SlideShare a Scribd company logo
© 2016 ForgeRock. All rights reserved.
Authorization
Using JWTs
Simon Moffatt
Principal Engineer @ ForgeRock
@SimonMoffatt
http://www.simonmoffatt.com
Blogger @ http://www.theidentitycookbook.com
© 2016 ForgeRock. All rights reserved.
Contents
Introduction to JWT
Claims in OIDC id_token
3rd
Party Authorization
Future Use Cases
© 2016 ForgeRock. All rights reserved.
Introduction to JWT – Part 1
l
Integrate – but with caution
l
Correlate to known data
“JSON Web Token (JWT) is a compact, URL-safe means of representing
claims to be transferred between two parties. The claims in a JWT
are encoded as a JSON object that is used as the payload of a JSON
Web Signature (JWS) structure or as the plaintext of a JSON Web
Encryption (JWE) structure, enabling the claims to be digitally
signed or integrity protected with a Message Authentication Code
(MAC) and/or encrypted.” - RFC7519 - https://tools.ietf.org/html/rfc7519

Self Contained

Signed and/or encrypted

JSON formatted

Lots of implementation libs

Lightweight
© 2016 ForgeRock. All rights reserved.
Introduction to JWT – Part 2
l
Integrate – but with caution
l
Correlate to known data
Header
Payload
Signature
© 2016 ForgeRock. All rights reserved.
Introduction to JWT – Part 2
l
Integrate – but with caution
l
Correlate to known data
Header
Payload
Signature
{
typ: "JWT",
alg: "HS256"
} {
"expiryTime":14688417398
58,"UserId":"smoff","AuthLe
vel":"0","Locale":"en_GB","
HostName":"127.0.0.1",
...}
fvD2FTo57RZp7MdoH
7vyVBmS_533TXriKNi
bawEf9SY
© 2016 ForgeRock. All rights reserved.
What’s the problem we are trying to solve?

“Stateful” - server side logic and
verification

Traditional authorization landscape

Scale limitations

Card is granted to individual

Association and verification completed

Card presented to shop to purchase

Shop communicates to issuer to verify
funds, association etc

Cash is initially granted to individual

Needs to be kept safe as no
secondary factor – bearer token!

Can be exchanged without going
back to bank – just verify the note
locally

“Stateless” - client side logic

Modern mesh based interactions

Offline verification

Scaleable
© 2016 ForgeRock. All rights reserved.
What’s the problem we are trying to solve?

“Stateful” - server side logic and
verification

Traditional authorization landscape

Scale limitations

Card is granted to individual

Association and verification completed

Card presented to shop to purchase

Shop communicates to issuer to verify
funds, association etc

Cash is initially granted to individual

Needs to be kept safe as no
secondary factor – bearer token!

Can be exchanged without going
back to bank – just verify the note
locally

“Stateless” - client side logic

Modern mesh based interactions

Offline verification

Scaleable
© 2016 ForgeRock. All rights reserved.
Example with OpenID Connect
Can be a JWT
Can also be a JWT...
Can overload
JWT in order to
negate steps 8 &
9...
© 2016 ForgeRock. All rights reserved.
Computery
Demo Stuff https://commons.wikimedia.org/wiki/File:IBM_Electronic_Data_Processing_Machine_-_GPN-2000-001881.jpg
Based on http://www.theidentitycookbook.com/2015/12/scripted-openid-connect-claims-and.html
© 2016 ForgeRock. All rights reserved.
Example with OpenID Connect - config
© 2016 ForgeRock. All rights reserved.
Example with OpenID Connect – getting the tokens
© 2016 ForgeRock. All rights reserved.
Example with OpenID Connect – id_token introspection
Extended
Profile scope
Profile scope
Email
scope
Entitlements scope
© 2016 ForgeRock. All rights reserved.
Example with 3rd
Party Authorization

Leverage a token generated by a 3rd party / separate operational domain

Have resources protected via centralised Policy Decision Point

Contact the Policy Decision Point before granting access

Just-in-Time authorization – don’t need up front user knowledge, just meta data
exchange
“Like posting a tweet using your Facebook account without
having a Twitter profile!”
© 2016 ForgeRock. All rights reserved.
Computery
Demo Stuff https://commons.wikimedia.org/wiki/File:IBM_Electronic_Data_Processing_Machine_-_GPN-2000-001881.jpg
Based on http://www.theidentitycookbook.com/2016/05/federated-authorization-using-3rd-party.html
© 2016 ForgeRock. All rights reserved.
Example with 3rd
Party Authorization - config
© 2016 ForgeRock. All rights reserved.
Example with 3rd
Party Authorization – get the JWT
Trust
Correct Use
User Meta Data
© 2016 ForgeRock. All rights reserved.
Example with 3rd
Party Authorization – response
Access Granted Invalid Signature /
Untrusted IDP
© 2016 ForgeRock. All rights reserved.
Future use cases...
The very immediate future will see
an increased number of devices,
API’s, services and interactions
that will need authX functions
applying to them
API
Device
User
© 2016 ForgeRock. All rights reserved.
Future use cases...
UC#1 – Hyper scale authorization for millions of users requesting authX
from any autonomous identity service
UC#2 – A protected application or service wants to allow access to a user or
other service, but is often “offline” and can’t communicate to central PDP
UC#3 – A pin & paired internet connected washing machine wants to
communicate to a smart metre, which in turn wants to communicate with the
water boiler – all from different operational domains and highly federated
© 2016 ForgeRock. All rights reserved.
Thank You

More Related Content

What's hot

7 major problems in blockchain
7 major problems in blockchain7 major problems in blockchain
7 major problems in blockchain
Celine George
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain
101 Blockchains
 
Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)
Trevor Owens
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences
101 Blockchains
 
Introduction To Solidity
Introduction To SolidityIntroduction To Solidity
Introduction To Solidity
101 Blockchains
 
The taxonomy of blockchain and cryptocurrency
The taxonomy of blockchain and cryptocurrencyThe taxonomy of blockchain and cryptocurrency
The taxonomy of blockchain and cryptocurrency
Blockchain and CryptoAsset (K) Ltd.
 
Why is it critical for your enterprise to understand Blockchain technology an...
Why is it critical for your enterprise to understand Blockchain technology an...Why is it critical for your enterprise to understand Blockchain technology an...
Why is it critical for your enterprise to understand Blockchain technology an...
ISHIR
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
Zied GUESMI
 
Top 5 DeFi Applications
Top 5 DeFi ApplicationsTop 5 DeFi Applications
Top 5 DeFi Applications
101 Blockchains
 
How To Become A Blockchain Engineer
How To Become A Blockchain EngineerHow To Become A Blockchain Engineer
How To Become A Blockchain Engineer
101 Blockchains
 
Blockchain & Insurance
Blockchain & InsuranceBlockchain & Insurance
Blockchain & Insurance
Ankur Nandwani
 
Impact on the financial sector of blockchain technology
Impact on the financial sector of blockchain technologyImpact on the financial sector of blockchain technology
Impact on the financial sector of blockchain technology
Blockchain Council
 
What is Blockchain Technology?
What is Blockchain Technology?What is Blockchain Technology?
What is Blockchain Technology?
Pragmatic Coders
 
Seratio whitepaper educational passport distributed learning ledger (30 april...
Seratio whitepaper educational passport distributed learning ledger (30 april...Seratio whitepaper educational passport distributed learning ledger (30 april...
Seratio whitepaper educational passport distributed learning ledger (30 april...
Sajin Abdu
 
5 ways
5 ways5 ways
5 ways
OliviaJune1
 
Blockchain Technology And Cryptocurrency
Blockchain Technology And CryptocurrencyBlockchain Technology And Cryptocurrency
Blockchain Technology And Cryptocurrency
Eno Bassey
 
An Overview of Stablecoin
An Overview of StablecoinAn Overview of Stablecoin
An Overview of Stablecoin
101 Blockchains
 
Donn felker etehreum
Donn felker etehreumDonn felker etehreum
Donn felker etehreum
IT Strategy Group
 
How the hospitality industry take the benefits of blockchain technology
How the hospitality industry take the benefits of blockchain technology How the hospitality industry take the benefits of blockchain technology
How the hospitality industry take the benefits of blockchain technology
Blockchain Council
 
Top 10 reasons to get a blockchain expert certification
Top 10 reasons to get a blockchain expert certificationTop 10 reasons to get a blockchain expert certification
Top 10 reasons to get a blockchain expert certification
Blockchain Council
 

What's hot (20)

7 major problems in blockchain
7 major problems in blockchain7 major problems in blockchain
7 major problems in blockchain
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain
 
Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences
 
Introduction To Solidity
Introduction To SolidityIntroduction To Solidity
Introduction To Solidity
 
The taxonomy of blockchain and cryptocurrency
The taxonomy of blockchain and cryptocurrencyThe taxonomy of blockchain and cryptocurrency
The taxonomy of blockchain and cryptocurrency
 
Why is it critical for your enterprise to understand Blockchain technology an...
Why is it critical for your enterprise to understand Blockchain technology an...Why is it critical for your enterprise to understand Blockchain technology an...
Why is it critical for your enterprise to understand Blockchain technology an...
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Top 5 DeFi Applications
Top 5 DeFi ApplicationsTop 5 DeFi Applications
Top 5 DeFi Applications
 
How To Become A Blockchain Engineer
How To Become A Blockchain EngineerHow To Become A Blockchain Engineer
How To Become A Blockchain Engineer
 
Blockchain & Insurance
Blockchain & InsuranceBlockchain & Insurance
Blockchain & Insurance
 
Impact on the financial sector of blockchain technology
Impact on the financial sector of blockchain technologyImpact on the financial sector of blockchain technology
Impact on the financial sector of blockchain technology
 
What is Blockchain Technology?
What is Blockchain Technology?What is Blockchain Technology?
What is Blockchain Technology?
 
Seratio whitepaper educational passport distributed learning ledger (30 april...
Seratio whitepaper educational passport distributed learning ledger (30 april...Seratio whitepaper educational passport distributed learning ledger (30 april...
Seratio whitepaper educational passport distributed learning ledger (30 april...
 
5 ways
5 ways5 ways
5 ways
 
Blockchain Technology And Cryptocurrency
Blockchain Technology And CryptocurrencyBlockchain Technology And Cryptocurrency
Blockchain Technology And Cryptocurrency
 
An Overview of Stablecoin
An Overview of StablecoinAn Overview of Stablecoin
An Overview of Stablecoin
 
Donn felker etehreum
Donn felker etehreumDonn felker etehreum
Donn felker etehreum
 
How the hospitality industry take the benefits of blockchain technology
How the hospitality industry take the benefits of blockchain technology How the hospitality industry take the benefits of blockchain technology
How the hospitality industry take the benefits of blockchain technology
 
Top 10 reasons to get a blockchain expert certification
Top 10 reasons to get a blockchain expert certificationTop 10 reasons to get a blockchain expert certification
Top 10 reasons to get a blockchain expert certification
 

Similar to Authorization Using JWTs

Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
ForgeRock
 
Wavestone forgerock banking demo
Wavestone forgerock banking demoWavestone forgerock banking demo
Wavestone forgerock banking demo
Bertrand Carlier
 
Jwt the complete guide to json web tokens
Jwt  the complete guide to json web tokensJwt  the complete guide to json web tokens
Jwt the complete guide to json web tokens
remayssat
 
Top 10 Web Hacks 2012
Top 10 Web Hacks 2012Top 10 Web Hacks 2012
Top 10 Web Hacks 2012
Matt Johansen
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
Jeremiah Grossman
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
ForgeRock
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
APIsecure_ Official
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
Hitachi, Ltd. OSS Solution Center.
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
IRJET Journal
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
kantarainitiative
 
Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017
Nelson Petracek
 
Blockchain and Internet of Things
Blockchain and Internet of ThingsBlockchain and Internet of Things
Blockchain and Internet of Things
Valerie Lampkin
 
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays
 
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays
 
What Web 2.pdf
What Web 2.pdfWhat Web 2.pdf
What Web 2.pdf
Marnusharris
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
Rohit Verma
 
Blockchain for Insurance
Blockchain for InsuranceBlockchain for Insurance
Blockchain for Insurance
The Digital Insurer
 
Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008
Jeremiah Grossman
 
Introduction to SAML & OIDC
Introduction to SAML & OIDCIntroduction to SAML & OIDC
Introduction to SAML & OIDC
ForgeRock Identity Tech Talks
 

Similar to Authorization Using JWTs (20)

Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
Wavestone forgerock banking demo
Wavestone forgerock banking demoWavestone forgerock banking demo
Wavestone forgerock banking demo
 
Jwt the complete guide to json web tokens
Jwt  the complete guide to json web tokensJwt  the complete guide to json web tokens
Jwt the complete guide to json web tokens
 
Top 10 Web Hacks 2012
Top 10 Web Hacks 2012Top 10 Web Hacks 2012
Top 10 Web Hacks 2012
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017
 
Blockchain and Internet of Things
Blockchain and Internet of ThingsBlockchain and Internet of Things
Blockchain and Internet of Things
 
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
 
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
apidays LIVE Hong Kong 2021 - Digital Identity Centric Approach to Accelerate...
 
What Web 2.pdf
What Web 2.pdfWhat Web 2.pdf
What Web 2.pdf
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 
Blockchain for Insurance
Blockchain for InsuranceBlockchain for Insurance
Blockchain for Insurance
 
Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008
 
Introduction to SAML & OIDC
Introduction to SAML & OIDCIntroduction to SAML & OIDC
Introduction to SAML & OIDC
 

More from ForgeRock Identity Tech Talks

Deep dive into the Open Banking payments flows
Deep dive into the Open Banking payments flowsDeep dive into the Open Banking payments flows
Deep dive into the Open Banking payments flows
ForgeRock Identity Tech Talks
 
Implementing Open Banking with ForgeRock
Implementing Open Banking with ForgeRockImplementing Open Banking with ForgeRock
Implementing Open Banking with ForgeRock
ForgeRock Identity Tech Talks
 
Just Enough Authentication
Just Enough AuthenticationJust Enough Authentication
Just Enough Authentication
ForgeRock Identity Tech Talks
 
Authentication
AuthenticationAuthentication
Anonymity, Trust, Accountability
Anonymity, Trust, AccountabilityAnonymity, Trust, Accountability
Anonymity, Trust, Accountability
ForgeRock Identity Tech Talks
 
Gov.uk Verify - The Journey So Far
Gov.uk Verify - The Journey So FarGov.uk Verify - The Journey So Far
Gov.uk Verify - The Journey So Far
ForgeRock Identity Tech Talks
 
EU Single Digital Market - eIDAS To The Rescue
EU Single Digital Market - eIDAS To The RescueEU Single Digital Market - eIDAS To The Rescue
EU Single Digital Market - eIDAS To The Rescue
ForgeRock Identity Tech Talks
 
Delivering Identity at Internet Scale
Delivering Identity at Internet ScaleDelivering Identity at Internet Scale
Delivering Identity at Internet Scale
ForgeRock Identity Tech Talks
 
The Slow Death of Passwords
The Slow Death of PasswordsThe Slow Death of Passwords
The Slow Death of Passwords
ForgeRock Identity Tech Talks
 
Steak and OAuth Pi
Steak and OAuth PiSteak and OAuth Pi
Steak and OAuth Pi
ForgeRock Identity Tech Talks
 
Share All The Things With UMA
Share All The Things With UMAShare All The Things With UMA
Share All The Things With UMA
ForgeRock Identity Tech Talks
 
A Deep Dive Into Identity Work Flow
A Deep Dive Into Identity Work FlowA Deep Dive Into Identity Work Flow
A Deep Dive Into Identity Work Flow
ForgeRock Identity Tech Talks
 
Rethinking The Policy Agent
Rethinking The Policy AgentRethinking The Policy Agent
Rethinking The Policy Agent
ForgeRock Identity Tech Talks
 
Mobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless FutureMobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless Future
ForgeRock Identity Tech Talks
 
Blockchain
BlockchainBlockchain

More from ForgeRock Identity Tech Talks (15)

Deep dive into the Open Banking payments flows
Deep dive into the Open Banking payments flowsDeep dive into the Open Banking payments flows
Deep dive into the Open Banking payments flows
 
Implementing Open Banking with ForgeRock
Implementing Open Banking with ForgeRockImplementing Open Banking with ForgeRock
Implementing Open Banking with ForgeRock
 
Just Enough Authentication
Just Enough AuthenticationJust Enough Authentication
Just Enough Authentication
 
Authentication
AuthenticationAuthentication
Authentication
 
Anonymity, Trust, Accountability
Anonymity, Trust, AccountabilityAnonymity, Trust, Accountability
Anonymity, Trust, Accountability
 
Gov.uk Verify - The Journey So Far
Gov.uk Verify - The Journey So FarGov.uk Verify - The Journey So Far
Gov.uk Verify - The Journey So Far
 
EU Single Digital Market - eIDAS To The Rescue
EU Single Digital Market - eIDAS To The RescueEU Single Digital Market - eIDAS To The Rescue
EU Single Digital Market - eIDAS To The Rescue
 
Delivering Identity at Internet Scale
Delivering Identity at Internet ScaleDelivering Identity at Internet Scale
Delivering Identity at Internet Scale
 
The Slow Death of Passwords
The Slow Death of PasswordsThe Slow Death of Passwords
The Slow Death of Passwords
 
Steak and OAuth Pi
Steak and OAuth PiSteak and OAuth Pi
Steak and OAuth Pi
 
Share All The Things With UMA
Share All The Things With UMAShare All The Things With UMA
Share All The Things With UMA
 
A Deep Dive Into Identity Work Flow
A Deep Dive Into Identity Work FlowA Deep Dive Into Identity Work Flow
A Deep Dive Into Identity Work Flow
 
Rethinking The Policy Agent
Rethinking The Policy AgentRethinking The Policy Agent
Rethinking The Policy Agent
 
Mobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless FutureMobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless Future
 
Blockchain
BlockchainBlockchain
Blockchain
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Authorization Using JWTs

  • 1. © 2016 ForgeRock. All rights reserved. Authorization Using JWTs Simon Moffatt Principal Engineer @ ForgeRock @SimonMoffatt http://www.simonmoffatt.com Blogger @ http://www.theidentitycookbook.com
  • 2. © 2016 ForgeRock. All rights reserved. Contents Introduction to JWT Claims in OIDC id_token 3rd Party Authorization Future Use Cases
  • 3. © 2016 ForgeRock. All rights reserved. Introduction to JWT – Part 1 l Integrate – but with caution l Correlate to known data “JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.” - RFC7519 - https://tools.ietf.org/html/rfc7519  Self Contained  Signed and/or encrypted  JSON formatted  Lots of implementation libs  Lightweight
  • 4. © 2016 ForgeRock. All rights reserved. Introduction to JWT – Part 2 l Integrate – but with caution l Correlate to known data Header Payload Signature
  • 5. © 2016 ForgeRock. All rights reserved. Introduction to JWT – Part 2 l Integrate – but with caution l Correlate to known data Header Payload Signature { typ: "JWT", alg: "HS256" } { "expiryTime":14688417398 58,"UserId":"smoff","AuthLe vel":"0","Locale":"en_GB"," HostName":"127.0.0.1", ...} fvD2FTo57RZp7MdoH 7vyVBmS_533TXriKNi bawEf9SY
  • 6. © 2016 ForgeRock. All rights reserved. What’s the problem we are trying to solve?  “Stateful” - server side logic and verification  Traditional authorization landscape  Scale limitations  Card is granted to individual  Association and verification completed  Card presented to shop to purchase  Shop communicates to issuer to verify funds, association etc  Cash is initially granted to individual  Needs to be kept safe as no secondary factor – bearer token!  Can be exchanged without going back to bank – just verify the note locally  “Stateless” - client side logic  Modern mesh based interactions  Offline verification  Scaleable
  • 7. © 2016 ForgeRock. All rights reserved. What’s the problem we are trying to solve?  “Stateful” - server side logic and verification  Traditional authorization landscape  Scale limitations  Card is granted to individual  Association and verification completed  Card presented to shop to purchase  Shop communicates to issuer to verify funds, association etc  Cash is initially granted to individual  Needs to be kept safe as no secondary factor – bearer token!  Can be exchanged without going back to bank – just verify the note locally  “Stateless” - client side logic  Modern mesh based interactions  Offline verification  Scaleable
  • 8. © 2016 ForgeRock. All rights reserved. Example with OpenID Connect Can be a JWT Can also be a JWT... Can overload JWT in order to negate steps 8 & 9...
  • 9. © 2016 ForgeRock. All rights reserved. Computery Demo Stuff https://commons.wikimedia.org/wiki/File:IBM_Electronic_Data_Processing_Machine_-_GPN-2000-001881.jpg Based on http://www.theidentitycookbook.com/2015/12/scripted-openid-connect-claims-and.html
  • 10. © 2016 ForgeRock. All rights reserved. Example with OpenID Connect - config
  • 11. © 2016 ForgeRock. All rights reserved. Example with OpenID Connect – getting the tokens
  • 12. © 2016 ForgeRock. All rights reserved. Example with OpenID Connect – id_token introspection Extended Profile scope Profile scope Email scope Entitlements scope
  • 13. © 2016 ForgeRock. All rights reserved. Example with 3rd Party Authorization  Leverage a token generated by a 3rd party / separate operational domain  Have resources protected via centralised Policy Decision Point  Contact the Policy Decision Point before granting access  Just-in-Time authorization – don’t need up front user knowledge, just meta data exchange “Like posting a tweet using your Facebook account without having a Twitter profile!”
  • 14. © 2016 ForgeRock. All rights reserved. Computery Demo Stuff https://commons.wikimedia.org/wiki/File:IBM_Electronic_Data_Processing_Machine_-_GPN-2000-001881.jpg Based on http://www.theidentitycookbook.com/2016/05/federated-authorization-using-3rd-party.html
  • 15. © 2016 ForgeRock. All rights reserved. Example with 3rd Party Authorization - config
  • 16. © 2016 ForgeRock. All rights reserved. Example with 3rd Party Authorization – get the JWT Trust Correct Use User Meta Data
  • 17. © 2016 ForgeRock. All rights reserved. Example with 3rd Party Authorization – response Access Granted Invalid Signature / Untrusted IDP
  • 18. © 2016 ForgeRock. All rights reserved. Future use cases... The very immediate future will see an increased number of devices, API’s, services and interactions that will need authX functions applying to them API Device User
  • 19. © 2016 ForgeRock. All rights reserved. Future use cases... UC#1 – Hyper scale authorization for millions of users requesting authX from any autonomous identity service UC#2 – A protected application or service wants to allow access to a user or other service, but is often “offline” and can’t communicate to central PDP UC#3 – A pin & paired internet connected washing machine wants to communicate to a smart metre, which in turn wants to communicate with the water boiler – all from different operational domains and highly federated
  • 20. © 2016 ForgeRock. All rights reserved. Thank You