SlideShare a Scribd company logo
Anthony Chow
Twitter: @vCloudernBeer
Different kinds of APIs
 https://ffeathers.wordpress.com/2014/02/16/api-types/
REST API Security Best Practice
 OWASP - Open Web Application Security Project
 https://www.owasp.org/index.php/REST_Security_
Cheat_Sheet
 https://dzone.com/articles/top-5-rest-api-security-
guidelines
What is OAuth2?
OAuth2
 “Open Authentication” (??)
 Authorization delegation
 An authorization framework
 Defined by RFC 6749 and 6750
 OAuth 1 is defined by RFC 5849
 OAuth 1 and OAuth 2 are not compatible
Oauth2 Actors
 Image source: https://www.linkedin.com/pulse/microservices-security-openid-connect-manish-singh/
OAuth2 Flows (grants)
 image source: https://www.slideshare.net/rcandidosilva/javaone-2014-securing-restful-resources-with-oauth2
OAuth2 Authorization Grants
 Different ways of getting a token
 Authorization code,
 Implicit grant,
 Resource owner password credentials and
 Client credentials
 Which OAuth 2.0 flow should I use?
OAuth2 Tokens
 Access Token
 Refresh Token
OAuth2 simplified view
 Image source: https://www.hivemq.com/wp-content/uploads/oauth-simple.png
OpenID Connect (OIDC)
 Image source: https://developer.okta.com/standards/OIDC/index
OpenID Connect vs OAuth2
 Image source: https://www.slideshare.net/vladimirdzhuvinov/openid-connectexplained
JSON Web Token (JWT)
 Image source: www.youtube.com
OAuth2 + OIDC + JWT
 Image source: http://kasunpanorama.blogspot.com/2015/11/microservices-in-practice.html
Resources for API Security
 Auth0: https://auth0.com/
 Mulesoft: https://www.mulesoft.com/
 Ory: https://www.ory.am/index.html
 Stormpath (now Okta): https://www.okta.com/
 Nordic APIs: https://nordicapis.com/
 Amazon Cognito: https://aws.amazon.com/cognito/
Resources for JSON Web Token
 https://auth0.com/learn/json-web-tokens/
 https://jwt.io/introduction/
 https://scotch.io/tutorials/the-anatomy-of-a-json-
web-token
 https://auth0.com/e-books/jwt-handbook
Resource for OAuth2
 RFC 6749 - https://tools.ietf.org/html/rfc6749
 RFC 6750 - https://tools.ietf.org/html/rfc6750
 https://auth0.com/docs/protocols/oauth2
 https://developers.google.com/oauthplayground/

More Related Content

PPTX
Id fiware upm-dit
ODP
Synapse india reviews on security for the share point developer
PPTX
Web tools ppt
PPT
Silicon Valley Code Camp 2009: OAuth: What, Why and How
PDF
persentation
PPTX
OAuth Linking-Social Networks
PPT
Mule security - authorization using spring security
PDF
T04505103106
Id fiware upm-dit
Synapse india reviews on security for the share point developer
Web tools ppt
Silicon Valley Code Camp 2009: OAuth: What, Why and How
persentation
OAuth Linking-Social Networks
Mule security - authorization using spring security
T04505103106

What's hot (10)

PDF
RESTful Day 5
PDF
Vulnerability Funalitics with vulners.com
PPTX
Introduction to OAuth2
PDF
Vulners: Google for hackers
PPTX
SSO with sfdc
PDF
Top 10 Web App Security Risks
PDF
Spring4 security oauth2
PPTX
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
PDF
Seminar2015Bilic_Nicole
PPTX
Securing the Web @DevDay Da Nang 2018
RESTful Day 5
Vulnerability Funalitics with vulners.com
Introduction to OAuth2
Vulners: Google for hackers
SSO with sfdc
Top 10 Web App Security Risks
Spring4 security oauth2
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
Seminar2015Bilic_Nicole
Securing the Web @DevDay Da Nang 2018
Ad

Similar to Api security with o auth2 (20)

PPTX
OAuth - Don’t Throw the Baby Out with the Bathwater
PDF
Stateless Auth using OAuth2 & JWT
PDF
Stateless Auth using OAUTH2 & JWT
PDF
JHipster and Okta - JHipster Virtual Meetup December 2020
PPTX
Oauth2 and OWSM OAuth2 support
PPTX
Securing APIs using OAuth 2.0
PPTX
Securing RESTful APIs using OAuth 2 and OpenID Connect
PPTX
Single-Page-Application & REST security
PDF
Protecting your APIs with OAuth 2.0
PPT
Oauth2.0
PDF
O auth2.0 guide
PDF
Facebook data breach and OAuth2
PDF
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
PDF
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
PDF
OAuth 2.0 and Library
PPTX
Web API 2 Token Based Authentication
PDF
When and Why Would I use Oauth2?
PDF
SAML VS OAuth 2.0 VS OpenID Connect
PPTX
OAuth2 Introduction
OAuth - Don’t Throw the Baby Out with the Bathwater
Stateless Auth using OAuth2 & JWT
Stateless Auth using OAUTH2 & JWT
JHipster and Okta - JHipster Virtual Meetup December 2020
Oauth2 and OWSM OAuth2 support
Securing APIs using OAuth 2.0
Securing RESTful APIs using OAuth 2 and OpenID Connect
Single-Page-Application & REST security
Protecting your APIs with OAuth 2.0
Oauth2.0
O auth2.0 guide
Facebook data breach and OAuth2
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
OAuth 2.0 and Library
Web API 2 Token Based Authentication
When and Why Would I use Oauth2?
SAML VS OAuth 2.0 VS OpenID Connect
OAuth2 Introduction
Ad

More from Anthony Chow (14)

PPTX
Build your own Blockchain with the right tool for your application
PPT
Container security
PPT
MQTT security
PPTX
Understanding gRPC Authentication Methods
PPTX
Container security
PPT
Container security
PPTX
V brownbag sept-14-2016
PPTX
Understanding the container landscape and it associated projects
PPTX
Getting over the barrier and start contributing to OpenStack
PPT
Introduction to go
PPTX
Micro segmentation – a perfect fit for microservices
PPTX
An overview of OpenStack for the VMware community
PPTX
VXLAN in the contemporary data center
PPT
What a Beginner Should Know About OpenStack
Build your own Blockchain with the right tool for your application
Container security
MQTT security
Understanding gRPC Authentication Methods
Container security
Container security
V brownbag sept-14-2016
Understanding the container landscape and it associated projects
Getting over the barrier and start contributing to OpenStack
Introduction to go
Micro segmentation – a perfect fit for microservices
An overview of OpenStack for the VMware community
VXLAN in the contemporary data center
What a Beginner Should Know About OpenStack

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Modernizing your data center with Dell and AMD
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
“AI and Expert System Decision Support & Business Intelligence Systems”
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Modernizing your data center with Dell and AMD
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
Big Data Technologies - Introduction.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf

Api security with o auth2

  • 2. Different kinds of APIs  https://ffeathers.wordpress.com/2014/02/16/api-types/
  • 3. REST API Security Best Practice  OWASP - Open Web Application Security Project  https://www.owasp.org/index.php/REST_Security_ Cheat_Sheet  https://dzone.com/articles/top-5-rest-api-security- guidelines
  • 5. OAuth2  “Open Authentication” (??)  Authorization delegation  An authorization framework  Defined by RFC 6749 and 6750  OAuth 1 is defined by RFC 5849  OAuth 1 and OAuth 2 are not compatible
  • 6. Oauth2 Actors  Image source: https://www.linkedin.com/pulse/microservices-security-openid-connect-manish-singh/
  • 7. OAuth2 Flows (grants)  image source: https://www.slideshare.net/rcandidosilva/javaone-2014-securing-restful-resources-with-oauth2
  • 8. OAuth2 Authorization Grants  Different ways of getting a token  Authorization code,  Implicit grant,  Resource owner password credentials and  Client credentials  Which OAuth 2.0 flow should I use?
  • 9. OAuth2 Tokens  Access Token  Refresh Token
  • 10. OAuth2 simplified view  Image source: https://www.hivemq.com/wp-content/uploads/oauth-simple.png
  • 11. OpenID Connect (OIDC)  Image source: https://developer.okta.com/standards/OIDC/index
  • 12. OpenID Connect vs OAuth2  Image source: https://www.slideshare.net/vladimirdzhuvinov/openid-connectexplained
  • 13. JSON Web Token (JWT)  Image source: www.youtube.com
  • 14. OAuth2 + OIDC + JWT  Image source: http://kasunpanorama.blogspot.com/2015/11/microservices-in-practice.html
  • 15. Resources for API Security  Auth0: https://auth0.com/  Mulesoft: https://www.mulesoft.com/  Ory: https://www.ory.am/index.html  Stormpath (now Okta): https://www.okta.com/  Nordic APIs: https://nordicapis.com/  Amazon Cognito: https://aws.amazon.com/cognito/
  • 16. Resources for JSON Web Token  https://auth0.com/learn/json-web-tokens/  https://jwt.io/introduction/  https://scotch.io/tutorials/the-anatomy-of-a-json- web-token  https://auth0.com/e-books/jwt-handbook
  • 17. Resource for OAuth2  RFC 6749 - https://tools.ietf.org/html/rfc6749  RFC 6750 - https://tools.ietf.org/html/rfc6750  https://auth0.com/docs/protocols/oauth2  https://developers.google.com/oauthplayground/