SlideShare a Scribd company logo
Today, services like authorization and authentication are delivered via APIs: JSON /
REST HTTP “endpoints.” Some of the most popular authentication API’s on the Internet
are using different profiles of OAuth2. Because consolidation increases efficiency,
Google, Microsoft, Yahoo, and others came together to define one standard profile for
OAuth 2.0 authentication: OpenID Connect.
OpenID Connect documents a single profile of OAuth2 that can be used by any Internet
domain. One standard for domain authentication will simplify security for application
developers (web and mobile), make end users more secure, and enable easier integration
of mobile devices and cloud agents.
See Toshiba Cloud TV in Action.
Specifically, OpenID Connect defines several endpoints to enable domains to offer : (1)
user authentication; (2) client registration; (3) client authentication; (4) user claims; (5)
client claims; and (6) discovery. Industry analysts are predicting that sso service is on a
trajectory for significant adoption.
The standard should be finalized by the end of 2013. Nat Sakimura (NTT) , Vice-
Chairman of the OpenID Foundation, has said this about OpenID Connect: “we are
done apart from formalities.”
Learn more about OpenID Connect via slides from Microsoft’s Michael B. Jones.
The partnership with Toshiba has driven the implementation of a number of features to
the OX platform. For example, they wanted to build a highly available “cluster” of
authentication servers delivered across multiple geographic regions to ensure business
continuity. This would enable Toshiba engineers to take a server out for maintenance,
and just add it back later.
Toshiba has also been helpful with testing and benchmarking. OX has been in
production there since last year, so we have also been able to observe the behavior of the
platform over time, while handling significant load.
For reasons like these, Toshiba decided in 2012 to align with OpenID Connect. As Gluu’s
open source “OX” platform performed well in the identity provider saml (“OP”)
Internop, Toshiba decided it was preferable to use OX rather than write their own
implementation.
Gluu has also built features to enable Toshiba to use the central publication of multi-
party federation metadata to enable globally delivered websites to trust identity
providers in different regions (Japan, US, and Europe) without persisting any personally
identifiable data outside of the region. Although JSON multiparty federation metadata is
not currently a feature of OpenID Connect, Gluu has documented its implementation at
the OpenID Foundation in the Emerging Work Section.
Toshiba is keen to promote the OX open source platform within the Smart TV Alliance,
which is why they authorized the May 1, 2013 press release. Adoption of the OX open
source platform will help members of the Smart TV Alliance collaborate on the
development of an Internet scale, interoperable security infrastructure, a goal everyone
wants to achieve.
Gluu provides services to companies that want to use the OX platform: Design, Build,
Operate, and Transfer (DBOT). We were able to help Toshiba engineers jumpstart their
development effort and to provide some tactical feature enhancements in the open
source project to support their rollout.
Article resource:-https://sites.google.com/site/thegluuserver/how-why-gluu-s-open-
source-authorization-and-authentication-platform-was-chosen-by-toshiba-for-new-
cloud-tv

More Related Content

PDF
Borderless Federated-Identity
PPTX
User identification and single sign on in ASP.Net Core Applications
PDF
Juarez Barbosa Junior - Microsoft - OSL19
PPTX
ABC of IoT Consortiums
PDF
WoT.City and IoT Protocols Movement @ Taipei, Taiwan
PPTX
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
PDF
API Adoption API Conference Berlin - Hans Bot
PPTX
Fluence.sh
Borderless Federated-Identity
User identification and single sign on in ASP.Net Core Applications
Juarez Barbosa Junior - Microsoft - OSL19
ABC of IoT Consortiums
WoT.City and IoT Protocols Movement @ Taipei, Taiwan
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
API Adoption API Conference Berlin - Hans Bot
Fluence.sh

Viewers also liked (20)

PPTX
HannaKawasaki120430
PDF
سلسلة العربية بين يديك المطورة
PPT
194a
 
PPS
中國古塔之最 (Music)2011.
DOCX
Jesús brayan soscué yotengo
PPS
FRUTAS Y VERDURAS ?
PDF
Laporan ppdb 2014
PPT
148a
 
PDF
sensibilizacion
PPT
181a
 
PPT
La Edad Media
PPT
105a
 
PPT
123a
 
PDF
UCA UNIDAD 2
PPT
158
 
PPS
本年度最佳的 E mail (rev)
PDF
Rol domingo
DOC
LITERACIA E CAPACITAÇÃO
PPT
Inicie Su Negocio Online El Caso Del Turismo
PPT
165a
 
HannaKawasaki120430
سلسلة العربية بين يديك المطورة
194a
 
中國古塔之最 (Music)2011.
Jesús brayan soscué yotengo
FRUTAS Y VERDURAS ?
Laporan ppdb 2014
148a
 
sensibilizacion
181a
 
La Edad Media
105a
 
123a
 
UCA UNIDAD 2
158
 
本年度最佳的 E mail (rev)
Rol domingo
LITERACIA E CAPACITAÇÃO
Inicie Su Negocio Online El Caso Del Turismo
165a
 
Ad

Similar to How & why gluu’s open source authorization and authentication platform was chosen by toshiba for new cloud tv (20)

PDF
OpenID Connect "101" Introduction -- October 23, 2018
PDF
OpenID Connect Explained
PPTX
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Working Group U...
PPTX
Mit 2014 introduction to open id connect and o-auth 2
PDF
Launching a Successful and Secure API
PPT
OpenID Progress EEMA Conference
PDF
Open Standards in Identity Management
PDF
Open APIs - Risks and Rewards (Øredev 2013)
PDF
Secure your APIs using OAuth 2 and OpenID Connect
PDF
Neo-security Stack
PDF
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
PDF
Openid+Opensocial
PDF
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
PDF
OpenID Foundation/Open Banking Workshop - OpenID Foundation Overview
PPTX
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
PPTX
LASCON 2017: SAML v. OpenID v. Oauth
PDF
Open ID Explained
PDF
Introducing OpenID 1.0 Protocol: Security and Performance
PDF
JDD2015: Security in the era of modern applications and services - Bolesław D...
PDF
GHC18 Abstract - API Security, a Grail Quest
OpenID Connect "101" Introduction -- October 23, 2018
OpenID Connect Explained
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Working Group U...
Mit 2014 introduction to open id connect and o-auth 2
Launching a Successful and Secure API
OpenID Progress EEMA Conference
Open Standards in Identity Management
Open APIs - Risks and Rewards (Øredev 2013)
Secure your APIs using OAuth 2 and OpenID Connect
Neo-security Stack
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
Openid+Opensocial
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
OpenID Foundation/Open Banking Workshop - OpenID Foundation Overview
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
LASCON 2017: SAML v. OpenID v. Oauth
Open ID Explained
Introducing OpenID 1.0 Protocol: Security and Performance
JDD2015: Security in the era of modern applications and services - Bolesław D...
GHC18 Abstract - API Security, a Grail Quest
Ad

More from Gluu (20)

PPSX
Gluu server for educational institutions
PPTX
Pr from our recent nstic pilot award
PPTX
The currency of identifiers
PPTX
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
PPTX
Gluu sxsw 2015 interactive picks
PPTX
17 recommended requirements for an identity and access management poc
PPTX
Top 10 applications for multi factor authentication in higher education
PPTX
First o auth 2.0 and saml identity federation platform to be shown by gluu
PPTX
East hackathon api’s for art
PPTX
Gluu’s vision
PPTX
Gluu and canonical to demonstrate instant application security using ubuntu j...
PPTX
Currency of identifiers ii
PPTX
Shibboleth identity provider (idp) what it is, and why you should consider a ...
PPTX
Federated identity and open id connect why higher ed needs ox
PPTX
Web access management using o auth2 and saml – wam 2.0
PPTX
Packt publishing book proposal api and mobile access management
PPTX
Gluu oscon submission
PPTX
Go west young federation
PPTX
 Use case for asimba as saml proxy
PPTX
Postcard from identity next 2013
Gluu server for educational institutions
Pr from our recent nstic pilot award
The currency of identifiers
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu sxsw 2015 interactive picks
17 recommended requirements for an identity and access management poc
Top 10 applications for multi factor authentication in higher education
First o auth 2.0 and saml identity federation platform to be shown by gluu
East hackathon api’s for art
Gluu’s vision
Gluu and canonical to demonstrate instant application security using ubuntu j...
Currency of identifiers ii
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Federated identity and open id connect why higher ed needs ox
Web access management using o auth2 and saml – wam 2.0
Packt publishing book proposal api and mobile access management
Gluu oscon submission
Go west young federation
 Use case for asimba as saml proxy
Postcard from identity next 2013

How & why gluu’s open source authorization and authentication platform was chosen by toshiba for new cloud tv

  • 1. Today, services like authorization and authentication are delivered via APIs: JSON / REST HTTP “endpoints.” Some of the most popular authentication API’s on the Internet are using different profiles of OAuth2. Because consolidation increases efficiency, Google, Microsoft, Yahoo, and others came together to define one standard profile for OAuth 2.0 authentication: OpenID Connect. OpenID Connect documents a single profile of OAuth2 that can be used by any Internet domain. One standard for domain authentication will simplify security for application developers (web and mobile), make end users more secure, and enable easier integration of mobile devices and cloud agents. See Toshiba Cloud TV in Action. Specifically, OpenID Connect defines several endpoints to enable domains to offer : (1) user authentication; (2) client registration; (3) client authentication; (4) user claims; (5) client claims; and (6) discovery. Industry analysts are predicting that sso service is on a trajectory for significant adoption.
  • 2. The standard should be finalized by the end of 2013. Nat Sakimura (NTT) , Vice- Chairman of the OpenID Foundation, has said this about OpenID Connect: “we are done apart from formalities.” Learn more about OpenID Connect via slides from Microsoft’s Michael B. Jones. The partnership with Toshiba has driven the implementation of a number of features to the OX platform. For example, they wanted to build a highly available “cluster” of authentication servers delivered across multiple geographic regions to ensure business continuity. This would enable Toshiba engineers to take a server out for maintenance, and just add it back later. Toshiba has also been helpful with testing and benchmarking. OX has been in production there since last year, so we have also been able to observe the behavior of the platform over time, while handling significant load. For reasons like these, Toshiba decided in 2012 to align with OpenID Connect. As Gluu’s open source “OX” platform performed well in the identity provider saml (“OP”) Internop, Toshiba decided it was preferable to use OX rather than write their own implementation.
  • 3. Gluu has also built features to enable Toshiba to use the central publication of multi- party federation metadata to enable globally delivered websites to trust identity providers in different regions (Japan, US, and Europe) without persisting any personally identifiable data outside of the region. Although JSON multiparty federation metadata is not currently a feature of OpenID Connect, Gluu has documented its implementation at the OpenID Foundation in the Emerging Work Section. Toshiba is keen to promote the OX open source platform within the Smart TV Alliance, which is why they authorized the May 1, 2013 press release. Adoption of the OX open source platform will help members of the Smart TV Alliance collaborate on the development of an Internet scale, interoperable security infrastructure, a goal everyone wants to achieve. Gluu provides services to companies that want to use the OX platform: Design, Build, Operate, and Transfer (DBOT). We were able to help Toshiba engineers jumpstart their development effort and to provide some tactical feature enhancements in the open source project to support their rollout. Article resource:-https://sites.google.com/site/thegluuserver/how-why-gluu-s-open- source-authorization-and-authentication-platform-was-chosen-by-toshiba-for-new- cloud-tv