SlideShare a Scribd company logo
1 of 35
Download to read offline
Securing APIs With WSO2 Identity Server
Thursday, November 05, 2020
Hello!
Janak Amarasena
Isura Karunaratne
Senior Software Engineer
isura@wso2.com
janak@wso2.com
Technical Lead
About ‘API Security and Beyond’ Webinar Series
3
4
Addresses full API lifecycle
management operations. Open,
extensible, customizable.
200K+ APIs for 20K+ Orgs
Hybrid integration platform for
quick, iterative integration of any
application, data, or system.
6 Trillion Transactions/yr
Federates and manages identities
across both cloud service and
enterprise environments.
250M+ identities managed
WSO2 API MANAGER WSO2 IDENTITY SERVERWSO2 ENTERPRISE INTEGRATOR
WSO2 Integration Platform
5
WSO2 Identity Server is a strong performer
among the 13 CIAM providers that matter
most according to Forrester Research, Inc..
● Highest scores possible in customer
authentication, self service, business
integration, reporting and dashboarding, and
privacy & consent management in the
Product Offering category
● Highest scores for commercial model in
strategy and authentication plans
WSO2 Identity Server has been recognized as a strong performer
API Economy
100% of revenue comes
through API calls
Source
https://www.information-age.com/organisations-advantage-api-economy-123485729/
APIs and API Economy
7
Akamai Survey Report 2019
“Our survey of API traffic surprised us by revealing that 83% of the
hits we see there are API driven. ”
“For security practitioners, this is vitally important.”
Source -
(https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/state-of-the-internet-security-retail-attacks-and-api-traffic-report-2
019.pdf)
APIs and API Economy
8
Importance of API security
APIs will become the
#1 Attack vector by 2022
10
● Facebook Security breach
⦾ 50 million affected users
● Google plus security breach
⦾ Over 50 million affected users
● An average Application or API has 26.7 vulnerabilities.
● 81% of confirmed data breaches have used stolen valid credentials.
Importance of API security
11
Source -
(https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html, https://www.wired.com/story/google-plus-bug-52-million-users-data-exposed,
https://techbeacon.com/app-dev-testing/post-equifax-why-api-security-should-be-priority)
Failure of API security can affect on
● Operation level disruptions
● Negative publicity
● Legal problems
● Repeat attacks
Importance of API security
12
Role of API Key Manager
Role of API Key Manager
14
Introduction to WSO2 Identity Server
16
Key Capabilities
● Identity federation and SSO
● Identity bridging
● MFA and adaptive authentication
● Managing access to APIs
● Fine-grained access control
● Consent management
● Accounts management
● Progressive profiling
● RESTful APIs for integration
● Regulatory compliance
● Identity analytics
WSO2 Identity Server Capabilities
17
Key Capabilities
● Extended Access Delegation Capabilities
● Strong and Adaptive Authentication
● Cross Protocol Single Sign-On / Sign-Out
● Enforce authorization
● End-User Identity Management
● Privacy management
Why IAM is important in API Management
API Security capabilities of WSO2
Identity Server
Leveraging OAuth 2.0 capabilities
● Generating access tokens with various grant types and flows
⦿ Authorization Code grant
⦿ Client Credentials grant
⦿ Implicit grant | Discouraged in OAuth 2.0 Security BCP document
⦿ Password grant | Deprecated in OAuth 2.0 Security BCP document
⦿ JWT Bearer grant
⦿ SAML2 Bearer grant
⦿ OIDC hybrid flow
⦿ Several other grant types and flows
⦿ Extension points to easily deploy custom grants and flows
● Support for security best practices
⦿ PKCE flow for authorization code grant
⦿ Refresh token rotation
⦿ Encryption/Hashing of client secret
19
Leveraging OAuth 2.0 capabilities contd.
● Token introspection
⦿ Checking the validity of the token received to the API Gateway
● Revoking tokens
⦿ Supports token revocation via standard API
⦿ Auto token revocation when a user state changes (locked, deleted, credential
change, etc)
⦿ Auto token revocation when a application state changes (disabled, deleted, etc.)
⦿ Extension points to add token revocation based on events
⦿ Firing events when token revocation happens
20
Easy integration of capabilities
● Fully API enabled
⦿ Support for standard APIs
● Service discovery via standard APIs
⦿ Webfinger
⦿ Discovery
⦿ JWKS
● DCR and DCRM API support for client application registration and
management via APIs
21
Scope validation
● Scope is a mechanism in OAuth 2.0 to limit the application's access to a user's
protected resources
● Able to define scope validators to validate the scopes being assigned to a
access token
● OOTB scope validators
⦿ Roles based
⦿ XACML based
● Extension point to easily deploy a custom scope validator
● REST API to manage scopes
22
Fine-grained access control
● Includes a fully fledged XACML engine
● API enabled. Invoke XACML policy checks via APIs.
● Integration support with a Open Policy Agent(OPA) engine for policy evaluation
at user authentication for token generation
23
Event notifications and extensibility
● Eventing framework that fires events
⦿ Several examples;
⦾ Alerts on user such claim updates
⦾ Alerts on user getting locked
● Extension points to easily deploy event listeners to listen on required events
and relay information to the API Manager
⦾ Ex: Clear gateway token related cache when a token revocation happens
● Extension points to add custom components and extend product capabilities
according to business needs
⦿ Several examples;
⦾ Adding a custom token type
⦾ Adding custom token validation at introspection
⦾ Introducing a new grant type
24
Demo
Setup
26
Scenario 01 - Secured API calls
Generate an access token with user John using the Authorization Code grant to
make a secured API call
● Generate a token
● Invoke introspection endpoint
● Invoke the [GET] /menu API
27
Scenario 02 - Implicit token revocation
Update user Johns’ credentials and try to invoke a API with the previously generated
token
● Invoke introspection endpoint
● Update user Johns’ credentials
● Invoke the [GET] /menu API
● Invoke introspection endpoint
28
Scenario 03 - Role based scope validation
Obtain a token with the “add” scope to call the [POST]/order API
● Check role required for the scope “add”
● Try to generate a token with user John
● Generate a token with user Jane
● Invoke the [POST] /order API
29
Scenario 04 - Explicit token revocation
Call the OAuth token revocation endpoint and revoke an access token
● Invoke introspection endpoint
● Invoke token revocation endpoint
● Invoke the [POST] /order API
● Invoke introspection endpoint
30
Scenario 05 - Fine-grained access control with XACML
Invoke the XACML policy decision point for a [POST]/order API call
● XACML configuration
● Generate an access token with client credentials grant
● Invoke XACML PDP
31
Let’s Recap
32
● API Economy
● Importance of API security
● Role of API Key Manager
● Introduction to WSO2 Identity Server
● API Security capabilities of WSO2 Identity Server
● Demo
Question Time!
33
Next in the Series
34
wso2.com
Thanks!

More Related Content

More from WSO2

CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfWSO2
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoWSO2
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsWSO2
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital BusinessesWSO2
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)WSO2
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformationWSO2
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesWSO2
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready BankWSO2
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIsWSO2
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native DeploymentWSO2
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”WSO2
 
API Revisions - WSO2 API Manager Community Call (10/27/2021)
API Revisions - WSO2 API Manager Community Call (10/27/2021)API Revisions - WSO2 API Manager Community Call (10/27/2021)
API Revisions - WSO2 API Manager Community Call (10/27/2021)WSO2
 
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...WSO2
 
[ICT Spring 2021] - Managed Crowd: The Future of Business as We Know It!
[ICT Spring 2021] - Managed Crowd: The Future of Business as We Know It![ICT Spring 2021] - Managed Crowd: The Future of Business as We Know It!
[ICT Spring 2021] - Managed Crowd: The Future of Business as We Know It!WSO2
 
[EIC 2021] Securing the Digital Double - The Path to a Trusted Digital Ecosystem
[EIC 2021] Securing the Digital Double - The Path to a Trusted Digital Ecosystem[EIC 2021] Securing the Digital Double - The Path to a Trusted Digital Ecosystem
[EIC 2021] Securing the Digital Double - The Path to a Trusted Digital EcosystemWSO2
 
[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAM[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAMWSO2
 
CSV and JSON Transformation in WSO2 Micro Integrator 4.0 - WSO2 APIM Communit...
CSV and JSON Transformation in WSO2 Micro Integrator 4.0 - WSO2 APIM Communit...CSV and JSON Transformation in WSO2 Micro Integrator 4.0 - WSO2 APIM Communit...
CSV and JSON Transformation in WSO2 Micro Integrator 4.0 - WSO2 APIM Communit...WSO2
 
[apidays Live Australia] How does leveraging de-centralised architecture impr...
[apidays Live Australia] How does leveraging de-centralised architecture impr...[apidays Live Australia] How does leveraging de-centralised architecture impr...
[apidays Live Australia] How does leveraging de-centralised architecture impr...WSO2
 
[apidays Live Australia] How do you enhance customer experience through event...
[apidays Live Australia] How do you enhance customer experience through event...[apidays Live Australia] How do you enhance customer experience through event...
[apidays Live Australia] How do you enhance customer experience through event...WSO2
 

More from WSO2 (20)

CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdf
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing Choreo
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected Products
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital Businesses
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformation
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking Experiences
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready Bank
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
 
API Revisions - WSO2 API Manager Community Call (10/27/2021)
API Revisions - WSO2 API Manager Community Call (10/27/2021)API Revisions - WSO2 API Manager Community Call (10/27/2021)
API Revisions - WSO2 API Manager Community Call (10/27/2021)
 
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
 
[ICT Spring 2021] - Managed Crowd: The Future of Business as We Know It!
[ICT Spring 2021] - Managed Crowd: The Future of Business as We Know It![ICT Spring 2021] - Managed Crowd: The Future of Business as We Know It!
[ICT Spring 2021] - Managed Crowd: The Future of Business as We Know It!
 
[EIC 2021] Securing the Digital Double - The Path to a Trusted Digital Ecosystem
[EIC 2021] Securing the Digital Double - The Path to a Trusted Digital Ecosystem[EIC 2021] Securing the Digital Double - The Path to a Trusted Digital Ecosystem
[EIC 2021] Securing the Digital Double - The Path to a Trusted Digital Ecosystem
 
[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAM[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAM
 
CSV and JSON Transformation in WSO2 Micro Integrator 4.0 - WSO2 APIM Communit...
CSV and JSON Transformation in WSO2 Micro Integrator 4.0 - WSO2 APIM Communit...CSV and JSON Transformation in WSO2 Micro Integrator 4.0 - WSO2 APIM Communit...
CSV and JSON Transformation in WSO2 Micro Integrator 4.0 - WSO2 APIM Communit...
 
[apidays Live Australia] How does leveraging de-centralised architecture impr...
[apidays Live Australia] How does leveraging de-centralised architecture impr...[apidays Live Australia] How does leveraging de-centralised architecture impr...
[apidays Live Australia] How does leveraging de-centralised architecture impr...
 
[apidays Live Australia] How do you enhance customer experience through event...
[apidays Live Australia] How do you enhance customer experience through event...[apidays Live Australia] How do you enhance customer experience through event...
[apidays Live Australia] How do you enhance customer experience through event...
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Securing APIs With WSO2 Identity Server

  • 1. Securing APIs With WSO2 Identity Server Thursday, November 05, 2020
  • 2. Hello! Janak Amarasena Isura Karunaratne Senior Software Engineer isura@wso2.com janak@wso2.com Technical Lead
  • 3. About ‘API Security and Beyond’ Webinar Series 3
  • 4. 4 Addresses full API lifecycle management operations. Open, extensible, customizable. 200K+ APIs for 20K+ Orgs Hybrid integration platform for quick, iterative integration of any application, data, or system. 6 Trillion Transactions/yr Federates and manages identities across both cloud service and enterprise environments. 250M+ identities managed WSO2 API MANAGER WSO2 IDENTITY SERVERWSO2 ENTERPRISE INTEGRATOR WSO2 Integration Platform
  • 5. 5 WSO2 Identity Server is a strong performer among the 13 CIAM providers that matter most according to Forrester Research, Inc.. ● Highest scores possible in customer authentication, self service, business integration, reporting and dashboarding, and privacy & consent management in the Product Offering category ● Highest scores for commercial model in strategy and authentication plans WSO2 Identity Server has been recognized as a strong performer
  • 7. 100% of revenue comes through API calls Source https://www.information-age.com/organisations-advantage-api-economy-123485729/ APIs and API Economy 7
  • 8. Akamai Survey Report 2019 “Our survey of API traffic surprised us by revealing that 83% of the hits we see there are API driven. ” “For security practitioners, this is vitally important.” Source - (https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/state-of-the-internet-security-retail-attacks-and-api-traffic-report-2 019.pdf) APIs and API Economy 8
  • 9. Importance of API security
  • 10. APIs will become the #1 Attack vector by 2022 10
  • 11. ● Facebook Security breach ⦾ 50 million affected users ● Google plus security breach ⦾ Over 50 million affected users ● An average Application or API has 26.7 vulnerabilities. ● 81% of confirmed data breaches have used stolen valid credentials. Importance of API security 11 Source - (https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html, https://www.wired.com/story/google-plus-bug-52-million-users-data-exposed, https://techbeacon.com/app-dev-testing/post-equifax-why-api-security-should-be-priority)
  • 12. Failure of API security can affect on ● Operation level disruptions ● Negative publicity ● Legal problems ● Repeat attacks Importance of API security 12
  • 13. Role of API Key Manager
  • 14. Role of API Key Manager 14
  • 15. Introduction to WSO2 Identity Server
  • 16. 16 Key Capabilities ● Identity federation and SSO ● Identity bridging ● MFA and adaptive authentication ● Managing access to APIs ● Fine-grained access control ● Consent management ● Accounts management ● Progressive profiling ● RESTful APIs for integration ● Regulatory compliance ● Identity analytics WSO2 Identity Server Capabilities
  • 17. 17 Key Capabilities ● Extended Access Delegation Capabilities ● Strong and Adaptive Authentication ● Cross Protocol Single Sign-On / Sign-Out ● Enforce authorization ● End-User Identity Management ● Privacy management Why IAM is important in API Management
  • 18. API Security capabilities of WSO2 Identity Server
  • 19. Leveraging OAuth 2.0 capabilities ● Generating access tokens with various grant types and flows ⦿ Authorization Code grant ⦿ Client Credentials grant ⦿ Implicit grant | Discouraged in OAuth 2.0 Security BCP document ⦿ Password grant | Deprecated in OAuth 2.0 Security BCP document ⦿ JWT Bearer grant ⦿ SAML2 Bearer grant ⦿ OIDC hybrid flow ⦿ Several other grant types and flows ⦿ Extension points to easily deploy custom grants and flows ● Support for security best practices ⦿ PKCE flow for authorization code grant ⦿ Refresh token rotation ⦿ Encryption/Hashing of client secret 19
  • 20. Leveraging OAuth 2.0 capabilities contd. ● Token introspection ⦿ Checking the validity of the token received to the API Gateway ● Revoking tokens ⦿ Supports token revocation via standard API ⦿ Auto token revocation when a user state changes (locked, deleted, credential change, etc) ⦿ Auto token revocation when a application state changes (disabled, deleted, etc.) ⦿ Extension points to add token revocation based on events ⦿ Firing events when token revocation happens 20
  • 21. Easy integration of capabilities ● Fully API enabled ⦿ Support for standard APIs ● Service discovery via standard APIs ⦿ Webfinger ⦿ Discovery ⦿ JWKS ● DCR and DCRM API support for client application registration and management via APIs 21
  • 22. Scope validation ● Scope is a mechanism in OAuth 2.0 to limit the application's access to a user's protected resources ● Able to define scope validators to validate the scopes being assigned to a access token ● OOTB scope validators ⦿ Roles based ⦿ XACML based ● Extension point to easily deploy a custom scope validator ● REST API to manage scopes 22
  • 23. Fine-grained access control ● Includes a fully fledged XACML engine ● API enabled. Invoke XACML policy checks via APIs. ● Integration support with a Open Policy Agent(OPA) engine for policy evaluation at user authentication for token generation 23
  • 24. Event notifications and extensibility ● Eventing framework that fires events ⦿ Several examples; ⦾ Alerts on user such claim updates ⦾ Alerts on user getting locked ● Extension points to easily deploy event listeners to listen on required events and relay information to the API Manager ⦾ Ex: Clear gateway token related cache when a token revocation happens ● Extension points to add custom components and extend product capabilities according to business needs ⦿ Several examples; ⦾ Adding a custom token type ⦾ Adding custom token validation at introspection ⦾ Introducing a new grant type 24
  • 25. Demo
  • 27. Scenario 01 - Secured API calls Generate an access token with user John using the Authorization Code grant to make a secured API call ● Generate a token ● Invoke introspection endpoint ● Invoke the [GET] /menu API 27
  • 28. Scenario 02 - Implicit token revocation Update user Johns’ credentials and try to invoke a API with the previously generated token ● Invoke introspection endpoint ● Update user Johns’ credentials ● Invoke the [GET] /menu API ● Invoke introspection endpoint 28
  • 29. Scenario 03 - Role based scope validation Obtain a token with the “add” scope to call the [POST]/order API ● Check role required for the scope “add” ● Try to generate a token with user John ● Generate a token with user Jane ● Invoke the [POST] /order API 29
  • 30. Scenario 04 - Explicit token revocation Call the OAuth token revocation endpoint and revoke an access token ● Invoke introspection endpoint ● Invoke token revocation endpoint ● Invoke the [POST] /order API ● Invoke introspection endpoint 30
  • 31. Scenario 05 - Fine-grained access control with XACML Invoke the XACML policy decision point for a [POST]/order API call ● XACML configuration ● Generate an access token with client credentials grant ● Invoke XACML PDP 31
  • 32. Let’s Recap 32 ● API Economy ● Importance of API security ● Role of API Key Manager ● Introduction to WSO2 Identity Server ● API Security capabilities of WSO2 Identity Server ● Demo
  • 34. Next in the Series 34