SlideShare a Scribd company logo
Copyright ©2012 Ping Identity Corporation. All rights reserved.1
Who’s Knocking?
Identity for APIs, Web and Mobile
Hans Zandbelt - @hanszandbelt
CTO Office - Ping Identity
Copyright ©2012 Ping Identity Corporation. All rights reserved.2
Overview
Cloud & APIs: The Trends
- History, state-of-the-art, trends
Identity and APIs
- What, why, how
Recommendations
- API strategy
1
2
4
OAuth 2.0
- Not for Authentication!
3
Copyright ©2012 Ping Identity Corporation. All rights reserved.3
CLOUD & APIS: THE TRENDS
[section lead-in]
Copyright ©2012 Ping Identity Corporation. All rights reserved.4
Cloud/Mobile Moves: 3 Dimensions of Change
• Users
– Workforce
– Customers/consu
mers
– Partners
– Social
• Devices
– Mobile/fixed
– Browser/app
– BYOD/E-owned
• Location
– Services
– Users
Users
Location(s)
Devices
Copyright ©2012 Ping Identity Corporation. All rights reserved.5
Traditional firewall and enterprise domain-based
security cannot deal with Cloud Apps and Mobile
devices and applications.
IDENTITY IS THE NEW PERIMETER
Consequences
FIREWALL
Copyright ©2012 Ping Identity Corporation. All rights reserved.6
How it could/should be: Cloud 2.0 (web or mobile)
firewall
APP
APP
database
directory
SaaS
SaaS
SaaS
database
Copyright ©2012 Ping Identity Corporation. All rights reserved.7
The API Economy Drivers
• SaaS
– API access to
data/services vs.
browser access
– Cloud, Mobile/Big
Data, BYOD
– Salesforce.com >
60%
• APIs of PaaS
offerings
– Expose own cloud
services
• Clear trend for APIs
towards REST
Copyright ©2012 Ping Identity Corporation. All rights reserved.8
IDENTITY & APIS
Copyright ©2012 Ping Identity Corporation. All rights reserved.9
The Internet Scale Identity Concept
• Identity Provider
– Authoritative
– Scale
– Manageability
• UNIFORM across
Web SSO & API
Access
• Security AND
Convenience
• How to extend
enterprise security
policies to the cloud:
a MUST have
verify
Copyright ©2012 Ping Identity Corporation. All rights reserved.10
Web SSO and API Access Playfield
User Provisioning
Web SSO API Access
Copyright ©2012 Ping Identity Corporation. All rights reserved.11
API Access
• HTTP
• SOAP
– WS-Security/WS-
Trust
• REST
– ?
• TOKEN
– Obtain
– Use
– Validate
• Passwords??
CLIENT
SERVICE
SOAP / REST
Token
Copyright ©2012 Ping Identity Corporation. All rights reserved.12
Password anti-pattern
• 3rd party client
store user
passwords
• Teaches users to
be indiscriminate
with passwords
• No multi-factor or
federated
authentication
• No granularity
• No differentiation
• No revocation
Copyright ©2012 Ping Identity Corporation. All rights reserved.13
Drivers
Lack
Of
Standards
Password
Anti
Pattern
Native
Mobile
Apps
REST
Cloud
APIs
Copyright ©2012 Ping Identity Corporation. All rights reserved.14
OAUTH 2.0
Copyright ©2012 Ping Identity Corporation. All rights reserved.15
OAuth 2.0
• Secure API
authorization
– simple & standard
– desktop, mobile web
• Auth & Authz for
RESTful APIs
• Delegated
authorization
– mitigates password
anti-pattern
• Issue tokens for
granular access
– Without divulging
your credentials
Copyright ©2012 Ping Identity Corporation. All rights reserved.16
OAuth 2.0 Terminology: Roles
• Authorization Server (AS)
A server capable of issuing
tokens, obtaining authorization,
and authenticating resource
owners.
• Resource Owner
An entity (usually an end-
user/person) capable of granting
access to a protected resource.
• Client
An application(!) obtaining
authorization and making
protected resource requests (on
behalf of the resource owner).
• Resource Server (RS)
The server hosting protected
resources.
verify
Copyright ©2012 Ping Identity Corporation. All rights reserved.17
A. Client sends Authorization Request
"GET /as/authorization.oauth2?client_id=TunesPartner-
OT&state=TunesPartner-
OT&response_type=code&scope=onetime-a HTTP/1.1” 302 0
B. Service Provider grants Authorization
https://www.tunespartner.com:9031/Partner/callback.jsp?state=
TunesPartner-
OT&code=IEM_peySP5KvIfVs8fT650FxbgXwjdqN8tHXdyh7
C. Client Request Access Token
POST https://idp.idtel.com:9031/as/token.oauth2
---PARAMETERS---
client_id: TunesPartner-OT&
grant_type: authorization_code&
Code: IEM_peySP5KvIfVs8fT650FxbgXwjdqN8tHXdyh7
D. Service Provider grants Access Token
This resulted in the following JSON response containing our
OAuth access_token:
{"token_type":"Bearer",
"expires_in":300,
"access_token":"ivBOdwGpGb3pY3gvPaK6D8W5Ldey”
}
Protocol Workflow
Copyright ©2012 Ping Identity Corporation. All rights reserved.18
OAuth 2.0 Benefits
• Security & Usability
– Bearer Tokens
• Revocation
• Granularity
• Use Cases*
• Passwords vs.
OAuth ===
creditcard vs.
checks
Scopes
Copyright ©2012 Ping Identity Corporation. All rights reserved.19
OAuth 2.0 is Not for Authentication !!
• Bearer token is about
delegated rights, not
about the user authn
• Bearer token has no
audience restriction
– can’t check if it was
really meant for you
– Not bound to the client
• No guarantee that the
user is present
– no “authn statement”
semantics
• Redirect is not
authenticated or
integrity protected in
any way
– bearer = bearer and
nothing more
validate
client rs + as
user agent
get a token redirect
T
T
user info
Copyright ©2012 Ping Identity Corporation. All rights reserved.20
OpenID Connect
• OAuth: general
mechanism to
authorize API access
• OpenID Connect:
profile for sharing
profile information
• Uses the authz code &
implicit grant types –
the pieces of OAuth
optimized for user-
consent scenarios
• Leverages the
authorization & token
endpoints & adds
identity-based params
to core OAuth
messages
Client
(RP)
User
Agent
AS/OP
Resource
Server
UserInfo
a
b
1
3
a
a
2
Copyright ©2012 Ping Identity Corporation. All rights reserved.21
SSO for Mobile Apps: Authorization Agent (AZA)
• Aggregate OAuth
flows and logins
• Bootstrap through
WebSSO with
OpenID Connect or
SAML
• Oauth-as-a-Service
+ SAML-as-a-
Service
OAUTH SSO
Copyright ©2012 Ping Identity Corporation. All rights reserved.22
RECOMMENDATIONS
[section lead-in]
Copyright ©2012 Ping Identity Corporation. All rights reserved.23
Something to think about: Cloud IAM strategy
• Multi-use case,
multi-device, multi-
channel, multi
protocol…
– Identity is the
connector
• Interoperability and
standards
• IAM not just an
internal technical
issue: also a
strategic business
enabler
• Architect for agility
Copyright ©2012 Ping Identity Corporation. All rights reserved.24
• Implement your API for:
– externalized authentication and authorization
– tokens instead of passwords
– consumer identity AND enterprise identity
• By leveraging identity we can:
– address API access (server2server, mobile) in the
same way as Web SSO
– reuse existing security and identity policies
– connect your existing identity store
• Possibly implement this in a single system(!)
– And be prepared for OAuth 2.0, OpenID Connect,
SCIM, SAML, …
Identity for APIs strategy
Copyright ©2012 Ping Identity Corporation. All rights reserved.25
COME AND SEE US!
Hans Zandbelt
Twitter: @hanszandbelt
www.pingidentity.com

More Related Content

PDF
Integrated social solutions, the power and pitfalls of mashups
PPTX
Criticality of identity
PDF
The “I” in API is for Identity (Nordic APIS April 2014)
PDF
Launching a Successful and Secure API
PDF
Introduction to The 6 Insights of API Practice (Bill Doerrfeld)
PPTX
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
PDF
Secure your APIs using OAuth 2 and OpenID Connect
PDF
Business Impact (Nordic APIS April 2014)
Integrated social solutions, the power and pitfalls of mashups
Criticality of identity
The “I” in API is for Identity (Nordic APIS April 2014)
Launching a Successful and Secure API
Introduction to The 6 Insights of API Practice (Bill Doerrfeld)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
Secure your APIs using OAuth 2 and OpenID Connect
Business Impact (Nordic APIS April 2014)

What's hot (20)

PDF
Interoperability in a B2B Word (NordicAPIS April 2014)
PPTX
Platform Security that will Last for Decades (Travis Spencer)
PPTX
OpenID Connect - a simple[sic] single sign-on & identity layer on top of OAut...
PDF
The end of polling : why and how to transform a REST API into a Data Streamin...
PDF
APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...
PDF
Open APIs - Risks and Rewards (Øredev 2013)
PPTX
Deep-Dive: API Security in the Digital Age
PPTX
apidays LIVE New York 2021 - Top 10 API security threats every API team shoul...
PPTX
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
PPTX
Bigger, Better Business With OAuth
PPTX
Platform for Secure Digital Business
PPTX
Manage Your Mesh
PDF
apidays LIVE London 2021 - Confessions of a Product Geek by Rosemary Missier,...
PDF
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
PPTX
The Business Value for Internal APIs in the Enterprise
PPTX
Enterprise API Adoption Patterns
PPTX
OAuth Assisted Token Flow for Single Page Applications
PDF
Enterprise Single Sign On
PDF
apidays LIVE London 2021 - Authorization is on the rise. by Damian Schenkelma...
PPTX
Powering Internal API Communities
Interoperability in a B2B Word (NordicAPIS April 2014)
Platform Security that will Last for Decades (Travis Spencer)
OpenID Connect - a simple[sic] single sign-on & identity layer on top of OAut...
The end of polling : why and how to transform a REST API into a Data Streamin...
APIs: What’s in it for me – How can APIs bring value to our Business (Philipp...
Open APIs - Risks and Rewards (Øredev 2013)
Deep-Dive: API Security in the Digital Age
apidays LIVE New York 2021 - Top 10 API security threats every API team shoul...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Bigger, Better Business With OAuth
Platform for Secure Digital Business
Manage Your Mesh
apidays LIVE London 2021 - Confessions of a Product Geek by Rosemary Missier,...
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
The Business Value for Internal APIs in the Enterprise
Enterprise API Adoption Patterns
OAuth Assisted Token Flow for Single Page Applications
Enterprise Single Sign On
apidays LIVE London 2021 - Authorization is on the rise. by Damian Schenkelma...
Powering Internal API Communities
Ad

Viewers also liked (20)

PDF
Nordic APIs - Building a Secure API
POTX
Tao of security science
PDF
02-11-05
PDF
Acerca de la sostenibilidad del programa PYME MIDAS y sus aprendizajes para e...
DOCX
Team 8 Business Plan
DOCX
Revista clara valdes
PPT
Qualità nutrizionale dell'oliva tenera ascolana
PPTX
S6 Margriet Heijdemann - The emotional needs of children - 1 july 2014
PPTX
Caso isil
PPT
cultura
PDF
Presentacion Intersun Projects Ref2010 2011rev2
PDF
Mixing+messages
PDF
Buscando en la web
PDF
Catalogue formations-septadec-2012
PDF
Ecología de especies menos conocidas ojoso colorado
PDF
Catálogo Maletas Gladiator 2016/17
PPS
Icp - Infraestructura Culturales y Publicitarias
 
PDF
Social Collaboration: "Stell dir vor, es wird digital und keiner macht mit"
PPT
Marketing online Per Le Pmi
PPTX
Automating Your Transactions on the Ariba Network
Nordic APIs - Building a Secure API
Tao of security science
02-11-05
Acerca de la sostenibilidad del programa PYME MIDAS y sus aprendizajes para e...
Team 8 Business Plan
Revista clara valdes
Qualità nutrizionale dell'oliva tenera ascolana
S6 Margriet Heijdemann - The emotional needs of children - 1 july 2014
Caso isil
cultura
Presentacion Intersun Projects Ref2010 2011rev2
Mixing+messages
Buscando en la web
Catalogue formations-septadec-2012
Ecología de especies menos conocidas ojoso colorado
Catálogo Maletas Gladiator 2016/17
Icp - Infraestructura Culturales y Publicitarias
 
Social Collaboration: "Stell dir vor, es wird digital und keiner macht mit"
Marketing online Per Le Pmi
Automating Your Transactions on the Ariba Network
Ad

Similar to Who’s Knocking? Identity for APIs, Web and Mobile (20)

PDF
CIS13: Introduction to OAuth 2.0
PPTX
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
PDF
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
PDF
Openstack identity protocols unconference
PDF
[WSO2Con USA 2018] Identity APIs is the New Black
PPTX
The New Venn of Access Control in the API-Mobile-IOT Era
PDF
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
PDF
The Case For Next Generation IAM
PDF
InterCon 2016 - Segurança de identidade digital levando em consideração uma a...
PDF
iMasters Intercon 2016 - Identity within Microservices
PDF
1400 ping madsen-nordicapis-connect-01
PDF
Access Management for Cloud and Mobile
PDF
CIS14: Working with OAuth and OpenID Connect
PPTX
Identity Management: Using OIDC to Empower the Next-Generation Apps
PPTX
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
PDF
OAuth in the Real World featuring Webshell
PDF
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
PPTX
Catalyst 2015: Patrick Harding
PDF
When and Why Would I use Oauth2?
PPTX
A recipe for standards-based Cloud IdM
CIS13: Introduction to OAuth 2.0
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
Openstack identity protocols unconference
[WSO2Con USA 2018] Identity APIs is the New Black
The New Venn of Access Control in the API-Mobile-IOT Era
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
The Case For Next Generation IAM
InterCon 2016 - Segurança de identidade digital levando em consideração uma a...
iMasters Intercon 2016 - Identity within Microservices
1400 ping madsen-nordicapis-connect-01
Access Management for Cloud and Mobile
CIS14: Working with OAuth and OpenID Connect
Identity Management: Using OIDC to Empower the Next-Generation Apps
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth in the Real World featuring Webshell
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Catalyst 2015: Patrick Harding
When and Why Would I use Oauth2?
A recipe for standards-based Cloud IdM

More from Nordic APIs (20)

PPTX
How to Choose the Right API Platform - We Have the Tool You Need! - Mikkel Iv...
PPTX
Bulletproof Backend Architecture: Building Adaptive Services with Self-Descri...
PDF
Implementing Zero Trust Security in API Gateway with Cilium - Pubudu Gunatila...
PPTX
Event-Driven Architecture the Cloud-Native Way - Manuel Ottlik, HDI Global SE
PPTX
Navigating the Post-OpenAPI Era with Innovative API Design Frameworks - Danie...
PDF
Using Typespec for Open Finance Standards - Chris Wood, Ozone API
PPTX
Schema-first API Design Using Typespec - Cailin Smith, Microsoft
PPTX
Avoiding APIpocalypse; API Resiliency Testing FTW! - Naresh Jain, Xnsio
PPTX
How to Build an Integration Platform with Open Source - Magnus Hedner, Benify
PPTX
API Design First in Practise – An Experience Report - Hari Krishnan, Specmatic
PPTX
The Right Kind of API – How To Choose Appropriate API Protocols and Data Form...
PPTX
Why Frequent API Hackathons Are Key to Product Market Feedback and Go-to-Mark...
PPTX
Maximizing API Management Efficiency: The Power of Shifting Down with APIOps ...
PPTX
APIs Vs Events - Bala Bairapaka, Sandvik AB
PPTX
GraphQL in the Post-Hype Era - Daniel Hervas, Reckon Digital
PPTX
From Good API Design to Secure Design - Axel Grosse, 42Crunch
PPTX
API Revolution in IoT: How Platform Engineering Streamlines API Development -...
PPTX
Unlocking the ROI of API Platforms: What Success Actually Looks Like - Budhad...
PDF
Increase Your Productivity with No-Code GraphQL Mocking - Hugo Guerrero, Red Hat
PPTX
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Theodo ...
How to Choose the Right API Platform - We Have the Tool You Need! - Mikkel Iv...
Bulletproof Backend Architecture: Building Adaptive Services with Self-Descri...
Implementing Zero Trust Security in API Gateway with Cilium - Pubudu Gunatila...
Event-Driven Architecture the Cloud-Native Way - Manuel Ottlik, HDI Global SE
Navigating the Post-OpenAPI Era with Innovative API Design Frameworks - Danie...
Using Typespec for Open Finance Standards - Chris Wood, Ozone API
Schema-first API Design Using Typespec - Cailin Smith, Microsoft
Avoiding APIpocalypse; API Resiliency Testing FTW! - Naresh Jain, Xnsio
How to Build an Integration Platform with Open Source - Magnus Hedner, Benify
API Design First in Practise – An Experience Report - Hari Krishnan, Specmatic
The Right Kind of API – How To Choose Appropriate API Protocols and Data Form...
Why Frequent API Hackathons Are Key to Product Market Feedback and Go-to-Mark...
Maximizing API Management Efficiency: The Power of Shifting Down with APIOps ...
APIs Vs Events - Bala Bairapaka, Sandvik AB
GraphQL in the Post-Hype Era - Daniel Hervas, Reckon Digital
From Good API Design to Secure Design - Axel Grosse, 42Crunch
API Revolution in IoT: How Platform Engineering Streamlines API Development -...
Unlocking the ROI of API Platforms: What Success Actually Looks Like - Budhad...
Increase Your Productivity with No-Code GraphQL Mocking - Hugo Guerrero, Red Hat
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Theodo ...

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Encapsulation theory and applications.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Encapsulation theory and applications.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI Monthly Chronicles - July 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Who’s Knocking? Identity for APIs, Web and Mobile

  • 1. Copyright ©2012 Ping Identity Corporation. All rights reserved.1 Who’s Knocking? Identity for APIs, Web and Mobile Hans Zandbelt - @hanszandbelt CTO Office - Ping Identity
  • 2. Copyright ©2012 Ping Identity Corporation. All rights reserved.2 Overview Cloud & APIs: The Trends - History, state-of-the-art, trends Identity and APIs - What, why, how Recommendations - API strategy 1 2 4 OAuth 2.0 - Not for Authentication! 3
  • 3. Copyright ©2012 Ping Identity Corporation. All rights reserved.3 CLOUD & APIS: THE TRENDS [section lead-in]
  • 4. Copyright ©2012 Ping Identity Corporation. All rights reserved.4 Cloud/Mobile Moves: 3 Dimensions of Change • Users – Workforce – Customers/consu mers – Partners – Social • Devices – Mobile/fixed – Browser/app – BYOD/E-owned • Location – Services – Users Users Location(s) Devices
  • 5. Copyright ©2012 Ping Identity Corporation. All rights reserved.5 Traditional firewall and enterprise domain-based security cannot deal with Cloud Apps and Mobile devices and applications. IDENTITY IS THE NEW PERIMETER Consequences FIREWALL
  • 6. Copyright ©2012 Ping Identity Corporation. All rights reserved.6 How it could/should be: Cloud 2.0 (web or mobile) firewall APP APP database directory SaaS SaaS SaaS database
  • 7. Copyright ©2012 Ping Identity Corporation. All rights reserved.7 The API Economy Drivers • SaaS – API access to data/services vs. browser access – Cloud, Mobile/Big Data, BYOD – Salesforce.com > 60% • APIs of PaaS offerings – Expose own cloud services • Clear trend for APIs towards REST
  • 8. Copyright ©2012 Ping Identity Corporation. All rights reserved.8 IDENTITY & APIS
  • 9. Copyright ©2012 Ping Identity Corporation. All rights reserved.9 The Internet Scale Identity Concept • Identity Provider – Authoritative – Scale – Manageability • UNIFORM across Web SSO & API Access • Security AND Convenience • How to extend enterprise security policies to the cloud: a MUST have verify
  • 10. Copyright ©2012 Ping Identity Corporation. All rights reserved.10 Web SSO and API Access Playfield User Provisioning Web SSO API Access
  • 11. Copyright ©2012 Ping Identity Corporation. All rights reserved.11 API Access • HTTP • SOAP – WS-Security/WS- Trust • REST – ? • TOKEN – Obtain – Use – Validate • Passwords?? CLIENT SERVICE SOAP / REST Token
  • 12. Copyright ©2012 Ping Identity Corporation. All rights reserved.12 Password anti-pattern • 3rd party client store user passwords • Teaches users to be indiscriminate with passwords • No multi-factor or federated authentication • No granularity • No differentiation • No revocation
  • 13. Copyright ©2012 Ping Identity Corporation. All rights reserved.13 Drivers Lack Of Standards Password Anti Pattern Native Mobile Apps REST Cloud APIs
  • 14. Copyright ©2012 Ping Identity Corporation. All rights reserved.14 OAUTH 2.0
  • 15. Copyright ©2012 Ping Identity Corporation. All rights reserved.15 OAuth 2.0 • Secure API authorization – simple & standard – desktop, mobile web • Auth & Authz for RESTful APIs • Delegated authorization – mitigates password anti-pattern • Issue tokens for granular access – Without divulging your credentials
  • 16. Copyright ©2012 Ping Identity Corporation. All rights reserved.16 OAuth 2.0 Terminology: Roles • Authorization Server (AS) A server capable of issuing tokens, obtaining authorization, and authenticating resource owners. • Resource Owner An entity (usually an end- user/person) capable of granting access to a protected resource. • Client An application(!) obtaining authorization and making protected resource requests (on behalf of the resource owner). • Resource Server (RS) The server hosting protected resources. verify
  • 17. Copyright ©2012 Ping Identity Corporation. All rights reserved.17 A. Client sends Authorization Request "GET /as/authorization.oauth2?client_id=TunesPartner- OT&state=TunesPartner- OT&response_type=code&scope=onetime-a HTTP/1.1” 302 0 B. Service Provider grants Authorization https://www.tunespartner.com:9031/Partner/callback.jsp?state= TunesPartner- OT&code=IEM_peySP5KvIfVs8fT650FxbgXwjdqN8tHXdyh7 C. Client Request Access Token POST https://idp.idtel.com:9031/as/token.oauth2 ---PARAMETERS--- client_id: TunesPartner-OT& grant_type: authorization_code& Code: IEM_peySP5KvIfVs8fT650FxbgXwjdqN8tHXdyh7 D. Service Provider grants Access Token This resulted in the following JSON response containing our OAuth access_token: {"token_type":"Bearer", "expires_in":300, "access_token":"ivBOdwGpGb3pY3gvPaK6D8W5Ldey” } Protocol Workflow
  • 18. Copyright ©2012 Ping Identity Corporation. All rights reserved.18 OAuth 2.0 Benefits • Security & Usability – Bearer Tokens • Revocation • Granularity • Use Cases* • Passwords vs. OAuth === creditcard vs. checks Scopes
  • 19. Copyright ©2012 Ping Identity Corporation. All rights reserved.19 OAuth 2.0 is Not for Authentication !! • Bearer token is about delegated rights, not about the user authn • Bearer token has no audience restriction – can’t check if it was really meant for you – Not bound to the client • No guarantee that the user is present – no “authn statement” semantics • Redirect is not authenticated or integrity protected in any way – bearer = bearer and nothing more validate client rs + as user agent get a token redirect T T user info
  • 20. Copyright ©2012 Ping Identity Corporation. All rights reserved.20 OpenID Connect • OAuth: general mechanism to authorize API access • OpenID Connect: profile for sharing profile information • Uses the authz code & implicit grant types – the pieces of OAuth optimized for user- consent scenarios • Leverages the authorization & token endpoints & adds identity-based params to core OAuth messages Client (RP) User Agent AS/OP Resource Server UserInfo a b 1 3 a a 2
  • 21. Copyright ©2012 Ping Identity Corporation. All rights reserved.21 SSO for Mobile Apps: Authorization Agent (AZA) • Aggregate OAuth flows and logins • Bootstrap through WebSSO with OpenID Connect or SAML • Oauth-as-a-Service + SAML-as-a- Service OAUTH SSO
  • 22. Copyright ©2012 Ping Identity Corporation. All rights reserved.22 RECOMMENDATIONS [section lead-in]
  • 23. Copyright ©2012 Ping Identity Corporation. All rights reserved.23 Something to think about: Cloud IAM strategy • Multi-use case, multi-device, multi- channel, multi protocol… – Identity is the connector • Interoperability and standards • IAM not just an internal technical issue: also a strategic business enabler • Architect for agility
  • 24. Copyright ©2012 Ping Identity Corporation. All rights reserved.24 • Implement your API for: – externalized authentication and authorization – tokens instead of passwords – consumer identity AND enterprise identity • By leveraging identity we can: – address API access (server2server, mobile) in the same way as Web SSO – reuse existing security and identity policies – connect your existing identity store • Possibly implement this in a single system(!) – And be prepared for OAuth 2.0, OpenID Connect, SCIM, SAML, … Identity for APIs strategy
  • 25. Copyright ©2012 Ping Identity Corporation. All rights reserved.25 COME AND SEE US! Hans Zandbelt Twitter: @hanszandbelt www.pingidentity.com