SlideShare a Scribd company logo
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
RESTful Security
Resources
• Great password strength check: http://www.passwordmeter.com

• User higher encryption rates are stronger (note Java blocks 256bit encryption out
  of the box due to US export regulations!) To use unlimited strength encryption you
  need to download and install the Java Cryptography Extension (JCE) Unlimited
  Strength Jurisdiction Policy Files for your version of Java:

   • http://www.oracle.com/technetwork/java/javase/tech/index-
     jsp-136007.html#UnlimitedDownload

   • http://www.oracle.com/technetwork/java/javase/downloads/index.html

   • http://www.oracle.com/technetwork/java/archive-139210.html

• Bouncy Castle: http://www.bouncycastle.org/

• Stateless: http://www.isecpartners.com/files/web-session-management.pdf
  (section 5D has a good client-side session  mechanism)
AD          Active Directory   http://en.wikipedia.org/wiki/         2000   Microsoft specific implementation of LDAP, based on Novell eDirectory. 
                               Active_Directory                             Utilizes Kerberos-based authentication.




CAS         Centralized        http://en.wikipedia.org/wiki/         2004   Centralized nature.  Potentially unstable - 36 releases on Jasig CAS in the
            Authentication     Central_Authentication_Service               last 2 years (2/09 - 12/10)
            Service"




GSSAPI      Generic Security   http://en.wikipedia.org/wiki/         1993   An API API that is honored by other technologies.  Anticipating new
            Services           Generic_Security_Services_Applicati          security mechanisms, the GSSAPI includes a negotiating pseudo
                               on_Program_Interface                         mechanism, SPNEGO, that can discover and use new mechanisms not
                                                                            present when the original application was built.




HTTP Auth   HTTP               http://en.wikipedia.org/wiki/         1996   Basic access authentication is a method designed to allow a web browser,
            Authentication     HTTP_authentication                          or other client program, to provide credentials – in the form of a user name
                                                                            and password – when making a request.  Open, but most browsers
                                                                            support via pop-up.
HTTPS      HTTP Secure           http://en.wikipedia.org/wiki/Https       1994     A combination of the Hypertext Transfer Protocol with the SSL/TLS protocol
                                                                                   to provide encrypted communication and secure identification of a network
                                                                                   web server.




JAAS       Java Authentication   http://en.wikipedia.org/wiki/        2001         JAAS defines a framework for subject-based authentication and
           and Authorization     Java_Authentication_and_Authorizatio              authorization in a pluggable manner, decoupling applications from underlying
           Service               n_Service                                         security implementations.  Java specific.




Kerberos   Kerberos              http://en.wikipedia.org/wiki/Kerberos_   1980's   Created by MIT.  Key aim is for trusted computers on an untrusted network. 
                                 %28protocol%29                                    Both User and Server identity are handled. Centralized nature.
LDAP    Lightweight          http://en.wikipedia.org/wiki/Ldap    1980's   Flexible data store.  Originally an alternate protocol to access X.500 directory
        Directory Access                                                   services. This is a heavyweight with a complex data structure.
        Protocol




NTLM    NT Lan Manager       http://en.wikipedia.org/wiki/NTLM    1980's   Microsoft specific, weak encryption.  While Kerberos has replaced NTLM as
                                                                           the default authentication protocol in an Active Directory based single sign-on
                                                                           scheme, NTLM is still widely used in situations where a domain controller is
                                                                           not available or is unreachable.




OAuth   Open Authorization   http://en.wikipedia.org/wiki/Oauth   2006     OAuth lets you authorize one website – the consumer – to access your data
                                                                           from another website – the provider.  Open standard for authorization. It
                                                                           allows users to share their private resources (e.g. photos, videos, contact
                                                                           lists) stored on one site with another site without having to hand out their
                                                                           credentials, typically username and password.  Worth watching as major
                                                                           players are investing in this, though there is some controversy to be
                                                                           explored.  On April 23, 2009, a security flaw in the 1.0 protocol was
                                                                           announced.  Facebook's new Graph API only supports OAuth 2.0.  Oauth 2.0
                                                                           is currently not final.
OpenID   OpenID               http://en.wikipedia.org/wiki/Openid   2005   Open Id gives you one login for multiple sites.  An open standard that
                                                                           describes how users can be authenticated in a decentralized manner,
                                                                           obviating the need for services to provide their own ad hoc systems and
                                                                           allowing users to consolidate their digital identities.  Providers include AOL,
                                                                           BBC,Facebook, Google,IBM, MySpace, Orange, PayPal, VeriSign,
                                                                           LiveJournal, Yandex, Ustream and Yahoo!.




PAM      Pluggable            http://en.wikipedia.org/wiki/         1996   Fragmented, each implementation has gone in a different direction.  The
         Authentication       Pluggable_Authentication_Modules             XSSO standard differs from both the original RFC, and from the Linux and
         Modules                                                           Sun APIs — from most other implementations.   Despite PAM being part of
                                                                           the X/Open Single Sign-on (XSSO) standard, PAM on its own cannot
                                                                           implement Kerberos, the most common type of SSO used in Unix
                                                                           environments.




SAML     Security Assertion   http://en.wikipedia.org/wiki/Saml     2002   SOAP-based standard for exchanging authentication and authorization data
         Markup Language                                                   between security domains. Bloated and is specified in terms of
                                                                           implementation details.
SASL"    Simple               http://en.wikipedia.org/wiki/        1997    A framework for authentication and data security in Internet protocols. 
         Authentication and   Simple_Authentication_and_Security_L         Provides a layer for authentication, on top of which an application protocol
         Security Layer       ayer                                         (e.g. XMPP) can operate.  XML-based standard for exchanging authentication
                                                                           and authorization data between security domains




SPNEGO   Simple and           http://en.wikipedia.org/wiki/SPNEGO   1996   SPNEGO's most visible use is in Microsoft's "HTTP Negotiate" authentication
         Protected GSSAPI                                                  extension. It was first implemented in Internet Explorer 5.01 and IIS 5.0 and
         Negotiation                                                       provided single sign-on capability later marketed as Integrated Windows
         Mechanism                                                         Authentication. The negotiable sub-mechanisms included NTLM and
                                                                           Kerberos, both used in Active Directory.




Spring   FKA Acegi            http://en.wikipedia.org/wiki/         2004   (Originally released as Acegi) Client oriented framework supporting most
                              Spring_Security                              protocols listed here, extensible to support any desired provider.  Open, but
                                                                           specific to Java.




SSPI     Security Support     http://en.wikipedia.org/wiki/SSPI     1995   An API API mechanism.  Used to dynamically support access to various
         Provider Interface                                                implementations.  SSPI is a proprietary variant of GSSAPI with extensions
                                                                           and very Windows-specific data types.
RESTful Security

More Related Content

PDF
Websphere Portal V6.1 Security Overview
PDF
McAfee Foundstone Update
PDF
Implementing Application Security
PPT
Making Sense Of Web Services
PDF
WhiteHat Security "Website Security Statistics Report" (Q1'09)
PDF
Password Synchronization
PPT
Owasp Forum Web Services Security
PDF
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
Websphere Portal V6.1 Security Overview
McAfee Foundstone Update
Implementing Application Security
Making Sense Of Web Services
WhiteHat Security "Website Security Statistics Report" (Q1'09)
Password Synchronization
Owasp Forum Web Services Security
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application

What's hot (7)

PDF
Identity Management Overview: CAS and Shibboleth
PDF
Ces70 salesforce2 connectorguide
PDF
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
PDF
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
PDF
Soa Security Testing
PPTX
Single Sign-On security issue in Cloud Computing
ODP
Authentication and Single Sing on
Identity Management Overview: CAS and Shibboleth
Ces70 salesforce2 connectorguide
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
Soa Security Testing
Single Sign-On security issue in Cloud Computing
Authentication and Single Sing on
Ad

Viewers also liked (8)

PDF
OAuth2 Authentication
PDF
Deep Dive In To Kerberos
PPTX
An Introduction to OAuth2
PDF
OAuth 2.0
PPTX
An Introduction to OAuth 2
PPTX
IP Security
PDF
Demystifying OAuth 2.0
OAuth2 Authentication
Deep Dive In To Kerberos
An Introduction to OAuth2
OAuth 2.0
An Introduction to OAuth 2
IP Security
Demystifying OAuth 2.0
Ad

Similar to RESTful Security (20)

PPTX
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
PPTX
Introduction to the WSO2 Identity Server &Contributing to an OS Project
PDF
Enable Secure Mobile & Web Access to Microsoft SharePoint
PDF
CamelOne 2013 Karaf A-MQ Camel CXF Security
DOCX
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
PPTX
CryptoStandards and protocols for digital secure communications
PPTX
Layered Security Defense
PPT
Securing RESTful API
DOCX
Sesame in a nutshell
PDF
FS_Usage_Scenarios
PDF
Linux quick reference
PDF
Linux Security Quick Reference Guide
PDF
(Pdf) yury chemerkin ita_2013
DOCX
All about Oracle Security Developer Tools
PPTX
Cloud Security Fundamentals Webinar
PDF
(Pdf) yury chemerkin intelligence_sec_2013
PPTX
Open Stack Cloud Services
DOCX
Study notes for CompTIA Certified Advanced Security Practitioner
PDF
(Pdf) yury chemerkin deep_intel_2013
PPT
Novell® iChain® 2.3
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Enable Secure Mobile & Web Access to Microsoft SharePoint
CamelOne 2013 Karaf A-MQ Camel CXF Security
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
CryptoStandards and protocols for digital secure communications
Layered Security Defense
Securing RESTful API
Sesame in a nutshell
FS_Usage_Scenarios
Linux quick reference
Linux Security Quick Reference Guide
(Pdf) yury chemerkin ita_2013
All about Oracle Security Developer Tools
Cloud Security Fundamentals Webinar
(Pdf) yury chemerkin intelligence_sec_2013
Open Stack Cloud Services
Study notes for CompTIA Certified Advanced Security Practitioner
(Pdf) yury chemerkin deep_intel_2013
Novell® iChain® 2.3

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Monthly Chronicles - July 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars

RESTful Security

  • 29. Resources • Great password strength check: http://www.passwordmeter.com • User higher encryption rates are stronger (note Java blocks 256bit encryption out of the box due to US export regulations!) To use unlimited strength encryption you need to download and install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files for your version of Java: • http://www.oracle.com/technetwork/java/javase/tech/index- jsp-136007.html#UnlimitedDownload • http://www.oracle.com/technetwork/java/javase/downloads/index.html • http://www.oracle.com/technetwork/java/archive-139210.html • Bouncy Castle: http://www.bouncycastle.org/ • Stateless: http://www.isecpartners.com/files/web-session-management.pdf (section 5D has a good client-side session  mechanism)
  • 30. AD Active Directory http://en.wikipedia.org/wiki/ 2000 Microsoft specific implementation of LDAP, based on Novell eDirectory.  Active_Directory Utilizes Kerberos-based authentication. CAS Centralized http://en.wikipedia.org/wiki/ 2004 Centralized nature.  Potentially unstable - 36 releases on Jasig CAS in the Authentication Central_Authentication_Service last 2 years (2/09 - 12/10) Service" GSSAPI Generic Security http://en.wikipedia.org/wiki/ 1993 An API API that is honored by other technologies.  Anticipating new Services Generic_Security_Services_Applicati security mechanisms, the GSSAPI includes a negotiating pseudo on_Program_Interface mechanism, SPNEGO, that can discover and use new mechanisms not present when the original application was built. HTTP Auth HTTP http://en.wikipedia.org/wiki/ 1996 Basic access authentication is a method designed to allow a web browser, Authentication HTTP_authentication or other client program, to provide credentials – in the form of a user name and password – when making a request.  Open, but most browsers support via pop-up.
  • 31. HTTPS HTTP Secure http://en.wikipedia.org/wiki/Https 1994 A combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. JAAS Java Authentication http://en.wikipedia.org/wiki/ 2001 JAAS defines a framework for subject-based authentication and and Authorization Java_Authentication_and_Authorizatio authorization in a pluggable manner, decoupling applications from underlying Service n_Service security implementations.  Java specific. Kerberos Kerberos http://en.wikipedia.org/wiki/Kerberos_ 1980's Created by MIT.  Key aim is for trusted computers on an untrusted network.  %28protocol%29 Both User and Server identity are handled. Centralized nature.
  • 32. LDAP Lightweight http://en.wikipedia.org/wiki/Ldap 1980's Flexible data store.  Originally an alternate protocol to access X.500 directory Directory Access services. This is a heavyweight with a complex data structure. Protocol NTLM NT Lan Manager http://en.wikipedia.org/wiki/NTLM 1980's Microsoft specific, weak encryption.  While Kerberos has replaced NTLM as the default authentication protocol in an Active Directory based single sign-on scheme, NTLM is still widely used in situations where a domain controller is not available or is unreachable. OAuth Open Authorization http://en.wikipedia.org/wiki/Oauth 2006 OAuth lets you authorize one website – the consumer – to access your data from another website – the provider.  Open standard for authorization. It allows users to share their private resources (e.g. photos, videos, contact lists) stored on one site with another site without having to hand out their credentials, typically username and password.  Worth watching as major players are investing in this, though there is some controversy to be explored.  On April 23, 2009, a security flaw in the 1.0 protocol was announced.  Facebook's new Graph API only supports OAuth 2.0.  Oauth 2.0 is currently not final.
  • 33. OpenID OpenID http://en.wikipedia.org/wiki/Openid 2005 Open Id gives you one login for multiple sites.  An open standard that describes how users can be authenticated in a decentralized manner, obviating the need for services to provide their own ad hoc systems and allowing users to consolidate their digital identities.  Providers include AOL, BBC,Facebook, Google,IBM, MySpace, Orange, PayPal, VeriSign, LiveJournal, Yandex, Ustream and Yahoo!. PAM Pluggable http://en.wikipedia.org/wiki/ 1996 Fragmented, each implementation has gone in a different direction.  The Authentication Pluggable_Authentication_Modules XSSO standard differs from both the original RFC, and from the Linux and Modules Sun APIs — from most other implementations.   Despite PAM being part of the X/Open Single Sign-on (XSSO) standard, PAM on its own cannot implement Kerberos, the most common type of SSO used in Unix environments. SAML Security Assertion http://en.wikipedia.org/wiki/Saml 2002 SOAP-based standard for exchanging authentication and authorization data Markup Language between security domains. Bloated and is specified in terms of implementation details.
  • 34. SASL" Simple http://en.wikipedia.org/wiki/ 1997 A framework for authentication and data security in Internet protocols.  Authentication and Simple_Authentication_and_Security_L Provides a layer for authentication, on top of which an application protocol Security Layer ayer (e.g. XMPP) can operate.  XML-based standard for exchanging authentication and authorization data between security domains SPNEGO Simple and http://en.wikipedia.org/wiki/SPNEGO 1996 SPNEGO's most visible use is in Microsoft's "HTTP Negotiate" authentication Protected GSSAPI extension. It was first implemented in Internet Explorer 5.01 and IIS 5.0 and Negotiation provided single sign-on capability later marketed as Integrated Windows Mechanism Authentication. The negotiable sub-mechanisms included NTLM and Kerberos, both used in Active Directory. Spring FKA Acegi http://en.wikipedia.org/wiki/ 2004 (Originally released as Acegi) Client oriented framework supporting most Spring_Security protocols listed here, extensible to support any desired provider.  Open, but specific to Java. SSPI Security Support http://en.wikipedia.org/wiki/SSPI 1995 An API API mechanism.  Used to dynamically support access to various Provider Interface implementations.  SSPI is a proprietary variant of GSSAPI with extensions and very Windows-specific data types.

Editor's Notes