenID	
UserInfo Request Example
GET /userinfo?schema=openid HTTP/1.1
Host: server.example.com
Authorization: Bearer mF_9.B5f-4.1JqM
Connect	
OpenID	
Connect Specs Overview
Connect	
OpenID	
Resources
•  OpenID Connect
–  http://openid.net/connect/
•  OpenID Connect Working Group Mailing List
–  http://lists.openid.net/mailman/listinfo/openid-specs-ab
•  OpenID Connect Interop Wiki
–  http://osis.idcommons.net/
•  OpenID Connect Interop Mailing List
–  http://groups.google.com/group/openid-connect-interop
•  Mike Jones’ Blog
–  http://self-issued.info/
•  Nat Sakimura’s Blog
–  http://nat.sakimura.org/
•  John Bradley’s Blog
–  http://www.thread-safe.com/
Connect	
OpenID	
Current Status	
•  Waiting for dependencies to be completed
•  JWS, JWE, JWA, JWK	
IETF JOSE
WG	
•  JSON Web Token (JWT)	
IETF OAuth
WG 	
•  WebFinger
IETF Apps
WG
Connect	
OpenID	
Interop testing underway	
AOL, Google, IBM,
Layer 7, Mitre, NRI,
@nov, Orange, eBay,
Gluu, Ping Identity,
GÉANT, @ritou,
Emmanuel Raviart
120+
feature tests
14
implementations
Connect	
OpenID	
Start Building
Connect	
OpenID	
Start Building	
Now!
Connect	
OpenID	
http://nat.sakimura.org/

More Related Content

Similar to CIS13: Introduction to OpenID Connect

openid-pres
openid-presopenid-pres
openid-presxlight
 
Identity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityIdentity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityMartin Strandbygaard
 
Simon Willison @ FOWA Feb 07
Simon Willison @ FOWA Feb 07Simon Willison @ FOWA Feb 07
Simon Willison @ FOWA Feb 07carsonsystems
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
 
Joyce Sullivan presents LinkedIn Building Your Online Brand
Joyce Sullivan presents LinkedIn Building Your Online BrandJoyce Sullivan presents LinkedIn Building Your Online Brand
Joyce Sullivan presents LinkedIn Building Your Online BrandSocMediaFin - Joyce Sullivan
 
Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud CA API Management
 
OpenID @ Winterschool 2008
OpenID @ Winterschool 2008OpenID @ Winterschool 2008
OpenID @ Winterschool 2008scottw
 
CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)CloudIDSummit
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Open id & OAuth
Open id & OAuthOpen id & OAuth
Open id & OAuthPaul Fryer
 
Beyond passwords: time for a change
Beyond passwords: time for a changeBeyond passwords: time for a change
Beyond passwords: time for a changeOlivier Potonniée
 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfssuser00208b
 
IIW-11 Pseudonyms for Privacy
IIW-11 Pseudonyms for PrivacyIIW-11 Pseudonyms for Privacy
IIW-11 Pseudonyms for PrivacyJayUnger
 
How to Make An Anonymous Blog PDF (2022)
How to Make An Anonymous Blog PDF (2022)How to Make An Anonymous Blog PDF (2022)
How to Make An Anonymous Blog PDF (2022)abdolrauf
 
OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11Nov Matake
 
Authentication options for Open edX: focus on OAuth and OpenID
Authentication options for Open edX: focus on OAuth and OpenIDAuthentication options for Open edX: focus on OAuth and OpenID
Authentication options for Open edX: focus on OAuth and OpenIDFrederik Questier
 

Similar to CIS13: Introduction to OpenID Connect (20)

openid-pres
openid-presopenid-pres
openid-pres
 
Identity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityIdentity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric Identity
 
Simon Willison @ FOWA Feb 07
Simon Willison @ FOWA Feb 07Simon Willison @ FOWA Feb 07
Simon Willison @ FOWA Feb 07
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
Joyce Sullivan presents LinkedIn Building Your Online Brand
Joyce Sullivan presents LinkedIn Building Your Online BrandJoyce Sullivan presents LinkedIn Building Your Online Brand
Joyce Sullivan presents LinkedIn Building Your Online Brand
 
Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud Patterns to Bring Enterprise and Social Identity to the Cloud
Patterns to Bring Enterprise and Social Identity to the Cloud
 
OpenID @ Winterschool 2008
OpenID @ Winterschool 2008OpenID @ Winterschool 2008
OpenID @ Winterschool 2008
 
CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)CIS14: Identifying Things (and Things Identifying Us)
CIS14: Identifying Things (and Things Identifying Us)
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
Open id & OAuth
Open id & OAuthOpen id & OAuth
Open id & OAuth
 
Beyond passwords: time for a change
Beyond passwords: time for a changeBeyond passwords: time for a change
Beyond passwords: time for a change
 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
 
From idea to exit
From idea to exitFrom idea to exit
From idea to exit
 
IIW-11 Pseudonyms for Privacy
IIW-11 Pseudonyms for PrivacyIIW-11 Pseudonyms for Privacy
IIW-11 Pseudonyms for Privacy
 
How to Make An Anonymous Blog PDF (2022)
How to Make An Anonymous Blog PDF (2022)How to Make An Anonymous Blog PDF (2022)
How to Make An Anonymous Blog PDF (2022)
 
OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11
 
Authentication options for Open edX: focus on OAuth and OpenID
Authentication options for Open edX: focus on OAuth and OpenIDAuthentication options for Open edX: focus on OAuth and OpenID
Authentication options for Open edX: focus on OAuth and OpenID
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

CIS13: Introduction to OpenID Connect