Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this


  1. 1. OAuth?<br />Oaths is an authorization standard for API’s that does away with logins and passwords to grant authorization to a third-party <br />
  2. 2. Why OAuth?<br />Every day a new websites are launched which tie services from different sites and offer you<br />
  3. 3. OAuth Definitions<br />Service provider<br /> The website or web-service where the restricted resources are located<br />User<br /> User have ‘stuff’ they don’t want to make pubic on the service provider but they do want to share it with another site<br />Consumer<br /> The name for the application trying access the users resources<br />Protected Resources<br /> The ‘stuff’ oauth protects and allow access.<br />Tokens<br /> Tokens are used instead of user credentials to access resources<br />
  4. 4. OAuth : Protocol Workflow<br />
  5. 5. Jane wants to share some of her vacation photos with her friends. Jane uses Faji, a photo sharing site, for sharing journey photos. She signs into her account, and uploads two photos which she marks private.<br /> Using OAuth terminology<br />Jane is the User <br />Faji is the Service Provider. <br /> The 2 photos Jane uploaded are the Protected Resources.<br /> OAuth Example<br />
  6. 6. Jane wants to share them with her grandmother. But grandma doesn’t have an internet connection so Jane plans to order prints and have them mailed to grandma. Being a responsible person, Jane uses Beppa, an environmentally friendly photo printing service.<br />Using OAuth terminology, <br />Beppais the Consumer. <br />Beppa must use OAuth to gain access to the photos in order to print them.<br />
  7. 7. When Beppa added support for Faji photo import, a Beppa developer known in OAuth as a Consumer Developer obtained a Consumer Key and Consumer Secret from Faji to be used with Faji’s OAuth-enabled API.<br />Using OAuth terminology, <br />Consumer Key <br />Consumer secret<br />
  8. 8. Beppa requests from Faji a Request Token. At this point, the Request Token is not User-specific, and can be used by Beppa to gain User approval from Jane to access her private photos.<br />Using OAuth terminology, <br />Request Token<br />
  9. 9. When Beppa receives the Request Token, it redirects Jane to the Faji OAuth User Authorization URL with the Request Token and asks Faji to redirect Jane back once approval has been granted to<br />Using OAuth terminology, <br />Oauth User Authorization URL<br />Call Back URL<br />
  10. 10. After successfully logging into Faji, Jane is asked to grant access to Beppa, the Consumer. Faji informs Jane of who is requesting access (in this case Beppa) and the type of access being granted. Jane can approve or deny access.<br />
  11. 11. Jane waits for Beppa to present her with her photos fetched from her Faji account.<br />
  12. 12. While Jane waits, Beppa uses the authorized Request Token and exchanges it for an Access Token. Request Tokens are only good for obtaining User approval, while Access Tokens are used to access Protected Resources, in this case Jane’s photos.<br />In the first request, Beppa exchanges the Request Token for an Access Token and in the second (can be multiple requests, one for a list of photos, and a few more to get each photo) request gets the photos.<br />Using OAuth terminology, <br />Access Token<br />
  13. 13. Jane is very impressed how Beppa grabbed her photos without asking for her username and password. She likes what she sees and place the print order.<br />
  14. 14.
  15. 15. Credentials and tokens<br />Oauth uses three types of credentials<br />Client credentilas(consumer key and secret)<br />Temporary credentials(request token and secret)<br />Token credentilas(access token and secret)<br />Client credentials<br />Allows server to authenticate server<br />Allows server to get information about the client<br />Token credentials<br />Token credentials are in place of username and password<br />The client uses token credentials to access resource owner procted resource<br />Token credentials are limited in scope and duration<br />Temporary credentials<br />Used to identify the authorization reuest<br />To accommodate different clients ikedesktop,mobileerc<br />Add extra flexibilyt and security<br />Tokens<br />