TrueNTH OAuth Role Based Permission System Victor de Lima Soares

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

CACORE TOOLS FEATURES. caCORE SDK Features caCORE Workbench Plugin EA/ArgoUML Plug-in development Integrated support of semantic integration in the plugin.
1Proprietary and Confidential AirVantage API – Getting started David SCIAMMA – June 13th 2014.
Portal Technology Feasibility Study Kangaroo Software Jon Ferry Chris Helmeset Greg McGraw Jonathan Peffer.
REST support for B2B access to your AppServer PUG Challenge Americas Michael Jacobs : Senior Software Architect Edsel Garcia : Principal Software.
FIspace Security Components FIspace Security Components NetFutures 2015 FIspace project Javier Romero Negrín Javier Hitado Simarro ATOS Serdar Arslan KoçSistem.
Techpedia Platform Understanding and Platform Architecture Vision.
Peoplesoft: Building and Consuming Web Services
Authenticating REST/Mobile clients using LDAP and OERealm
SPC204 Security Problems in SharePoint 2010 Authentication and Authorization.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Survey of Identity Repository Security Models JSR 351, Sep 2012.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Xavier Lawrence March X. Lawrence - Synchronization of Calendars with a Calendar Server - 2 / 20 Presentation Overview Introduction Project Objectives.
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
FIspace SPT Seyhun Futaci. Technology behind FIspace Authentication and Authorization IDM service of Fispace provides SSO solution for web apps, mobile.
MMS DresdenGermany – Dresden - Slide N°1Adolf Liepelt Final Project Review Newcastle upon Tyne, April 19, 2004 AESOP Platform.
CAS Lightning Talk Jasig-Sakai 2012 Tuesday June 12th 2012 Atlanta, GA Andrew Petro - Unicon, Inc.
Openid Connect
Navigation Framework using CF Architecture for a Client-Server Application using the open standards of the web Kedar Desai presented by.
Observations from the OAuth Feature Survey Mike Jones March 14, 2013 IETF 86.
Deconstructing API Security
Copyright 2007 SpringSource. Copying, publishing or distributing without express written permission is prohibited. Spring MVC Essentials Getting started.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
The OWASP Foundation guarding your applications Koen Vanderloock
Securing Angular Apps Brian Noyes
ESG-CET Meeting, Boulder, CO, April 2008 Gateway Implementation 4/30/2008.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
8 Copyright © 2004, Oracle. All rights reserved. Making the Model Secure.
Session #2482 Implementing WebDAV Using J2EE TM and Open Source Technologies Juergen Pill Team Leader Software AG Remy Maucherat Software Engineer Sun.
Secure Mobile Development with NetIQ Access Manager
Overview of Basic 3D Experience (Enovia V6) Concepts
Azure Active Directory is becoming one of, if not the, primary user identity management services for cloud applications. One of Azure Active Directory's.
Portlet Development Konrad Rokicki (SAIC) Manav Kher (SemanticBits) Joshua Phillips (SemanticBits) Arch/VCDE F2F November 28, 2008.
UMA and OpenID Connect Plugins for Apache It would be so awesome if we (meaning the citizens of the Internet) had plugins for popular web servers to make.
Patricia App How to Get Started
J2EE Platform Overview (Application Architecture)
A National e-Authentication Service
Ask the Experts – Building Login-Based Sites in AEM
Facade Pattern Jim Fawcett CSE776 – Design Patterns Summer 2010
VistA on Douglas K. Martin, MD
AFM-CPS 2.1.
CollegeSource Security Application &
API (Application Program Interface)
Radius, LDAP, Radius used in Authenticating Users
Server Concepts Dr. Charles W. Kann.
All about social networking
VistA on Doug Martin, MD.
Unit 6-Chapter 2 Struts.
Facade Pattern Jim Fawcett CSE776 – Design Patterns Summer 2010
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
IOS SDK v1.0 with NAM 4.2.
NAAS 2.0 Features and Enhancements
EPIC INFOTECH CONSULTING GROUP
The Model Layer What is Model?
Ashish Pandit Louis Zelus
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Middleware, Services, etc.
Saravana Kumar CEO/Founder - Kovai Atomic Scope – Product Update.
SCORM Runtime Integration
AAA: A Survey and a Policy- Based Architecture and Framework
Building Serverless Enterprise Applications
CS5220 Advanced Topics in Web Programming Secure REST API
Python and REST Kevin Hibma.
JAAS AuthN Tokens in uPortal and Beyond
Envelope concept changes
Remedy Integration Strategy Leverage the power of the industry’s leading service management solution via open APIs February 2018.
Computer Network Information Center, Chinese Academy of Sciences
Una herramienta para la gestión de identidad, el control de acceso y uso compatible con la regulación de identidad europea eIDAS.
Veterans Health Administration
Presentation transcript:

TrueNTH OAuth Role Based Permission System Victor de Lima Soares TrueNTHConnect TrueNTH OAuth Role Based Permission System Victor de Lima Soares

TrueNTH “TrueNTH will provide personalised practical, information, support and programs that can address the individual needs of men and their families.” [2] understands that treatment alone is not enough Interventions CMS Research Social features, sharing 2

User experience platform TrueNTHConnect The conception a secure space were information can be constructed and shared to help Movember in improving patients’ life experience. User experience platform Unified look and feel Unified Session Management Sharing information CMS to User Experience SSO 3

TrueNTHConnect sub-projects

TrueNTHConnect phases Support library Management interfaces Standard evaluation Protocol review Protocol development Protocol development Support library Library selection Alternatives Management interfaces Standard evaluation CORS for authentication

TrueNTHConnect at a glance

Major components that trigger login actions, example Project scope Technology type and location Liferay Licence Project reuse 7

Session management protocol TrueNTHConnect Session management protocol

TrueNTHConnect TrueNTHConnect is a plug-in and hot pluggable project, which is responsible for turning Liferay into an OAuth client, following our protocol specifications to attain our target security services: identification, authentication and authorization.

OAuth Why? Challenge Central authority with many protected resources OAuth is a flexible authorization framework Widely deployed OAuth is not an authentication framework It does not provide build-in protocols Client logic is undefined

OAuth Presence !! Bearer token – no owner 11

SS OAuth Presence !! 12

SS OAuth for authentication Presence !! Compliance with Oauth and standards for Oauth over HTTP 13

SS OAuth for authentication Presence !! 14

SS OAuth for authentication Presence !! 15

SS OAuth for authentication Presence !! 16

Command receiver Receive orders Micro framework Struts entrance point Roles deletion Unilateral logout Information update Maintenance 17

Session manager Session search Spring – shared memory 18

Shared resource

Configuration portlet Security policies that are conseptionaly linked to SS Configuration 20

Configuration portlet Security policies that are conseptionaly linked to SS Controller 21

TrueNTHConnect User Roles

Liferay’s permission system

Role mapping Security policies that are conseptionaly linked to SS 24

Role mapping Security policies that are conseptionaly linked to SS 25

Role mapping Security policies that are conseptionaly linked to SS Configuration 26

Role mapping Security policies that are conseptionaly linked to SS Visualization 27

Role mapping Security policies that are conseptionaly linked to SS Adding new rules 28

Role mapping Security policies that are conseptionaly linked to SS Database 29

Role mapping Security policies that are conseptionaly linked to SS Portlet 30

Data driven services

Uniformity everywhere OAuth Library Uniformity everywhere

Login flow Multiple calls!! LR was building the HTTP requests, line by line Different URLs, parameters, signatures 33

Extractor API Demographics

Extractor API Roles

Library Uniform flow for requests Parameters and signatures build in the same way Safer options to communicate with SS RFCs’ use case isolated and tailored for SS Shared knowledge Knowledge of data model specifications Solid base: ScribeJava (version 1.3) Apache Commons Codec (version 1.10 or superior) JSON Processing (version 1.0.4 or superior) Java SE Library

Library Service

Questions?