What is OAuth and Why?.

Slides:



Advertisements
Similar presentations
The How of OAuth OAuth Hackathon – Six Apart
Advertisements

Smartphone-based authorization system Advisor: Dr. Wenjun Zeng - Professor Presenter: Yilihamujiang, Ailiyasijiang Zhou, Guanlong Al-Sinani, H. S. (2011).
FI-WARE Testbed Access Control temporary solution.
OAuth 2.0 By “PJ” (JP on meetup.com) iOS and PHP developer, and occasional lawyer Contact me via:
TWEETSTER FOR OMEKA Kathleen Comeau. Tweetser: An Introduction  What is Tweetster?  Tweetster is a plugin for Omeka and WordPress websites that automatically.
FIspace Security Components FIspace Security Components NetFutures 2015 FIspace project Javier Romero Negrín Javier Hitado Simarro ATOS Serdar Arslan KoçSistem.
Workflow OpenID Scenario Users get OpenID from provider Andy is given access to service, and then to workflow server. Andy installs workflow Workflow gets.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 16 Prof. Crista Lopes.
Droid Twit Architecture By Rohit Ghatol. Screen Flow OAuth Tweet Settings Main Screen.
E-SAFETY QUIZ.
SPC204 Security Problems in SharePoint 2010 Authentication and Authorization.
Worksheet: Mapping your authorization and consent use cases to the UMA architecture 17 Aug 2014 Questions? Send mail to
OAuth option for mHealth Brief Profile Proposal for 2013/14 presented to the IT Infrastructure Planning Committee R Horn (Agfa Healthcare)
Using OpenID/OAuth to access Federated Data Services M. Benno Blumenthal IRI of Columbia University GO-ESSP May 2011.
SIP OAuth Rifaat Shekh-Yusef IETF 90, SIPCore WG, Toronto, Canada July 21,
Identity Assurance Services For Preventing Identity Theft Bob Pinheiro Robert Pinheiro Consulting LLC
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Windows Server Active Directory Intranet Managed Access Managed Identities Integrated Business Apps.
CLIENT FINANCIAL ADVISOR 3 rd Party A Year in the Life of a Client
S - Stay Safe don’t give out your personal information like your address or your house number and your location. Never give your personal information.
#MozCon Richard Baxter REALLY TARGETED OUTREACH. "Hey, we need to get some links!"
Comments on Procedures for RBAC (doc#0056) Group Name: WG4(SEC), WG2(ARC) and WG5(MAS) Source: Suresh Nair, Alcatel-Lucent,
242/102/49 0/51/59 181/172/166 Primary colors 248/152/29 PMS 172 PMS 137 PMS 546 PMS /206/ /227/ /129/123 Secondary colors 114/181/204.
Security Considerations
API Auth By Kyle Bradley. Role Definitions  User (Resource Owner)  The resource owner is the person who is giving access to some portion of their account.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
SAML Token Claims Based Identity SAML Token Claims Based Identity SPUser.
Today’s Applications Web API Browser Native app Web API Web API
05/03/2011Pomcor 1 Meeting the Privacy Goals of NSTIC in the Short Term Presentation at the 2011 Internet Identity Workshop Francisco Corella and Karen.
Methods of Tracking Position i Pod Touch – Wi-Fi used to find location by detecting known hotspots. iPhone – Cellular triangulation uses the mobile communication.
AZURE AD Haishi DX, Agenda Basic concepts Exercise 1: Creating a new Azure AD tenant and a new user Exercise 2: Enable web app Azure AD authentication.
SAML & OAuth V2 Nov 19/09. Goals Explore (useful) combinations of SAML & Oauth Builds on 2008 proposal from Ping ID for combining SAML SSO & Oauth authz.
Web Application Security + OAuth2 NWEN 304: Advanced Network Applications.
Making an invitation. What expressions can you think of for making invitations, accepting or refusing invitations?
Google Chromecast download Update Via Preview Program BE THE FIRST TO ACCESS THE NEW FEATURES.
Application Authentication using Azure AD
The following diagrams detail the interaction of AWS, Alexa, Fitbit apis, and the user #1 – User needs to link Fitbit account to skill #2 – User needs.
Ways to Leverage Social Networks Debbie Brown
Leveraging Social Collaboration in ITSM 8.0 and Custom Applications
WMarket For Developers API && Authorization.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Seeing the Doctor Section 3.
U-REPORT UK YOUR VOICE MATTERS
Why study the Bible?.
Social Networks Integration in Android
Addressing the Beast: Single Sign-On II
Panasonic UC Pro - Ver Rev1.0 7 Jun.,
Dominik Pinter, CMS.IO, Authentication Dominik Pinter,
IEEE WordPress Tutorial: Twitter
2012 סיכום מפגש 2 שלב המשכי תהליך חזוני-אסטרטגי של המועצה העליונה של הפיזיותרפיה בישראל.
IOS SDK v1.0 with NAM 4.2.
View and joining a challenge: mywellness.com/healthylee
Take the following practice quiz in the notes section of your composition book – DO NOT SHARE ANSWERS OR HELP EACH OTHER! WRITE THE QUESTION AND FILL IN.
Types of Maps.
Project Title (Team Name) UTSA CS X Spring 2018 Leader Name
Seeing the Doctor Section 3.
Level 4 questions Level 4 questions What is s/he going to say?
Agenda OAuth Concepts Programming OAuth.
The awesome Quiz for safety
SAP Authorization Management
3rd Party Integrations & ICON
Collaboration in Microsoft Teams
Top Ten Things You Know But Don’t Remember!.
Approvals Mobile User Interface WORK BETTER.
Cover Letter/Letter of Application
Key Academic Words If you know these words you will be able to respond to FRQ prompts more appropriately & earn more points.
Plenary
eCopy ShareScan Scan to OneDrive Chris Pearce-King
Module 5 Hello Digital Leaders!.
Presentation transcript:

What is OAuth and Why?

Twitter (or other service) App User

How OAuth Works

Request Token Access Token Used to authorize someone to Access your account Used to actually do stuff with Your account

Twitter (or other service) 3rd Party App (like an app you write) User

Twitter (or other service) User Installs App 3rd Party App (like an app you write) User

Twitter (or other service) 3rd Party App (like an app you write) App requests access to user’s Twitter User

Twitter (or other service) User Says “OK!” 3rd Party App (like an app you write) User

Twitter (or other service) App asks for request token 3rd Party App (like an app you write) User

Twitter (or other service) Twitter sends token 3rd Party App (like an app you write) User

Twitter (or other service) 3rd Party App (like an app you write) User App sends token to user to authorize

Twitter (or other service) User tells Twitter to authoirze token 3rd Party App (like an app you write) User

Twitter (or other service) Twitter sends user authorized token 3rd Party App (like an app you write) User

Twitter (or other service) 3rd Party App (like an app you write) User User sends authorized token to app

Twitter (or other service) 3rd Party App (like an app you write) User

Twitter (or other service) App sends request token and asks for authorization token 3rd Party App (like an app you write) User

Twitter (or other service) 3rd Party App (like an app you write) User

Twitter (or other service) 3rd Party App (like an app you write) User