SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 โ€“ 6470
@ IJTSRD | Unique Paper ID โ€“ IJTSRD31319 | Volume โ€“ 4 | Issue โ€“ 4 | May-June 2020 Page 997
Flaws in Oauth 2.0: Can Oauth be used as a Security Server
Pooja Krushna Paste, Pratik Ramakant Vaidya
Department of MCA, ASM Institute of Management & Computer Studies, Thane, Maharashtra, India
ABSTRACT
OAuth 2.0 is the business standard convention for approval. OAuth 2.0
spotlights on customer engineer straightforwardness while giving explicit
approval streams to web applications,work area applications,cell phones,and
lounge room gadgets. The scientists analyzed 600 top U.S. also, ChAndroid
versatile applications that utilization OAuth 2.0 APIs from Facebook, Google
and Sinaโ€”which works Weibo in Chinaโ€”and backing SSO for outsider
applications. The scientists found that 41.2 percent of the applications they
tried were defenseless against their attackinese.
KEYWORDS: OAuth, Proxy Servers, Vpns, Authorization tokens
How to cite this paper: Pooja Krushna
Paste | Pratik Ramakant Vaidya "Flaws in
Oauth 2.0: Can Oauth be used asa Security
Server" Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-4, June 2020,
pp.997-999, URL:
www.ijtsrd.com/papers/ijtsrd31319.pdf
Copyright ยฉ 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
The OAuth 2.0 convention is one of the most broadly sent
approval/single sign-on (SSO) conventionsandfurthermore
fills in as the establishment for the new SSO standard
OpenID Connect. Notwithstanding the notorietyofOAuth, so
far examination endeavors were generally focused at
discovering bugs in explicit executions and depended on
formal models which conceptual from many webs includes
or didn't give a proper treatment by any stretch of the
imagination. In this paper, we do the primary broad
conventional examination of the OAuth 2.0 standard in an
expressive web model. Our investigation targets setting up
solid approval, verification, and meeting uprightness
ensures, for which we give formal definitions. In our proper
investigation, each of the four OAuth Grant Types (approval
code award, certain award, asset Owner Password
Credentials Grant, and the customer Credentials Grant) are
secured. They may even run all the while in the equivalent
and distinctive depending gatherings and Identity Provider
(IDP), where noxious depending parties, personality
suppliers, and programs are considered also. Our
demonstrating and examination of the OAuth 2.0 standard
expect that security proposals and Best Practices are
followed, so as to stay away from clear and known assaults.
2. OAuth Review-
The OAuth and Google Sign-In connecting type includes
Google Sign-In top of OAuth based record connecting. This
gives consistent voicebased connecting to Google clients
while likewise empowering account connecting for clients
who enrolled to your administration with a non-Google
personality. This connecting type starts with Google
Sign-In, which permits you to check if the client's Google
profile data exists in your framework. In the event that the
client's data isn't found in your framework, a standard
OAuth stream starts. The client can likewise decide to make
another record with their Google profile data
I. OAuth Used by Facebook-
267 million Facebook users' data has supposedly been
leaked. Comparitech and security analyst Bob Diachenko
have revealed a database containing in excess of 267 million
Facebook users' data that was left uncovered on the web,
with not so much as a secret key forestalling unapproved
access to it. On the off chance that you've at any point
utilized a "Sign in With Facebook" catch, orgivenanoutsider
application access to your Twitter account, you've utilized
OAuth. It's additionally utilized by Google, Microsoft, and
LinkedIn, just as numerous other recordsuppliers.Basically,
OAuth permits you to concede a site access to some data
about your record without giving it your genuine record
secret key.
IJTSRD31319
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID โ€“ IJTSRD31319 | Volume โ€“ 4 | Issue โ€“ 4 | May-June 2020 Page 998
II. OAuth used by Google-
Google APIs utilize the OAuth 2.0 convention for
confirmation and approval. Google bolsters regular OAuth
2.0 situations, for example, those for web server, customer
side, introduced, and constrained information gadget
applications. To start, acquire OAuth 2.0 customer
accreditations from the Google API Console. At that point
your customer application demands an entrance tokenfrom
the Google Authorization Server, extricates a token from the
reaction, and sends the token to the Google API that you
need to get to. For an intelligent exhibitofutilizingOAuth 2.0
with Google (counting the alternative to utilize your own
customer qualifications), try different things withtheOAuth
2.0 Playground.
III. Games that use OAuth-
This record clarifies how applicationsintroducedongadgets
like telephones, tablets, and PCs utilize Google's OAuth 2.0
endpoints to approve access to Google APIs. OAuth 2.0
permits clients to impart explicit information to an
application while keeping their usernames, passwords, and
other data private. For instance, an application can utilize
OAuth 2.0 to get consent from clients to store records in
their Google Drives. Introduced applications are
disseminated to singular gadgets, and it is accepted that
these applications can't keep insider facts. They can get to
Google APIs while the client is available at the application or
when the application is running out of sight. This approval
stream is like the one utilized for web server applications.
The fundamental contrast is that introduced applications
must open the framework program and gracefully a
neighborhood divert URI to deal with reactions from
Google's approval server.
Linking games with your google play store account has
always been secure but what if we starttolink anothersocial
media app with the application currently using than it may
result in data lose or even by using proxy server s can be
used to present a user a fake identity. Or an attacker can
use another username and can log into the game as another
user.
IV. Less Risks with short time
tokens-Divert URLs are a basic piece of the OAuth stream.
After a client effectively approves an application, the
approval server will redirect the client back to the
application with either an approval code or access token in
the URL. Because of approval sidestep in redirect Uri
parameter in OAUTH stream; itโ€™s conceivable to divert
confirmed clients to subjective spaces with their OAuth
accreditations from which itโ€™s conceivable to take over their
record. On the off chance that an approval code is utilized
more than once, the approval server MUST deny the
solicitation. OAuth Providers (servers) that carefully follow
rfc6749 are defenseless against open divert. Approval
repudiated doesn't send an alarm.
V. What Goes in a token Granted-
request scope: contacts.
response type: code (implicit or others).
callback URL.
client Id
3. Literature review
Redirect URLs are a fundamental bit of the OAuth stream.
After a customer viably supports an application, the
endorsement server will redirect the customer back to the
application with either an endorsementcodeoraccesstoken
in the URL. As a result of endorsement avoid in redirect Uri
parameter in OAUTH stream, itโ€™s possibletooccupyaffirmed
customers to emotional spaces with their OAuth
accreditations from which itโ€™s possible to take over their
record. In case an endorsement code is usedmorethanonce,
the endorsement server MUST deny the requesting. OAuth
Providers (servers) that cautiously follow rfc6749 are
vulnerable against open occupy. Endorsement renounced
doesn't send an alert.
4. Research Methodology-
OAuth is being used widely for authorization but it is said
that It is not so far god for authentication. And thus, now
they use a (sso) that is a single sign on. The sso resides as a
thin layer above the OAuth. But now letโ€™s take a close look at
the problems.
5. Problem Statement-
OAuth only takes care about the authorization as its
mechanism works with granting and providingtokensto the
thirdparty applications on the basis of the permissions
granted, however letโ€™s take a scenario wheretheuserlogโ€™s in
with its real account the OAuth verifies by sending the alert
the token is generated. And as per the working when the
token is sent back it carries the details which are vulnerable
to attacks. If the user by using a proxy server or a better
Vpns gets this sent back token from the OAuth, Now the
attacker can easily change the username in the token as
OAuth only sends and uses username,thusiftheusernameis
changed in the url than the user will login successfully by
another username and thus this creates a problem that the
OAuth does not provide the user with any security once the
token are granted. Thus, the entered username is of another
user and thus the attacker can easily login withits name.and
the real user of that name is unaware that his Id is being
used by someone.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID โ€“ IJTSRD31319 | Volume โ€“ 4 | Issue โ€“ 4 | May-June 2020 Page 999
6. Conclusion-
Leaf certificate. By sticking against your leaf testament, you
are ensuring with near 100% sureness this is your
declaration and along these lines the chain is substantial.
Leaf endorsements will in general have a short expiry time
and if, for example. On the off chance that the solicitation
flops because of a missing, invalid, or jumbling redirection
URI, or if the customer identifier is absent or invalid the
approval server SHOULD educate the asset proprietor
regarding the error and MUST NOT consequently divert the
client specialist to the invalid redirection URI. Tokens ought
not to make some long memories expiry date. For android
gadgets the information ought not to be put away on
neighbourhood stockpiling. Transient expiry tokens are
helpful.
7. Future Enhancements-
OAuth can use security alerts to the user after the tokensare
generated. Thus, this will create an alert for the user that his
account has been used, which will result eitherremoving the
data of game from the google account which is not being
linked by the user.
8. Reference-
[1] Security Flows in OAuth 2.0 Framework: A Case Study:
{https://www.researchgate.net/publication/3194535
79}
[2] OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to
Account Hijacking: (https://threatpost.com/OAuth-2-
0-hackexposes-1-billion-mobile-apps-to-
accounthijacking/121889/).
[3] Top 10 OAuth 2 Implementation Vulnerabilities:
(http://blog.intothesymmetry.com/2015/12/top-10-
OAuth-2-implementation.html).
[4] OAuth authentication fails in a proxyscenariobetween
Exchange Server 2013 hybrid on-premises and Office
365:
(https://support.microsoft.com/enin/help/3137585/
OAuth-authenticationfails-in-a-proxy-scenario-
betweenexchange-server).
[5] Four Attacks on OAuth - How to Secure Your OAuth
Implementation:
https://www.sans.org/readingroom/whitepapers/app
lication/attacks-OAuth-secure-OAuth-implementation-
33644).

More Related Content

What's hot

I1804015458
I1804015458I1804015458
I1804015458
IOSR Journals
ย 
OAuth Android Gรถteborg
OAuth Android GรถteborgOAuth Android Gรถteborg
OAuth Android Gรถteborg
danieloskarsson
ย 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
Hai Nguyen
ย 
Presentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini Anand
Harini Anandakumar
ย 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
IRJET Journal
ย 
SQL injection
SQL injectionSQL injection
SQL injection
Raj Parmar
ย 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
IJNSA Journal
ย 
Top 10 android_development_vulnerailities
Top 10 android_development_vulnerailitiesTop 10 android_development_vulnerailities
Top 10 android_development_vulnerailities
Mohamed Sayed
ย 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CloudIDSummit
ย 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET Journal
ย 
Development of Twitter Application #5 - Users
Development of Twitter Application #5 - UsersDevelopment of Twitter Application #5 - Users
Development of Twitter Application #5 - Users
Myungjin Lee
ย 
GHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestGHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail Quest
PaulaPaulSlides
ย 
Review on OpenID Authentication Framework
Review on OpenID Authentication FrameworkReview on OpenID Authentication Framework
Review on OpenID Authentication Framework
ijsrd.com
ย 
50120130405019
5012013040501950120130405019
50120130405019
IAEME Publication
ย 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud Computing
Rahul Roshan
ย 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
Symosis Security (Previously C-Level Security)
ย 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
IJERA Editor
ย 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
IRJET Journal
ย 

What's hot (18)

I1804015458
I1804015458I1804015458
I1804015458
ย 
OAuth Android Gรถteborg
OAuth Android GรถteborgOAuth Android Gรถteborg
OAuth Android Gรถteborg
ย 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
ย 
Presentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini Anand
ย 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
ย 
SQL injection
SQL injectionSQL injection
SQL injection
ย 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
ย 
Top 10 android_development_vulnerailities
Top 10 android_development_vulnerailitiesTop 10 android_development_vulnerailities
Top 10 android_development_vulnerailities
ย 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
ย 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
ย 
Development of Twitter Application #5 - Users
Development of Twitter Application #5 - UsersDevelopment of Twitter Application #5 - Users
Development of Twitter Application #5 - Users
ย 
GHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestGHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail Quest
ย 
Review on OpenID Authentication Framework
Review on OpenID Authentication FrameworkReview on OpenID Authentication Framework
Review on OpenID Authentication Framework
ย 
50120130405019
5012013040501950120130405019
50120130405019
ย 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud Computing
ย 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
ย 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
ย 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
ย 

Similar to Flaws in Oauth 2.0 Can Oauth be used as a Security Server

SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
Ubisecure
ย 
Oauth 2.0
Oauth 2.0Oauth 2.0
Oauth 2.0
Manish Kumar Singh
ย 
attacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfattacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdf
MohitRampal5
ย 
OAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID ConnectOAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID Connect
Jacob Combs
ย 
Oauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 supportOauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 support
Gaurav Sharma
ย 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - Demystified
Calvin Noronha
ย 
Stateless Auth using OAuth2 & JWT
Stateless Auth using OAuth2 & JWTStateless Auth using OAuth2 & JWT
Stateless Auth using OAuth2 & JWT
Gaurav Roy
ย 
Stateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWTStateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWT
Mobiliya
ย 
Single-Page-Application & REST security
Single-Page-Application & REST securitySingle-Page-Application & REST security
Single-Page-Application & REST security
Igor Bossenko
ย 
O auth2 with angular js
O auth2 with angular jsO auth2 with angular js
O auth2 with angular js
Bixlabs
ย 
OAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration PresentationOAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration Presentation
Knoldus Inc.
ย 
A technical insight into the concepts and terminologies behind oauth โ€“ an ope...
A technical insight into the concepts and terminologies behind oauth โ€“ an ope...A technical insight into the concepts and terminologies behind oauth โ€“ an ope...
A technical insight into the concepts and terminologies behind oauth โ€“ an ope...
eSAT Journals
ย 
Demystifying OAuth 2.0
Demystifying OAuth 2.0Demystifying OAuth 2.0
Demystifying OAuth 2.0
Yury Roa
ย 
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
Good Dog Labs, Inc.
ย 
Rest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API SecurityRest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API Security
Mohammed Fazuluddin
ย 
Intro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID ConnectIntro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID Connect
LiamWadman
ย 
OAuth2 Introduction
OAuth2 IntroductionOAuth2 Introduction
OAuth2 Introduction
Arpit Suthar
ย 
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Nilanjan Roy
ย 
Oauth2.0 tutorial
Oauth2.0 tutorialOauth2.0 tutorial
Oauth2.0 tutorial
HarikaReddy115
ย 
Oauth2.0
Oauth2.0Oauth2.0
Oauth2.0
Yasmine Gaber
ย 

Similar to Flaws in Oauth 2.0 Can Oauth be used as a Security Server (20)

SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
ย 
Oauth 2.0
Oauth 2.0Oauth 2.0
Oauth 2.0
ย 
attacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfattacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdf
ย 
OAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID ConnectOAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID Connect
ย 
Oauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 supportOauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 support
ย 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - Demystified
ย 
Stateless Auth using OAuth2 & JWT
Stateless Auth using OAuth2 & JWTStateless Auth using OAuth2 & JWT
Stateless Auth using OAuth2 & JWT
ย 
Stateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWTStateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWT
ย 
Single-Page-Application & REST security
Single-Page-Application & REST securitySingle-Page-Application & REST security
Single-Page-Application & REST security
ย 
O auth2 with angular js
O auth2 with angular jsO auth2 with angular js
O auth2 with angular js
ย 
OAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration PresentationOAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration Presentation
ย 
A technical insight into the concepts and terminologies behind oauth โ€“ an ope...
A technical insight into the concepts and terminologies behind oauth โ€“ an ope...A technical insight into the concepts and terminologies behind oauth โ€“ an ope...
A technical insight into the concepts and terminologies behind oauth โ€“ an ope...
ย 
Demystifying OAuth 2.0
Demystifying OAuth 2.0Demystifying OAuth 2.0
Demystifying OAuth 2.0
ย 
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...OAuth 2.0  - The fundamentals, the good , the bad, technical primer and commo...
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
ย 
Rest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API SecurityRest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API Security
ย 
Intro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID ConnectIntro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID Connect
ย 
OAuth2 Introduction
OAuth2 IntroductionOAuth2 Introduction
OAuth2 Introduction
ย 
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
ย 
Oauth2.0 tutorial
Oauth2.0 tutorialOauth2.0 tutorial
Oauth2.0 tutorial
ย 
Oauth2.0
Oauth2.0Oauth2.0
Oauth2.0
ย 

More from ijtsrd

โ€˜Six Sigma Techniqueโ€™ A Journey Through its Implementation
โ€˜Six Sigma Techniqueโ€™ A Journey Through its Implementationโ€˜Six Sigma Techniqueโ€™ A Journey Through its Implementation
โ€˜Six Sigma Techniqueโ€™ A Journey Through its Implementation
ijtsrd
ย 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
ย 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
ย 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
ย 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
ย 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
ย 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
ย 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
ย 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
ย 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
ย 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
ย 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
ย 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
ย 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
ย 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
ย 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
ย 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
ย 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
ย 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
ย 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
ย 

More from ijtsrd (20)

โ€˜Six Sigma Techniqueโ€™ A Journey Through its Implementation
โ€˜Six Sigma Techniqueโ€™ A Journey Through its Implementationโ€˜Six Sigma Techniqueโ€™ A Journey Through its Implementation
โ€˜Six Sigma Techniqueโ€™ A Journey Through its Implementation
ย 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ย 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ย 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ย 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ย 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ย 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ย 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ย 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ย 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ย 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ย 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ย 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ย 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ย 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ย 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ย 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ย 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ย 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ย 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ย 

Recently uploaded

HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
ย 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
ย 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
ย 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
ย 
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdfู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ
ย 
Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.
IsmaelVazquez38
ย 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
ย 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
ย 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
ย 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Nguyen Thanh Tu Collection
ย 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
ย 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
ย 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
ย 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
ย 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
ย 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
ย 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
ย 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
ย 

Recently uploaded (20)

HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
ย 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
ย 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
ย 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
ย 
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdfู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ย 
Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.
ย 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
ย 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
ย 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ย 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
ย 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
ย 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
ย 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
ย 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
ย 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
ย 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
ย 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
ย 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
ย 

Flaws in Oauth 2.0 Can Oauth be used as a Security Server

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 โ€“ 6470 @ IJTSRD | Unique Paper ID โ€“ IJTSRD31319 | Volume โ€“ 4 | Issue โ€“ 4 | May-June 2020 Page 997 Flaws in Oauth 2.0: Can Oauth be used as a Security Server Pooja Krushna Paste, Pratik Ramakant Vaidya Department of MCA, ASM Institute of Management & Computer Studies, Thane, Maharashtra, India ABSTRACT OAuth 2.0 is the business standard convention for approval. OAuth 2.0 spotlights on customer engineer straightforwardness while giving explicit approval streams to web applications,work area applications,cell phones,and lounge room gadgets. The scientists analyzed 600 top U.S. also, ChAndroid versatile applications that utilization OAuth 2.0 APIs from Facebook, Google and Sinaโ€”which works Weibo in Chinaโ€”and backing SSO for outsider applications. The scientists found that 41.2 percent of the applications they tried were defenseless against their attackinese. KEYWORDS: OAuth, Proxy Servers, Vpns, Authorization tokens How to cite this paper: Pooja Krushna Paste | Pratik Ramakant Vaidya "Flaws in Oauth 2.0: Can Oauth be used asa Security Server" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-4, June 2020, pp.997-999, URL: www.ijtsrd.com/papers/ijtsrd31319.pdf Copyright ยฉ 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION The OAuth 2.0 convention is one of the most broadly sent approval/single sign-on (SSO) conventionsandfurthermore fills in as the establishment for the new SSO standard OpenID Connect. Notwithstanding the notorietyofOAuth, so far examination endeavors were generally focused at discovering bugs in explicit executions and depended on formal models which conceptual from many webs includes or didn't give a proper treatment by any stretch of the imagination. In this paper, we do the primary broad conventional examination of the OAuth 2.0 standard in an expressive web model. Our investigation targets setting up solid approval, verification, and meeting uprightness ensures, for which we give formal definitions. In our proper investigation, each of the four OAuth Grant Types (approval code award, certain award, asset Owner Password Credentials Grant, and the customer Credentials Grant) are secured. They may even run all the while in the equivalent and distinctive depending gatherings and Identity Provider (IDP), where noxious depending parties, personality suppliers, and programs are considered also. Our demonstrating and examination of the OAuth 2.0 standard expect that security proposals and Best Practices are followed, so as to stay away from clear and known assaults. 2. OAuth Review- The OAuth and Google Sign-In connecting type includes Google Sign-In top of OAuth based record connecting. This gives consistent voicebased connecting to Google clients while likewise empowering account connecting for clients who enrolled to your administration with a non-Google personality. This connecting type starts with Google Sign-In, which permits you to check if the client's Google profile data exists in your framework. In the event that the client's data isn't found in your framework, a standard OAuth stream starts. The client can likewise decide to make another record with their Google profile data I. OAuth Used by Facebook- 267 million Facebook users' data has supposedly been leaked. Comparitech and security analyst Bob Diachenko have revealed a database containing in excess of 267 million Facebook users' data that was left uncovered on the web, with not so much as a secret key forestalling unapproved access to it. On the off chance that you've at any point utilized a "Sign in With Facebook" catch, orgivenanoutsider application access to your Twitter account, you've utilized OAuth. It's additionally utilized by Google, Microsoft, and LinkedIn, just as numerous other recordsuppliers.Basically, OAuth permits you to concede a site access to some data about your record without giving it your genuine record secret key. IJTSRD31319
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID โ€“ IJTSRD31319 | Volume โ€“ 4 | Issue โ€“ 4 | May-June 2020 Page 998 II. OAuth used by Google- Google APIs utilize the OAuth 2.0 convention for confirmation and approval. Google bolsters regular OAuth 2.0 situations, for example, those for web server, customer side, introduced, and constrained information gadget applications. To start, acquire OAuth 2.0 customer accreditations from the Google API Console. At that point your customer application demands an entrance tokenfrom the Google Authorization Server, extricates a token from the reaction, and sends the token to the Google API that you need to get to. For an intelligent exhibitofutilizingOAuth 2.0 with Google (counting the alternative to utilize your own customer qualifications), try different things withtheOAuth 2.0 Playground. III. Games that use OAuth- This record clarifies how applicationsintroducedongadgets like telephones, tablets, and PCs utilize Google's OAuth 2.0 endpoints to approve access to Google APIs. OAuth 2.0 permits clients to impart explicit information to an application while keeping their usernames, passwords, and other data private. For instance, an application can utilize OAuth 2.0 to get consent from clients to store records in their Google Drives. Introduced applications are disseminated to singular gadgets, and it is accepted that these applications can't keep insider facts. They can get to Google APIs while the client is available at the application or when the application is running out of sight. This approval stream is like the one utilized for web server applications. The fundamental contrast is that introduced applications must open the framework program and gracefully a neighborhood divert URI to deal with reactions from Google's approval server. Linking games with your google play store account has always been secure but what if we starttolink anothersocial media app with the application currently using than it may result in data lose or even by using proxy server s can be used to present a user a fake identity. Or an attacker can use another username and can log into the game as another user. IV. Less Risks with short time tokens-Divert URLs are a basic piece of the OAuth stream. After a client effectively approves an application, the approval server will redirect the client back to the application with either an approval code or access token in the URL. Because of approval sidestep in redirect Uri parameter in OAUTH stream; itโ€™s conceivable to divert confirmed clients to subjective spaces with their OAuth accreditations from which itโ€™s conceivable to take over their record. On the off chance that an approval code is utilized more than once, the approval server MUST deny the solicitation. OAuth Providers (servers) that carefully follow rfc6749 are defenseless against open divert. Approval repudiated doesn't send an alarm. V. What Goes in a token Granted- request scope: contacts. response type: code (implicit or others). callback URL. client Id 3. Literature review Redirect URLs are a fundamental bit of the OAuth stream. After a customer viably supports an application, the endorsement server will redirect the customer back to the application with either an endorsementcodeoraccesstoken in the URL. As a result of endorsement avoid in redirect Uri parameter in OAUTH stream, itโ€™s possibletooccupyaffirmed customers to emotional spaces with their OAuth accreditations from which itโ€™s possible to take over their record. In case an endorsement code is usedmorethanonce, the endorsement server MUST deny the requesting. OAuth Providers (servers) that cautiously follow rfc6749 are vulnerable against open occupy. Endorsement renounced doesn't send an alert. 4. Research Methodology- OAuth is being used widely for authorization but it is said that It is not so far god for authentication. And thus, now they use a (sso) that is a single sign on. The sso resides as a thin layer above the OAuth. But now letโ€™s take a close look at the problems. 5. Problem Statement- OAuth only takes care about the authorization as its mechanism works with granting and providingtokensto the thirdparty applications on the basis of the permissions granted, however letโ€™s take a scenario wheretheuserlogโ€™s in with its real account the OAuth verifies by sending the alert the token is generated. And as per the working when the token is sent back it carries the details which are vulnerable to attacks. If the user by using a proxy server or a better Vpns gets this sent back token from the OAuth, Now the attacker can easily change the username in the token as OAuth only sends and uses username,thusiftheusernameis changed in the url than the user will login successfully by another username and thus this creates a problem that the OAuth does not provide the user with any security once the token are granted. Thus, the entered username is of another user and thus the attacker can easily login withits name.and the real user of that name is unaware that his Id is being used by someone.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID โ€“ IJTSRD31319 | Volume โ€“ 4 | Issue โ€“ 4 | May-June 2020 Page 999 6. Conclusion- Leaf certificate. By sticking against your leaf testament, you are ensuring with near 100% sureness this is your declaration and along these lines the chain is substantial. Leaf endorsements will in general have a short expiry time and if, for example. On the off chance that the solicitation flops because of a missing, invalid, or jumbling redirection URI, or if the customer identifier is absent or invalid the approval server SHOULD educate the asset proprietor regarding the error and MUST NOT consequently divert the client specialist to the invalid redirection URI. Tokens ought not to make some long memories expiry date. For android gadgets the information ought not to be put away on neighbourhood stockpiling. Transient expiry tokens are helpful. 7. Future Enhancements- OAuth can use security alerts to the user after the tokensare generated. Thus, this will create an alert for the user that his account has been used, which will result eitherremoving the data of game from the google account which is not being linked by the user. 8. Reference- [1] Security Flows in OAuth 2.0 Framework: A Case Study: {https://www.researchgate.net/publication/3194535 79} [2] OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to Account Hijacking: (https://threatpost.com/OAuth-2- 0-hackexposes-1-billion-mobile-apps-to- accounthijacking/121889/). [3] Top 10 OAuth 2 Implementation Vulnerabilities: (http://blog.intothesymmetry.com/2015/12/top-10- OAuth-2-implementation.html). [4] OAuth authentication fails in a proxyscenariobetween Exchange Server 2013 hybrid on-premises and Office 365: (https://support.microsoft.com/enin/help/3137585/ OAuth-authenticationfails-in-a-proxy-scenario- betweenexchange-server). [5] Four Attacks on OAuth - How to Secure Your OAuth Implementation: https://www.sans.org/readingroom/whitepapers/app lication/attacks-OAuth-secure-OAuth-implementation- 33644).