SlideShare a Scribd company logo
1 of 83
OpenID Tutorial.
      Naofumi HAIDA
  from Cirius Technologies.
Table of Contents.

• Self-Introduction.
• What is OpenID?
• OpenID 2.0 quick look.
• Security Issues.
• Other related OpenAPIs.
Self-introduction.
• Working @Cirius Technologies, Inc.
• Architect @Cirius Lab.
• Ruby Programmer.
• GeoAPIs, Twitwi Twitter, Twittalk etc...
•   OpenAPIS & Beyond           LT

    •   http://docs.google.com/Presentation?
        id=dgp485h4_561dwgpsrcd
Questions.

• OpenID                 ?

• RP        OpenID           ?

• OpenID 2.0         ?

• XRI                ?
Authentication (       )
                   ID


Authorization (    )
            ID
Backgrounds.
•   Internet Identity Workshop        Six Apart   Brad
    Fitzpatrick     OpenID       (2005.10)


•                         Web           OpenID
              (2007.02)


•   Blogger       OpenID
    (2007.11)

•   OpenID Authentication 2.0 & OpenID Attribute Exchange
    1.0         (2007.12)
•   Blogger      OpenID IdP                     (2008.01)


•   Yahoo       OpenID 2.0      IdP            (2008.01)


•   OpenID Foundation         Google IBM MS Yahoo!
       (2008.02)


•   Six Apart        Verisign NRI     OpenID Japan Foundation
                    (2008.02)
Many Internet users are “End
  User” of OpenID Now!
~ 360 million OpenIDs.
Total Relying Parties




      Borrowed from David Recordon
There are over 11,000
OpenID enable sites!
What’s for OpenID?
We use more and more
        sites!
OpenID solves...
Too many passwords!
My Online Profile
scattered across many
        sites!
What is an OpenID??
http://www.hatena.ne.jp/haida/
http://profile.livedoor.com/haida
http://haida.livejurnal.com/
Is an OpenID a URI?
   It has changed in OpenID ver 2.0.
yahoo.com
coderepos.org
xri://=haida
OpenID:
Identity URI        Web
                Authority


     http://www.slideshare.net/zigorou/
     openid-20-quick-note/
These are not OpenID.
Authorization       Authentication Delegation
Privacy    Identity Maneger
Trust     Control
Single-Sign-On      Distributed SSO
Login with OpenID.
Input Claimed Identifier @ RP.
Authenticate @ OP.
Merits & Demerits of OpenID.
End User


 URI
Relying Party



  -


  - Sun     OpenID   Sun
      Sun
2. OpenID 2.0 Quick look.
User-Supplied Identifier
URL   ID

ID
https://me.yahoo.co.jp/a/
X4F0sewBfO6V5S31BLZsyz4BnEx0#
fdf84

  yahoo.com
XRI
Identity    URI
      XRI
xri://=haida
xri
xri         ID   i-name
=
@
xri://@yahoo
※ XRI
    xri://=haida 12 $/year
    xri://@mixi 55 $/year
Terms around OpenID.
identifier

http, https           URI
                URI
2.0           URI
XRI
OpenID Provider: OP


Ver 1.1   IdP
OpenID
OP Identifier



OP       Identifier
Relying Party: RP

Consumer
OpenID Identifier
OP                 Web
Web
Claimed Identifier


                    URI
              OP
User-Supplied Identifier

RP
Claimed Identifier
         OP
         Identifier
OP-Local Identifier

OP
Identifier
             OP      Identifier
How does authentication work
      with OpenID ?
1. RP     Claimed Identifier   HTML
2. openid.server              link
3. RP
4.                 OP
5. OP                    RP
6. RP
How does this work?
Discovery with XRDS.
OP           delegate   Identifier
OpenID 1.1
HTML

OpenID 2.0
XRDS         XML
Claimed Identifier XRI
 -                          XRDS

Claimed Identifier URL
     - HTML                           x-xrds-location
                      URL
     - meta           http-equiv       x-xrds-location
                                   URL
     - Content-type      application/xrds+xml
                      XRDS
<?xml version=quot;1.0quot; encoding=quot;UTF-8quot;?>
<xrds:XRDS
  xmlns:xrds=quot;xri://$xrdsquot;
  xmlns:openid=quot;http://openid.net/xmlns/1.0quot;
  xmlns=quot;xri://$xrd*($v*2.0)quot;>
 <XRD>
  <Service priority=quot;0quot;>
    <Type>http://specs.openid.net/auth/2.0/server</Type>
    <URI>http://openid.example.com/auth</URI>
  </Service>
 </XRD>
</xrds:XRDS>
Service

    Type
Security Risks.
Phishing.
1. Malicious Consumer      OpenID


 2.         Identifier URI
 3. Malicious Consumer                  OP
OP
 4.       OP     OP      ID, Password
 5.
 6.       OP
Firefox     OpenID SeatBelt (by VeriSign)
--        OpenID
-- Malicious Consumer



Malicious Consumer         OP
-- OP
OP                       nonce



trust_root, return_to
return_to          malicious consumer



OP    robots.txt    OpenID
     “Identity Page forquot; site:*.myopenid.com”



OP
RP for Mobile   OP   RP for Mobile
         OpenID                  ?
orz..
OpenID Security      !
http://wiki.openid.net/Security
Reputation Problem
   OP
OP                  RP
AOL                           OP
http://dev.aol.com/node/578
OP


https




Attribute Exchange
Provider Authentication Policy Extension
OP   Reputation   OP   !
Summary

• OpenID
• OpenID 2.0   User Friendly!

• IdP
Thank you!

More Related Content

What's hot

Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL CertificatesHashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Nick Maludy
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
Derek Perkins
 

What's hot (20)

Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL CertificatesHashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
 
The Client is not always right! How to secure OAuth authentication from your...
The Client is not always right!  How to secure OAuth authentication from your...The Client is not always right!  How to secure OAuth authentication from your...
The Client is not always right! How to secure OAuth authentication from your...
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
 
Secure Authorization for your Printer: The OAuth Device Flow (DevSum 2018)
Secure Authorization for your Printer: The OAuth Device Flow (DevSum 2018)Secure Authorization for your Printer: The OAuth Device Flow (DevSum 2018)
Secure Authorization for your Printer: The OAuth Device Flow (DevSum 2018)
 
LASCON 2017: SAML v. OpenID v. Oauth
LASCON 2017: SAML v. OpenID v. OauthLASCON 2017: SAML v. OpenID v. Oauth
LASCON 2017: SAML v. OpenID v. Oauth
 
OpenID Connect 1.0 Explained
OpenID Connect 1.0 ExplainedOpenID Connect 1.0 Explained
OpenID Connect 1.0 Explained
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and Practices
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
NIST SP 800-63C #idcon vol.22
NIST SP 800-63C #idcon vol.22NIST SP 800-63C #idcon vol.22
NIST SP 800-63C #idcon vol.22
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
 
Internet of Things Security & Privacy
Internet of Things Security & PrivacyInternet of Things Security & Privacy
Internet of Things Security & Privacy
 
The Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory ServicesThe Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory Services
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
Openid & Oauth: An Introduction
Openid & Oauth: An IntroductionOpenid & Oauth: An Introduction
Openid & Oauth: An Introduction
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David Chase
 
SAML and Liferay
SAML and LiferaySAML and Liferay
SAML and Liferay
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
The Hitchhiker's Guide to the Land of OAuth
The Hitchhiker's Guide to the Land of OAuthThe Hitchhiker's Guide to the Land of OAuth
The Hitchhiker's Guide to the Land of OAuth
 
muCon 2016: Authentication in Microservice Systems By David Borsos
muCon 2016: Authentication in Microservice Systems By David BorsosmuCon 2016: Authentication in Microservice Systems By David Borsos
muCon 2016: Authentication in Microservice Systems By David Borsos
 
ASP.NET 13 - Security
ASP.NET 13 - SecurityASP.NET 13 - Security
ASP.NET 13 - Security
 

Similar to OpenID Tutorials

Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Sylvain Maret
 
Enterprise Single Sign On
Enterprise Single Sign On Enterprise Single Sign On
Enterprise Single Sign On
WSO2
 
OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11
Nov Matake
 
OpenID in the Fedora Services
OpenID in the Fedora ServicesOpenID in the Fedora Services
OpenID in the Fedora Services
Patrick Uiterwijk
 

Similar to OpenID Tutorials (20)

Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
2010 - Fédération des identités et OpenID
2010 - Fédération des identités et OpenID2010 - Fédération des identités et OpenID
2010 - Fédération des identités et OpenID
 
Openid+Opensocial
Openid+OpensocialOpenid+Opensocial
Openid+Opensocial
 
Lecture 20101124
Lecture 20101124Lecture 20101124
Lecture 20101124
 
Implementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteImplementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking Site
 
Open Id
Open IdOpen Id
Open Id
 
OpenID and OAuth
OpenID and OAuthOpenID and OAuth
OpenID and OAuth
 
Digital Identity
Digital IdentityDigital Identity
Digital Identity
 
Enterprise Single Sign On
Enterprise Single Sign On Enterprise Single Sign On
Enterprise Single Sign On
 
OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11
 
Holt "Working with Scholarly APIs: A NISO Training Series, Session Two: ORCID"
Holt "Working with Scholarly APIs: A NISO Training Series, Session Two: ORCID"Holt "Working with Scholarly APIs: A NISO Training Series, Session Two: ORCID"
Holt "Working with Scholarly APIs: A NISO Training Series, Session Two: ORCID"
 
Understanding OpenID
Understanding OpenIDUnderstanding OpenID
Understanding OpenID
 
OpenID in the Fedora Services
OpenID in the Fedora ServicesOpenID in the Fedora Services
OpenID in the Fedora Services
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenID
 
Open Id
Open IdOpen Id
Open Id
 
Student Authentication
Student AuthenticationStudent Authentication
Student Authentication
 
OpenID - An in depth look at what it is, and how you can use it
OpenID - An in depth look at what it is, and how you can use itOpenID - An in depth look at what it is, and how you can use it
OpenID - An in depth look at what it is, and how you can use it
 
Securing your digital identity with drupal
Securing your digital identity with drupalSecuring your digital identity with drupal
Securing your digital identity with drupal
 
What is the ORCID API and what you can do with it? (R. Peters)
What is the ORCID API and what you can do with it? (R. Peters)What is the ORCID API and what you can do with it? (R. Peters)
What is the ORCID API and what you can do with it? (R. Peters)
 
Application Security in ASP.NET Core
Application Security in ASP.NET CoreApplication Security in ASP.NET Core
Application Security in ASP.NET Core
 

More from Nao Haida

プロダクトマネージャとセールスチームはどう連携すべきか 〜 失敗例と方針
プロダクトマネージャとセールスチームはどう連携すべきか 〜 失敗例と方針プロダクトマネージャとセールスチームはどう連携すべきか 〜 失敗例と方針
プロダクトマネージャとセールスチームはどう連携すべきか 〜 失敗例と方針
Nao Haida
 

More from Nao Haida (7)

プロダクトマネージャとセールスチームはどう連携すべきか 〜 失敗例と方針
プロダクトマネージャとセールスチームはどう連携すべきか 〜 失敗例と方針プロダクトマネージャとセールスチームはどう連携すべきか 〜 失敗例と方針
プロダクトマネージャとセールスチームはどう連携すべきか 〜 失敗例と方針
 
Jslunch6
Jslunch6Jslunch6
Jslunch6
 
Jslunch5
Jslunch5Jslunch5
Jslunch5
 
Jslunch4
Jslunch4Jslunch4
Jslunch4
 
Jslunch3
Jslunch3Jslunch3
Jslunch3
 
Jslunch2
Jslunch2Jslunch2
Jslunch2
 
Jslunch1
Jslunch1Jslunch1
Jslunch1
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 

OpenID Tutorials