SlideShare a Scribd company logo
OAuth 2.0 and The Internet of Things
A brief overview of security architecture in the world of IoT
Jacob Ideskog – Identity Specialist at Twobo Technologies
Copyright © 2016 Twobo Technologies AB. All rights reserved
OAuth 2.0
Copyright © 2016 Twobo Technologies AB. All rights reserved
Copyright © 2016 Twobo Technologies AB. All rights reserved
OAuth
Copyright © 2016 Twobo Technologies AB. All rights reserved
Actors
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Authorization Server (AS)
Client
Resource Server (RS)
Actors
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Authorization Server (AS)
Client
Resource Server (RS)
This user
Actors
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Authorization Server (AS)
Client
Resource Server (RS)
Wants this app
Actors
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Authorization Server (AS)
Client
Resource Server (RS)
To access data HERE
Actors
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Authorization Server (AS)
Client
Resource Server (RS)
Authentication Server
The client requests access to a Resource
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Client
Authorization Server (AS)
Resource Server (RS)
Authentication Server
The AS requires the RO to authenticate
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Client
Authorization Server (AS)
Resource Server (RS)
Authentication Server
The AS issues the tokens
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Client
Authorization Server (AS)
Resource Server (RS)
Authentication Server
The Client presents the token to the RS
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Client
Authorization Server (AS)
Resource Server (RS)
Authentication Server
Authorization Server (AS)
The RS validates the Token
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Client
Resource Server (RS)
Authentication Server
Access!
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Client
Authorization Server (AS)
Resource Server (RS)
Authentication Server
A note about the access token
Copyright © 2016 Twobo Technologies AB. All rights reserved
Why did that work?
Copyright © 2016 Twobo Technologies AB. All rights reserved
Copyright © 2016 Twobo Technologies AB. All rights reserved
Zoom in
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Client
Authorization Server (AS)
Resource Server (RS)
Authentication Server
Zoom in
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Client
Authorization Server (AS)
Resource Server (RS)
Authentication Server
Copyright © 2016 Twobo Technologies AB. All rights reserved
Resource Owner (RO)
Client
Authorization Server (AS)
Resource Server (RS)
Authentication Server
- Everybody must use TLS
- We know who we talk to
- We use Bearer tokens
- We encrypt the communication
- Massive trust infrastructure
Copyright © 2016 Twobo Technologies AB. All rights reserved
Constrained environments
Copyright © 2016 Twobo Technologies AB. All rights reserved
Copyright © 2016 Twobo Technologies AB. All rights reserved
Copyright © 2016 Twobo Technologies AB. All rights reserved
Problems
Copyright © 2016 Twobo Technologies AB. All rights reserved
- Battery powered
- Mostly or always offline
- Limited calculation capabilities
- Attractive target for attack
Protocols
Copyright © 2016 Twobo Technologies AB. All rights reserved
XMPP
HTTP
HTTP/2
CoAP
Custom
Protocols
Copyright © 2016 Twobo Technologies AB. All rights reserved
XMPP
HTTP
HTTP/2
CoAP
Custom
Security
Copyright © 2016 Twobo Technologies AB. All rights reserved
Example 1
Copyright © 2016 Twobo Technologies AB. All rights reserved
We’re lacking the central point of trust (PKI)
Copyright © 2016 Twobo Technologies AB. All rights reserved
Back to OAuth
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Prove who you are
Copyright © 2016 Twobo Technologies AB. All rights reserved
Prove who you are
Copyright © 2016 Twobo Technologies AB. All rights reserved
User Authentication Device Authentication
Start as usual
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Authentication Server
Start as usual
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Authentication Server
Start as usual
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Authentication Server
Start as usual
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Authentication Server
Start as usual
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Authentication Server
authorization_code = XYZ
Start as usual
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Authentication Server
authorization_code = XYZ
The user is authenticated
OAuth with Proof of Possession
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
client_id = device123
client_secret = supersecret
scope = read_ekg
audience = ekg_device_ABC
authorization_code = XYZ
...
key = a_shortlived_key
Request access token
Provide ephemeral key
OAuth with Proof of Possession
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
access_token = 0ddfbmd-dnndjv…
Response with access token
Token is ”bound” to the key_id
OAuth with Proof of Possession
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
access_token = 0ddfbmd-dnndjv…
Response with access token
Token is ”bound” to the key_id
The client is authenticated
OAuth with Proof of Possession
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
access_token
”start_session”
OAuth with Proof of Possession
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
access_token
OAuth with Proof of Possession
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
key
OAuth with Proof of Possession
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
OK
OAuth with Proof of Possession
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Disconnected devices
Copyright © 2016 Twobo Technologies AB. All rights reserved
Example 2
Copyright © 2016 Twobo Technologies AB. All rights reserved
Disconnected flow
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Client Resource Server (RS)
client_id = ekg_device_ABC
client_secret = supersecret
scope = read_result
audience = connected_tube_123
token = original_token
...
key = a_shortlived_key
Disconnected flow
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Client Resource Server (RS)
access_token (JWT)
The JWT with a JWE
Copyright © 2016 Twobo Technologies AB. All rights reserved
Header:
{
"alg": "RS256",
...
}
Body:
{
"iss": "issuer.company.com",
"sub": "24400320”,
"aud": "connected_tube_123",
"nonce": "n-0S6_WzA2Mj",
"exp": 1311281970,
"iat": 1311280970,
"cnf": {
"jwe": "eyJhbGciOiJSU0...”
}
Header:
{
"alg": "RSA-OAEP",
"enc": "A128CBC-HS256”
}
Body:
{
...
"kty": "oct",
"alg": "HS256",
"k": "ZoRSOrFzN_FzUA5XKMYoVHyzf...”
...
}
signed encrypted
But with IoT we can use:
Copyright © 2016 Twobo Technologies AB. All rights reserved
CWT
CBOR Web Token (CWT)
Pre-provisoned with AS Trust
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Client Resource Server (RS)
Disconnected flow
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Client Resource Server (RS)
access_token (JWT)
Disconnected flow
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Client Resource Server (RS)
1. Validate JWT
2. Extract JWE
3. Decrypt JWE
Disconnected flow
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Client Resource Server (RS)
OK
Disconnected flow
Copyright © 2016 Twobo Technologies AB. All rights reserved
Authorization Server (AS)
Client Resource Server (RS)
Summary
Copyright © 2016 Twobo Technologies AB. All rights reserved
• OAuth is all about Trust
• OAuth depends on TLS
• With Proof of Posession it can solve
IoT
• Constrained environments can be
• Online or offline
• Pre-provisioned with Trust
• Does not depend on TLS

More Related Content

What's hot

Neo-security Stack
Neo-security StackNeo-security Stack
Neo-security Stack
Twobo Technologies
 
Authorization The Missing Piece of the Puzzle
Authorization The Missing Piece of the PuzzleAuthorization The Missing Piece of the Puzzle
Authorization The Missing Piece of the Puzzle
Nordic APIs
 
Nordic APIs - Integrated Social Solutions for a Cloudy, Mobile World
Nordic APIs - Integrated Social Solutions for a Cloudy, Mobile WorldNordic APIs - Integrated Social Solutions for a Cloudy, Mobile World
Nordic APIs - Integrated Social Solutions for a Cloudy, Mobile World
Twobo Technologies
 
Nordic APIs - Building a Secure API
Nordic APIs - Building a Secure APINordic APIs - Building a Secure API
Nordic APIs - Building a Secure API
Twobo Technologies
 
Incorporating OAuth
Incorporating OAuthIncorporating OAuth
Incorporating OAuth
Twobo Technologies
 
OpenID Connect Explained
OpenID Connect ExplainedOpenID Connect Explained
OpenID Connect Explained
Vladimir Dzhuvinov
 
OAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep Dive
Nordic APIs
 
Designing an API
Designing an APIDesigning an API
Designing an API
Twobo Technologies
 
OAuth Assisted Token Flow for Single Page Applications
OAuth Assisted Token Flow for Single Page ApplicationsOAuth Assisted Token Flow for Single Page Applications
OAuth Assisted Token Flow for Single Page Applications
Nordic APIs
 
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CloudIDSummit
 
OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11Nov Matake
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
Salesforce Developers
 
Twobo LDAP Attribute Store for ADFS
Twobo LDAP Attribute Store for ADFSTwobo LDAP Attribute Store for ADFS
Twobo LDAP Attribute Store for ADFSTwobo Technologies
 
Identity Management: Using OIDC to Empower the Next-Generation Apps
Identity Management: Using OIDC to Empower the Next-Generation AppsIdentity Management: Using OIDC to Empower the Next-Generation Apps
Identity Management: Using OIDC to Empower the Next-Generation Apps
Tom Freestone
 
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkOAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkNov Matake
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CloudIDSummit
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2
Justin Richer
 
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Hitachi, Ltd. OSS Solution Center.
 
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
Brian Campbell
 
SSL Certificate and Code Signing
SSL Certificate and Code SigningSSL Certificate and Code Signing
SSL Certificate and Code Signing
Li-Wei Yao
 

What's hot (20)

Neo-security Stack
Neo-security StackNeo-security Stack
Neo-security Stack
 
Authorization The Missing Piece of the Puzzle
Authorization The Missing Piece of the PuzzleAuthorization The Missing Piece of the Puzzle
Authorization The Missing Piece of the Puzzle
 
Nordic APIs - Integrated Social Solutions for a Cloudy, Mobile World
Nordic APIs - Integrated Social Solutions for a Cloudy, Mobile WorldNordic APIs - Integrated Social Solutions for a Cloudy, Mobile World
Nordic APIs - Integrated Social Solutions for a Cloudy, Mobile World
 
Nordic APIs - Building a Secure API
Nordic APIs - Building a Secure APINordic APIs - Building a Secure API
Nordic APIs - Building a Secure API
 
Incorporating OAuth
Incorporating OAuthIncorporating OAuth
Incorporating OAuth
 
OpenID Connect Explained
OpenID Connect ExplainedOpenID Connect Explained
OpenID Connect Explained
 
OAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep Dive
 
Designing an API
Designing an APIDesigning an API
Designing an API
 
OAuth Assisted Token Flow for Single Page Applications
OAuth Assisted Token Flow for Single Page ApplicationsOAuth Assisted Token Flow for Single Page Applications
OAuth Assisted Token Flow for Single Page Applications
 
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
 
OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
 
Twobo LDAP Attribute Store for ADFS
Twobo LDAP Attribute Store for ADFSTwobo LDAP Attribute Store for ADFS
Twobo LDAP Attribute Store for ADFS
 
Identity Management: Using OIDC to Empower the Next-Generation Apps
Identity Management: Using OIDC to Empower the Next-Generation AppsIdentity Management: Using OIDC to Empower the Next-Generation Apps
Identity Management: Using OIDC to Empower the Next-Generation Apps
 
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkOAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David Chase
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2
 
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
Consideration on Holder-of-Key Bound Token < from Financial-grade API (FAPI) ...
 
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
 
SSL Certificate and Code Signing
SSL Certificate and Code SigningSSL Certificate and Code Signing
SSL Certificate and Code Signing
 

Viewers also liked

Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0
Hannes Tschofenig
 
Gotta Block ‘Em All – Observations on Controlling Access to Mobile APIs using...
Gotta Block ‘Em All – Observations on Controlling Access to Mobile APIs using...Gotta Block ‘Em All – Observations on Controlling Access to Mobile APIs using...
Gotta Block ‘Em All – Observations on Controlling Access to Mobile APIs using...
Nordic APIs
 
Fine grained access control for cloud-based services using ABAC and XACML
Fine grained access control for cloud-based services using ABAC and XACMLFine grained access control for cloud-based services using ABAC and XACML
Fine grained access control for cloud-based services using ABAC and XACML
David Brossard
 
APIs as The Source of Truth (Zane Claes)
APIs as The Source of Truth (Zane Claes)APIs as The Source of Truth (Zane Claes)
APIs as The Source of Truth (Zane Claes)
Nordic APIs
 
Platform Security that will Last for Decades (Travis Spencer)
Platform Security that will Last for Decades (Travis Spencer)Platform Security that will Last for Decades (Travis Spencer)
Platform Security that will Last for Decades (Travis Spencer)
Nordic APIs
 
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
Federico Fernández Moreno
 
Sensing-as-a-Service - An IoT Service Provider's Perspectives
Sensing-as-a-Service - An IoT Service Provider's PerspectivesSensing-as-a-Service - An IoT Service Provider's Perspectives
Sensing-as-a-Service - An IoT Service Provider's Perspectives
Dr. Mazlan Abbas
 

Viewers also liked (8)

Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0
 
Gotta Block ‘Em All – Observations on Controlling Access to Mobile APIs using...
Gotta Block ‘Em All – Observations on Controlling Access to Mobile APIs using...Gotta Block ‘Em All – Observations on Controlling Access to Mobile APIs using...
Gotta Block ‘Em All – Observations on Controlling Access to Mobile APIs using...
 
EU data protection issues in IoT
EU data protection issues in IoTEU data protection issues in IoT
EU data protection issues in IoT
 
Fine grained access control for cloud-based services using ABAC and XACML
Fine grained access control for cloud-based services using ABAC and XACMLFine grained access control for cloud-based services using ABAC and XACML
Fine grained access control for cloud-based services using ABAC and XACML
 
APIs as The Source of Truth (Zane Claes)
APIs as The Source of Truth (Zane Claes)APIs as The Source of Truth (Zane Claes)
APIs as The Source of Truth (Zane Claes)
 
Platform Security that will Last for Decades (Travis Spencer)
Platform Security that will Last for Decades (Travis Spencer)Platform Security that will Last for Decades (Travis Spencer)
Platform Security that will Last for Decades (Travis Spencer)
 
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
A Model to Enable Application-scoped Access Control as a Service for IoT Usin...
 
Sensing-as-a-Service - An IoT Service Provider's Perspectives
Sensing-as-a-Service - An IoT Service Provider's PerspectivesSensing-as-a-Service - An IoT Service Provider's Perspectives
Sensing-as-a-Service - An IoT Service Provider's Perspectives
 

Similar to OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)

Soup to Nuts: Identity Federation for AWS
Soup to Nuts: Identity Federation for AWSSoup to Nuts: Identity Federation for AWS
Soup to Nuts: Identity Federation for AWS
Amazon Web Services
 
CTD303_Korea’s Largest OTT provider
CTD303_Korea’s Largest OTT providerCTD303_Korea’s Largest OTT provider
CTD303_Korea’s Largest OTT provider
Amazon Web Services
 
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
Amazon Web Services
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
Amazon Web Services
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
Amazon Web Services
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition System
Amazon Web Services
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition System
Amazon Web Services
 
Debugging Modern Applications: Introduction to AWS X-Ray
Debugging Modern Applications: Introduction to AWS X-RayDebugging Modern Applications: Introduction to AWS X-Ray
Debugging Modern Applications: Introduction to AWS X-Ray
Amazon Web Services
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
CA API Management
 
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
Amazon Web Services
 
Leverage integration cloud_service_for_ebs_
Leverage integration cloud_service_for_ebs_Leverage integration cloud_service_for_ebs_
Leverage integration cloud_service_for_ebs_
aioughydchapter
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architecture
Daniel Foo
 
Everything You Need for a Viral Game, Except the Game
Everything You Need for a Viral Game, Except the GameEverything You Need for a Viral Game, Except the Game
Everything You Need for a Viral Game, Except the Game
Amazon Web Services
 
SID344-Soup to Nuts Identity Federation for AWS
SID344-Soup to Nuts Identity Federation for AWSSID344-Soup to Nuts Identity Federation for AWS
SID344-Soup to Nuts Identity Federation for AWS
Amazon Web Services
 
Financial Grade OAuth & OpenID Connect
Financial Grade OAuth & OpenID ConnectFinancial Grade OAuth & OpenID Connect
Financial Grade OAuth & OpenID Connect
Nat Sakimura
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAkana
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against Hacks
Akana
 
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackBest Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackAmazon Web Services
 
DEV204_Debugging Modern Applications Introduction to AWS X-Ray
DEV204_Debugging Modern Applications Introduction to AWS X-RayDEV204_Debugging Modern Applications Introduction to AWS X-Ray
DEV204_Debugging Modern Applications Introduction to AWS X-Ray
Amazon Web Services
 
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoTIOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
Amazon Web Services
 

Similar to OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog) (20)

Soup to Nuts: Identity Federation for AWS
Soup to Nuts: Identity Federation for AWSSoup to Nuts: Identity Federation for AWS
Soup to Nuts: Identity Federation for AWS
 
CTD303_Korea’s Largest OTT provider
CTD303_Korea’s Largest OTT providerCTD303_Korea’s Largest OTT provider
CTD303_Korea’s Largest OTT provider
 
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition System
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition System
 
Debugging Modern Applications: Introduction to AWS X-Ray
Debugging Modern Applications: Introduction to AWS X-RayDebugging Modern Applications: Introduction to AWS X-Ray
Debugging Modern Applications: Introduction to AWS X-Ray
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
 
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
 
Leverage integration cloud_service_for_ebs_
Leverage integration cloud_service_for_ebs_Leverage integration cloud_service_for_ebs_
Leverage integration cloud_service_for_ebs_
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architecture
 
Everything You Need for a Viral Game, Except the Game
Everything You Need for a Viral Game, Except the GameEverything You Need for a Viral Game, Except the Game
Everything You Need for a Viral Game, Except the Game
 
SID344-Soup to Nuts Identity Federation for AWS
SID344-Soup to Nuts Identity Federation for AWSSID344-Soup to Nuts Identity Federation for AWS
SID344-Soup to Nuts Identity Federation for AWS
 
Financial Grade OAuth & OpenID Connect
Financial Grade OAuth & OpenID ConnectFinancial Grade OAuth & OpenID Connect
Financial Grade OAuth & OpenID Connect
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against Hacks
 
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against Hacks
 
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackBest Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network Attack
 
DEV204_Debugging Modern Applications Introduction to AWS X-Ray
DEV204_Debugging Modern Applications Introduction to AWS X-RayDEV204_Debugging Modern Applications Introduction to AWS X-Ray
DEV204_Debugging Modern Applications Introduction to AWS X-Ray
 
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoTIOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
 

More from Nordic APIs

How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
Nordic APIs
 
The Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at ApitureThe Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at Apiture
Nordic APIs
 
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...
Nordic APIs
 
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Nordic APIs
 
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
Nordic APIs
 
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNLAPI Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
Nordic APIs
 
API Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, GraylogAPI Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, Graylog
Nordic APIs
 
Productizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, MoseifProductizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, Moseif
Nordic APIs
 
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, SipiosSecurely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Nordic APIs
 
Security of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.ioSecurity of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.io
Nordic APIs
 
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
Nordic APIs
 
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Nordic APIs
 
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...
Reigniting the API Description Wars with TypeSpec and the Next Generation of...Reigniting the API Description Wars with TypeSpec and the Next Generation of...
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...
Nordic APIs
 
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAnyEstablish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Nordic APIs
 
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Nordic APIs
 
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIsGoing Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Nordic APIs
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Nordic APIs
 
GenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, GartnerGenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, Gartner
Nordic APIs
 
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...
Nordic APIs
 
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
Nordic APIs
 

More from Nordic APIs (20)

How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
 
The Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at ApitureThe Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at Apiture
 
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...
 
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
 
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
 
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNLAPI Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
 
API Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, GraylogAPI Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, Graylog
 
Productizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, MoseifProductizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, Moseif
 
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, SipiosSecurely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
 
Security of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.ioSecurity of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.io
 
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
 
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
 
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...
Reigniting the API Description Wars with TypeSpec and the Next Generation of...Reigniting the API Description Wars with TypeSpec and the Next Generation of...
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...
 
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAnyEstablish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
 
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
 
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIsGoing Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
 
GenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, GartnerGenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, Gartner
 
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...
 
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)

  • 1. OAuth 2.0 and The Internet of Things A brief overview of security architecture in the world of IoT Jacob Ideskog – Identity Specialist at Twobo Technologies Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 2. OAuth 2.0 Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 3. Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 4. OAuth Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 5. Actors Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Authorization Server (AS) Client Resource Server (RS)
  • 6. Actors Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Authorization Server (AS) Client Resource Server (RS) This user
  • 7. Actors Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Authorization Server (AS) Client Resource Server (RS) Wants this app
  • 8. Actors Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Authorization Server (AS) Client Resource Server (RS) To access data HERE
  • 9. Actors Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Authorization Server (AS) Client Resource Server (RS) Authentication Server
  • 10. The client requests access to a Resource Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Client Authorization Server (AS) Resource Server (RS) Authentication Server
  • 11. The AS requires the RO to authenticate Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Client Authorization Server (AS) Resource Server (RS) Authentication Server
  • 12. The AS issues the tokens Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Client Authorization Server (AS) Resource Server (RS) Authentication Server
  • 13. The Client presents the token to the RS Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Client Authorization Server (AS) Resource Server (RS) Authentication Server
  • 14. Authorization Server (AS) The RS validates the Token Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Client Resource Server (RS) Authentication Server
  • 15. Access! Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Client Authorization Server (AS) Resource Server (RS) Authentication Server
  • 16. A note about the access token Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 17. Why did that work? Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 18. Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 19. Zoom in Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Client Authorization Server (AS) Resource Server (RS) Authentication Server
  • 20. Zoom in Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Client Authorization Server (AS) Resource Server (RS) Authentication Server
  • 21. Copyright © 2016 Twobo Technologies AB. All rights reserved Resource Owner (RO) Client Authorization Server (AS) Resource Server (RS) Authentication Server
  • 22. - Everybody must use TLS - We know who we talk to - We use Bearer tokens - We encrypt the communication - Massive trust infrastructure Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 23. Constrained environments Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 24. Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 25. Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 26. Problems Copyright © 2016 Twobo Technologies AB. All rights reserved - Battery powered - Mostly or always offline - Limited calculation capabilities - Attractive target for attack
  • 27. Protocols Copyright © 2016 Twobo Technologies AB. All rights reserved XMPP HTTP HTTP/2 CoAP Custom
  • 28. Protocols Copyright © 2016 Twobo Technologies AB. All rights reserved XMPP HTTP HTTP/2 CoAP Custom
  • 29. Security Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 30. Example 1 Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 31. We’re lacking the central point of trust (PKI) Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 32. Back to OAuth Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS)
  • 33. Prove who you are Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 34. Prove who you are Copyright © 2016 Twobo Technologies AB. All rights reserved User Authentication Device Authentication
  • 35. Start as usual Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Authentication Server
  • 36. Start as usual Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Authentication Server
  • 37. Start as usual Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Authentication Server
  • 38. Start as usual Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Authentication Server
  • 39. Start as usual Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Authentication Server authorization_code = XYZ
  • 40. Start as usual Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Authentication Server authorization_code = XYZ The user is authenticated
  • 41. OAuth with Proof of Possession Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) client_id = device123 client_secret = supersecret scope = read_ekg audience = ekg_device_ABC authorization_code = XYZ ... key = a_shortlived_key Request access token Provide ephemeral key
  • 42. OAuth with Proof of Possession Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) access_token = 0ddfbmd-dnndjv… Response with access token Token is ”bound” to the key_id
  • 43. OAuth with Proof of Possession Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) access_token = 0ddfbmd-dnndjv… Response with access token Token is ”bound” to the key_id The client is authenticated
  • 44. OAuth with Proof of Possession Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) access_token ”start_session”
  • 45. OAuth with Proof of Possession Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) access_token
  • 46. OAuth with Proof of Possession Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) key
  • 47. OAuth with Proof of Possession Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) OK
  • 48. OAuth with Proof of Possession Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS)
  • 49. Disconnected devices Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 50. Example 2 Copyright © 2016 Twobo Technologies AB. All rights reserved
  • 51. Disconnected flow Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Client Resource Server (RS) client_id = ekg_device_ABC client_secret = supersecret scope = read_result audience = connected_tube_123 token = original_token ... key = a_shortlived_key
  • 52. Disconnected flow Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Client Resource Server (RS) access_token (JWT)
  • 53. The JWT with a JWE Copyright © 2016 Twobo Technologies AB. All rights reserved Header: { "alg": "RS256", ... } Body: { "iss": "issuer.company.com", "sub": "24400320”, "aud": "connected_tube_123", "nonce": "n-0S6_WzA2Mj", "exp": 1311281970, "iat": 1311280970, "cnf": { "jwe": "eyJhbGciOiJSU0...” } Header: { "alg": "RSA-OAEP", "enc": "A128CBC-HS256” } Body: { ... "kty": "oct", "alg": "HS256", "k": "ZoRSOrFzN_FzUA5XKMYoVHyzf...” ... } signed encrypted
  • 54. But with IoT we can use: Copyright © 2016 Twobo Technologies AB. All rights reserved CWT CBOR Web Token (CWT)
  • 55. Pre-provisoned with AS Trust Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Client Resource Server (RS)
  • 56. Disconnected flow Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Client Resource Server (RS) access_token (JWT)
  • 57. Disconnected flow Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Client Resource Server (RS) 1. Validate JWT 2. Extract JWE 3. Decrypt JWE
  • 58. Disconnected flow Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Client Resource Server (RS) OK
  • 59. Disconnected flow Copyright © 2016 Twobo Technologies AB. All rights reserved Authorization Server (AS) Client Resource Server (RS)
  • 60. Summary Copyright © 2016 Twobo Technologies AB. All rights reserved • OAuth is all about Trust • OAuth depends on TLS • With Proof of Posession it can solve IoT • Constrained environments can be • Online or offline • Pre-provisioned with Trust • Does not depend on TLS

Editor's Notes

  1. For you who know me and seen me before, you know I like to talk about OAuth 2.0 Short short background of OAuth
  2. But first, lets start with what we knoiw
  3. It’s acutally very hard to do Oauth without an authentication server
  4. The resource server in has all of my emails and provide a nice clean web interface Some nice developer wrote a great Mail app that I want to use instead, but I don’t really trust them too much. So, I need to allow the client (the app) to see my emails without giving them my password I.e. delegate access to the app (the client)
  5. The resource server in has all of my emails and provide a nice clean web interface Some nice developer wrote a great Mail app that I want to use instead, but I don’t really trust them too much. So, I need to allow the client (the app) to see my emails without giving them my password I.e. delegate access to the app (the client)
  6. The resource server in has all of my emails and provide a nice clean web interface Some nice developer wrote a great Mail app that I want to use instead, but I don’t really trust them too much. So, I need to allow the client (the app) to see my emails without giving them my password I.e. delegate access to the app (the client)
  7. The resource server in has all of my emails and provide a nice clean web interface Some nice developer wrote a great Mail app that I want to use instead, but I don’t really trust them too much. So, I need to allow the client (the app) to see my emails without giving them my password I.e. delegate access to the app (the client)
  8. The RS validates the token with th AS (Some how, I’ll get to that)
  9. You all now know *HOW* that worked, but WHY did it work?
  10. We use this every day, so many never consider it’s importance
  11. We trust that we talk to the right entity because of PKI
  12. We trust that we talk to the right entity because of PKI
  13. Constrained Application Protocol = UDP based XMPP = TCP based Custom, well, actually Other We can consider the CAN bus of a Car, or the good old Zigbee or custom protocols defined per device family types
  14. Constrained Application Protocol = UDP based XMPP = TCP based
  15. You see where I’m going… I’m going to talk about Oauth 2.0 with some extensions that currently are in the works. These are COSE, CWT, Proof of Possession (POP)
  16. You see where I’m going…
  17. Ephemeral key
  18. Ephemeral key
  19. Ephemeral key
  20. Ephemeral key
  21. Ephemeral key
  22. Ephemeral key
  23. Ephemeral key Csp = communications security protocol
  24. Ephemeral key
  25. Ephemeral key
  26. Ephemeral key
  27. Ephemeral key
  28. Ephemeral key
  29. Ephemeral key
  30. Ephemeral key
  31. cnf = confirmation claim
  32. CBOR Web Token (CWT) (Contrained Binary Representation)