Social Network Intergration


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Social Network Intergration

  1. 1. Social Networking Integration to your products using Janrain
  2. 2. <ul><li>Introduction </li></ul><ul><li>Brushing up terms which we know </li></ul><ul><li>OAuth -An Introduction </li></ul><ul><li>Architecture </li></ul><ul><li>3 rd party – Janrain </li></ul><ul><li>Implementation with Demo </li></ul><ul><li>Happy Ending </li></ul>Agenda
  3. 3. <ul><li>What this ppt is all about? </li></ul><ul><li>Why we need Social Media? </li></ul><ul><li>What kind of products needs Social Integration? </li></ul><ul><ul><li>Content Sites </li></ul></ul><ul><ul><li>Community Sites </li></ul></ul><ul><ul><li>Commerce Sites </li></ul></ul><ul><ul><li>Media & Entertainment </li></ul></ul><ul><ul><li>Retail </li></ul></ul><ul><ul><li>Non-profit </li></ul></ul>Introduction
  4. 4. <ul><li>The User – Vital Part of products </li></ul><ul><li>Take aways: </li></ul><ul><ul><li>Keep it simple, don't hide it </li></ul></ul><ul><ul><li>Provide a choice in how a user registers </li></ul></ul><ul><ul><li>Make the most of user profile data </li></ul></ul><ul><li>The Ultimate Key is to use Social Media </li></ul>Introduction
  5. 5. <ul><li>Preferences and statistics </li></ul>Introduction
  6. 6. <ul><li>So Let's Start Achieving it. </li></ul>Lets Start Achieving it
  7. 7. Authentication <ul><li>Authentication is the act of confirming the truth of an attribute of a datum or entity. </li></ul><ul><li>Three factors of authentication </li></ul><ul><ul><li>ownership factors </li></ul></ul><ul><ul><li>knowledge factors </li></ul></ul><ul><ul><li>Inherence factors </li></ul></ul>
  8. 8. Authorization <ul><li>Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. </li></ul><ul><li>Two phases: </li></ul><ul><ul><li>Policy definition phase where access is authorized, and </li></ul></ul><ul><ul><li>Policy enforcement phase where access requests are approved or disapproved. </li></ul></ul>
  9. 9. OAuth <ul><li>OAuth is a authorization Protocol. </li></ul><ul><li>It enables users to provide 3 rd party access to their web resources without sharing their passwords. </li></ul><ul><li>OAuth is built on support of other protocols like cURL, SSL etc.. </li></ul><ul><li>Oauth is an extension in php. </li></ul><ul><li>Current version is 2.0 implemented throughout. </li></ul><ul><li>Google, Facebook, Twitter uses Oauth 2.0 for sharing their user resources. </li></ul>
  10. 10. <ul><li>OAuth depends on these terms, they deserve some explanation, </li></ul><ul><ul><li>Service Provider – the Service Provider controls all aspects of the OAuth implementation. The Service Provider is the term used to describe the website or web-service where the restricted resources are located. </li></ul></ul><ul><ul><li>User – the user is why OAuth exists and without users, there is no need for Oauth. </li></ul></ul><ul><ul><li>Consumer – this is a fancy name for an application trying to access the User’s resources. This can be a website, a desktop program, a mobile device, a set-top box, or anything else connected to the web. The Consumer is the one getting permission to access resources and the Consumer is where the useful part of OAuth happens. </li></ul></ul><ul><ul><li>Protected Resources - the ‘stuff’ OAuth protects and allow access to. </li></ul></ul><ul><ul><li>Tokens - are used instead of User credentials to access resources. A Token is generally a random string of letters and numbers (but not limited to) that is unique, hard to guess, and paired with a Secret to protect the Token from being abused. </li></ul></ul>Oauth Working
  11. 11. Oauth Working
  12. 12. Oauth Example
  13. 13. Oauth Example
  14. 14. Oauth Example
  15. 15. Oauth Example
  16. 16. Oauth Example
  17. 17. Oauth Example
  18. 18. Oauth Example
  19. 19. Oauth Example
  20. 20. Oauth Example
  21. 21. Yes Congrats !!! <ul><li>WOW !!! We learnt the basics, Now we start with the Idea </li></ul>
  22. 22. <ul><li>Our architecture can use Oauth's Authentication and authorization mechanism to handle users in our product. </li></ul><ul><li>Social Media can authenticate and provide resources of the user. </li></ul><ul><li>Our product can use those resources to make the user happy. </li></ul>Architecture
  23. 23. Architecture
  24. 24. <ul><li>Our architecture can use any service provider and create a user in our product. </li></ul><ul><li>Pull the user's data in to the registration so that we reduce pain of the user. </li></ul><ul><li>Either we so an auto registration or we can still provide the form to collect any extra data. </li></ul><ul><li>Add multiple service providers like Google, FB, Twitter </li></ul>Architecture- The Idea
  25. 25. <ul><li>Janrain is a 3 rd party organization which provide Saas. </li></ul><ul><li>Janrain does all your Oauh work for you for both free and payment. </li></ul><ul><li>Janrain allows you to customize service providers and configure them for your need.(Supports 18 providers) </li></ul><ul><li>Lot of plugins available by default. </li></ul>3 rd party Janrain
  26. 26. Demo with explanation <ul><li>Janrain User Login/Registration </li></ul>
  27. 27. Janrain Content Sharing <ul><li>Sharing Works in the same principle Oauth </li></ul><ul><li>the terms of Oauth are different, </li></ul><ul><ul><li>Service provider : Google, FB, Twitter. </li></ul></ul><ul><ul><li>Consumer : is the App which we create in their site </li></ul></ul><ul><ul><li>User : is normal user </li></ul></ul><ul><ul><li>The App uses the authorization provided by the user (I.e) by the Oauth's token to post things in your FB Wall. </li></ul></ul>
  28. 28. Demo Janrain Content Sharing <ul><li>Sharing Works in the same principle Oauth </li></ul><ul><li>Facebook App( Consumer ) gets the access token to post the content in the user's wall. </li></ul><ul><li>Wordpress Implementation </li></ul><ul><li>Drupal Implementation </li></ul><ul><li>Other sites </li></ul><ul><li>PHACT Implementations </li></ul>
  29. 29. Thank you! By, Dinesh Kumar