Download presentation
Presentation is loading. Please wait.
Published byAmanda Ball Modified over 6 years ago
1
TrueNTH OAuth Role Based Permission System Victor de Lima Soares
TrueNTHConnect TrueNTH OAuth Role Based Permission System Victor de Lima Soares
2
TrueNTH “TrueNTH will provide personalised practical, information, support and programs that can address the individual needs of men and their families.” [2] understands that treatment alone is not enough Interventions CMS Research Social features, sharing 2
3
User experience platform
TrueNTHConnect The conception a secure space were information can be constructed and shared to help Movember in improving patients’ life experience. User experience platform Unified look and feel Unified Session Management Sharing information CMS to User Experience SSO 3
4
TrueNTHConnect sub-projects
5
TrueNTHConnect phases
Support library Management interfaces Standard evaluation Protocol review Protocol development Protocol development Support library Library selection Alternatives Management interfaces Standard evaluation CORS for authentication
6
TrueNTHConnect at a glance
7
Major components that trigger login actions, example
Project scope Technology type and location Liferay Licence Project reuse 7
8
Session management protocol
TrueNTHConnect Session management protocol
9
TrueNTHConnect TrueNTHConnect is a plug-in and hot pluggable project, which is responsible for turning Liferay into an OAuth client, following our protocol specifications to attain our target security services: identification, authentication and authorization.
10
OAuth Why? Challenge Central authority with many protected resources
OAuth is a flexible authorization framework Widely deployed OAuth is not an authentication framework It does not provide build-in protocols Client logic is undefined
11
OAuth Presence !! Bearer token – no owner 11
12
SS OAuth Presence !! 12
13
SS OAuth for authentication
Presence !! Compliance with Oauth and standards for Oauth over HTTP 13
14
SS OAuth for authentication
Presence !! 14
15
SS OAuth for authentication
Presence !! 15
16
SS OAuth for authentication
Presence !! 16
17
Command receiver Receive orders Micro framework
Struts entrance point Roles deletion Unilateral logout Information update Maintenance 17
18
Session manager Session search Spring – shared memory 18
19
Shared resource
20
Configuration portlet
Security policies that are conseptionaly linked to SS Configuration 20
21
Configuration portlet
Security policies that are conseptionaly linked to SS Controller 21
22
TrueNTHConnect User Roles
23
Liferay’s permission system
24
Role mapping Security policies that are conseptionaly linked to SS 24
25
Role mapping Security policies that are conseptionaly linked to SS 25
26
Role mapping Security policies that are conseptionaly linked to SS
Configuration 26
27
Role mapping Security policies that are conseptionaly linked to SS
Visualization 27
28
Role mapping Security policies that are conseptionaly linked to SS
Adding new rules 28
29
Role mapping Security policies that are conseptionaly linked to SS
Database 29
30
Role mapping Security policies that are conseptionaly linked to SS
Portlet 30
31
Data driven services
32
Uniformity everywhere
OAuth Library Uniformity everywhere
33
Login flow Multiple calls!!
LR was building the HTTP requests, line by line Different URLs, parameters, signatures 33
34
Extractor API Demographics
35
Extractor API Roles
36
Library Uniform flow for requests
Parameters and signatures build in the same way Safer options to communicate with SS RFCs’ use case isolated and tailored for SS Shared knowledge Knowledge of data model specifications Solid base: ScribeJava (version 1.3) Apache Commons Codec (version 1.10 or superior) JSON Processing (version or superior) Java SE Library
37
Library Service
38
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.