Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth
Everything OAuth

Editor's Notes

  • #5 Authorization - used most of the time Authentication - 2 legged OAuth, “sign in with twitter”, no to be confused with OpenID Built as an Open Protocol on top of already existing solutions (Amazon,Yahoo)
  • #6 Blaine Cook from twitter, Chris Messina, David Recordon,Larry Halff from magnolia and others
  • #7 RFC only published in April 2010
  • #8 Authorization - used most of the time Authentication - 2 legged OAuth, “sign in with twitter”, no to be confused with OpenID Built as an Open Protocol on top of already existing solutions (Amazon,Yahoo)
  • #9 Authorization - used most of the time Authentication - 2 legged OAuth, “sign in with twitter”, no to be confused with OpenID Built as an Open Protocol on top of already existing solutions (Amazon,Yahoo)
  • #24 Example from twitter connections settings
  • #25 Example from facebook where you can revoke apps and also individual permissions
  • #26 Example from facebook where you can revoke apps and also individual permissions
  • #35 Let’s see an example (next slide)
  • #40 OOB = Out of Band aka PIN OAuth
  • #52 Consumer sends along info about service provider and asks to verify credentials
  • #54 OAuthpocalypse happened on August 31st 2010
  • #57 Prevents man-in-the-middle attack
  • #64 SAML: Security Assertion Markup Language