SlideShare une entreprise Scribd logo
1  sur  25
OAuth 2.0 101
Adapting to the Web Beyond the Browser
Anand Sharma
IT Architect
April 2012




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   1
Beyond the Browser:




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   2
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   3
For the successful companies, 80% of traffic will be coming from beyond the browser.
© 2010 Cisco and/or its affiliates. All rights reserved.                            Cisco Confidential   5
The resource is some website; the user is the consumer
                                                   Authorization is granted by the an Admin

© 2010 Cisco and/or its affiliates. All rights reserved.                                             Cisco Confidential   6
The resource is owned by the user
                                                            The application consumes the resource
                                                           The application is given too much power

© 2010 Cisco and/or its affiliates. All rights reserved.                                             Cisco Confidential   7
The resource is owned by the user
                                                            The application consumes the resource
                                                           The application is given too much power

© 2010 Cisco and/or its affiliates. All rights reserved.                                             Cisco Confidential   8
Because, Services (APIs) and Passwords don’t mix well




© 2010 Cisco and/or its affiliates. All rights reserved.          Cisco Confidential   9
OAuth 2.0:




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   10
Defines Authorization & Authentication
      framework for RESTful services

      Supports variety of clients – from Servers to
      Mobile Apps

      Puts the user in control of what resources are
      shared – mitigates password anti-pattern




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   11
Application that calls API (Client)
      Software application that calls REST APIs

      Human User using the App (Resource Owner)
      End-user whose data is offered up through an API to Clients


      API Proxy or Host (Resource Server)
      Accepts access tokens on API calls in order to authenticate calling client


      Token Server (Authorization Server)
      Issues Access tokens after Authenticating the client and/or Resource Owner




© 2010 Cisco and/or its affiliates. All rights reserved.                       Cisco Confidential   12
Short-lived Token (Access Token)
      Applications authenticate to APIs using an Access Token

      Long-lived Token (Refresh Token)
      Refresh Tokens, if present, can be used to get a new Access Token




© 2010 Cisco and/or its affiliates. All rights reserved.                  Cisco Confidential   13
1.   Client Gets Token
                                                                           2.   Client Uses Token
                                                                           3.   Resource Server Validates Token
                                                                           4.   Client Refreshes Token (Optional)




                                      95% of OAuth (and OAuth Complexity) is about:
                                      - Step #1: How to get Access Token
                                      - OAuth’s Confusing terminology


© 2010 Cisco and/or its affiliates. All rights reserved.                                                     Cisco Confidential   14
Client Identity



                                                                                 Human User
                                                                                   Identity




                                                           Access
                                                           Token



© 2010 Cisco and/or its affiliates. All rights reserved.                                Cisco Confidential   15
Directly exchanges Client’s credentials for
      an Access token

      For accessing client-owned resources (no
      Human User involvement)




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   16
Directly exchanges Human User’s
      credentials for an access token

      Useful where the Client is well-trusted by
      the user and where a browser redirect
      would be awkward

      Commonly used with trusted Mobile apps




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   17
Similar to OAuth 1.0a flow
      - Starts with redirect to provider for
      authorization
      - After authorization, redirects back to
      client with code query parameter
      – Code is exchanged for access token

      Client is able to keep tokens confidential

      Commonly used for web apps connecting
      with providers




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   18
Simplified Authorization flow
      – After Authorization, redirects back to
      client with Access token in fragment
      parameter

      Reduced round-trips

      Refresh token is not supported
      Commonly used by in browser JavaScript
      apps or widgets




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   19
The client sends an access token request
      to the authorization server that includes a
      SAML 2.0 Assertion

      The authorization server validates the
      Assertion per the processing rules defined
      in this specification and issues an access
      token.




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   20
OAuth Challenges:




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   21
OAuth: What version should we
use?
Standardize on OAuth 2.0 Draft 20


Lack of Understanding
Book(s), Brown-bags


Lack of tools and frameworks




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   22
“Getting Started with OAuth 2.0” O’Reilly Book

OAuth 2.0 Draft 25 (http://bit.ly/dft-oauth)

Search for “OAuth 2.0” in Google




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   23
Backup Slides
                                                           Q&A




© 2010 Cisco and/or its affiliates. All rights reserved.         Cisco Confidential   24
OAuth 2.0 101

Contenu connexe

Tendances

OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkOAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
Nov Matake
 
Patterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSOPatterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSO
WSO2
 
Smart Card Authentication
Smart Card AuthenticationSmart Card Authentication
Smart Card Authentication
Dan Usher
 

Tendances (20)

Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2
 
Certification Authority - Sergio Lietti
Certification Authority - Sergio LiettiCertification Authority - Sergio Lietti
Certification Authority - Sergio Lietti
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_security
 
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
 
Implementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 PresentationImplementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 Presentation
 
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkOAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
 
OpenID Connect Explained
OpenID Connect ExplainedOpenID Connect Explained
OpenID Connect Explained
 
Authlete: API Authorization Enabler for API Economy
Authlete: API Authorization Enabler for API EconomyAuthlete: API Authorization Enabler for API Economy
Authlete: API Authorization Enabler for API Economy
 
Patterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSOPatterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSO
 
Best Practices for API Security
Best Practices for API SecurityBest Practices for API Security
Best Practices for API Security
 
CIS 2012 - Going Mobile with PingFederate and OAuth 2
CIS 2012 - Going Mobile with PingFederate and OAuth 2CIS 2012 - Going Mobile with PingFederate and OAuth 2
CIS 2012 - Going Mobile with PingFederate and OAuth 2
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConference
 
Identiverse - Microservices Security
Identiverse - Microservices SecurityIdentiverse - Microservices Security
Identiverse - Microservices Security
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
Identity Management: Using OIDC to Empower the Next-Generation Apps
Identity Management: Using OIDC to Empower the Next-Generation AppsIdentity Management: Using OIDC to Empower the Next-Generation Apps
Identity Management: Using OIDC to Empower the Next-Generation Apps
 
Incorporating OAuth: How to integrate OAuth into your mobile app
Incorporating OAuth: How to integrate OAuth into your mobile appIncorporating OAuth: How to integrate OAuth into your mobile app
Incorporating OAuth: How to integrate OAuth into your mobile app
 
Smart Card Authentication
Smart Card AuthenticationSmart Card Authentication
Smart Card Authentication
 

En vedette

En vedette (6)

OAuth 2.0
OAuth 2.0OAuth 2.0
OAuth 2.0
 
Enterprise mode vs doc mode 사용 전략
Enterprise mode vs doc mode 사용 전략Enterprise mode vs doc mode 사용 전략
Enterprise mode vs doc mode 사용 전략
 
Implementing OpenID
Implementing OpenIDImplementing OpenID
Implementing OpenID
 
OpenID Bootcamp Tutorial
OpenID Bootcamp TutorialOpenID Bootcamp Tutorial
OpenID Bootcamp Tutorial
 
OpenID Authentication by example
OpenID Authentication by exampleOpenID Authentication by example
OpenID Authentication by example
 
OpenID Connect and Single Sign-On for Beginners
OpenID Connect and Single Sign-On for BeginnersOpenID Connect and Single Sign-On for Beginners
OpenID Connect and Single Sign-On for Beginners
 

Similaire à OAuth 2.0 101

Similaire à OAuth 2.0 101 (20)

Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security Explained
 
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security Explained
 
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
 
API Security with OAuth2.0.
API Security with OAuth2.0.API Security with OAuth2.0.
API Security with OAuth2.0.
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIs
 
CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0
 
KubeConRecap_nakamura.pdf
KubeConRecap_nakamura.pdfKubeConRecap_nakamura.pdf
KubeConRecap_nakamura.pdf
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
 
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
 
Securing APIs with oAuth2
Securing APIs with oAuth2Securing APIs with oAuth2
Securing APIs with oAuth2
 
O Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bO Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10b
 
Best Practices for API Security
Best Practices for API SecurityBest Practices for API Security
Best Practices for API Security
 
Securing ap is oauth and fine grained access control
Securing ap is   oauth and fine grained access controlSecuring ap is   oauth and fine grained access control
Securing ap is oauth and fine grained access control
 
OpenStack Architecture
OpenStack ArchitectureOpenStack Architecture
OpenStack Architecture
 
OpenStack Architecture
OpenStack ArchitectureOpenStack Architecture
OpenStack Architecture
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

OAuth 2.0 101

  • 1. OAuth 2.0 101 Adapting to the Web Beyond the Browser Anand Sharma IT Architect April 2012 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. Beyond the Browser: © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4.
  • 5. For the successful companies, 80% of traffic will be coming from beyond the browser. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. The resource is some website; the user is the consumer Authorization is granted by the an Admin © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. The resource is owned by the user The application consumes the resource The application is given too much power © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. The resource is owned by the user The application consumes the resource The application is given too much power © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Because, Services (APIs) and Passwords don’t mix well © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. OAuth 2.0: © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Defines Authorization & Authentication framework for RESTful services Supports variety of clients – from Servers to Mobile Apps Puts the user in control of what resources are shared – mitigates password anti-pattern © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. Application that calls API (Client) Software application that calls REST APIs Human User using the App (Resource Owner) End-user whose data is offered up through an API to Clients API Proxy or Host (Resource Server) Accepts access tokens on API calls in order to authenticate calling client Token Server (Authorization Server) Issues Access tokens after Authenticating the client and/or Resource Owner © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Short-lived Token (Access Token) Applications authenticate to APIs using an Access Token Long-lived Token (Refresh Token) Refresh Tokens, if present, can be used to get a new Access Token © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. 1. Client Gets Token 2. Client Uses Token 3. Resource Server Validates Token 4. Client Refreshes Token (Optional) 95% of OAuth (and OAuth Complexity) is about: - Step #1: How to get Access Token - OAuth’s Confusing terminology © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. Client Identity Human User Identity Access Token © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Directly exchanges Client’s credentials for an Access token For accessing client-owned resources (no Human User involvement) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Directly exchanges Human User’s credentials for an access token Useful where the Client is well-trusted by the user and where a browser redirect would be awkward Commonly used with trusted Mobile apps © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. Similar to OAuth 1.0a flow - Starts with redirect to provider for authorization - After authorization, redirects back to client with code query parameter – Code is exchanged for access token Client is able to keep tokens confidential Commonly used for web apps connecting with providers © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. Simplified Authorization flow – After Authorization, redirects back to client with Access token in fragment parameter Reduced round-trips Refresh token is not supported Commonly used by in browser JavaScript apps or widgets © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. The client sends an access token request to the authorization server that includes a SAML 2.0 Assertion The authorization server validates the Assertion per the processing rules defined in this specification and issues an access token. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. OAuth Challenges: © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. OAuth: What version should we use? Standardize on OAuth 2.0 Draft 20 Lack of Understanding Book(s), Brown-bags Lack of tools and frameworks © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. “Getting Started with OAuth 2.0” O’Reilly Book OAuth 2.0 Draft 25 (http://bit.ly/dft-oauth) Search for “OAuth 2.0” in Google © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. Backup Slides Q&A © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24