We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byIsabella Fagan
Modified over 2 years ago
The How of OAuth OAuth Hackathon – Six Apart
The How of OAuth or: How I learned to stop worrying and fall in love with Factory Joe
OAuths Goal Website X can access your protected data at API Y – All without sharing your password off-site – especially when there isnt one like with OpenID
OAuth gives you: Signed HTTP Requests Safe, Password-less Token Exchange Signed HTTP Requests Safe, Password-less Token Exchange
The Three Actors User – My Buddy (not me) Service Provider – Chuck E. Cheese Consumer – 10 yr old kids
The Three Tokens Access Tokens – Chuck E. Cheese Tickets Request Tokens – Chuck E. Cheese Tokens Consumer Keys
The Three URLS Request Token Issuer Authorization Page Access Token Exchanger
Building a Consumer
Get a consumer key and secret
Simple enough, eh?
Get a Request Token
Authorize the Request Token
Exchange for an Access Token
Making Authenticated Calls
Building a Service Provider
Data to store Consumers: – key, secret, callback_url Request Token: – token, secret, consumer, authorizing_user Access Token: – token, secret, consumer, user
Issuing Request Tokens Verify using only the consumer credential
Issuing Request Tokens Issue the request token
Authorizing Request Tokens Ask the user to accept the authorization
Authorizing Request Tokens Connecting the logged in user go back to consumer
Exchange for an Access Token Validate using Request Token and Consumer
Exchange for an Access Token Issue the Access Token Destroy the Request Token
Protecting Resources Validate Access Token
OAuth Hackathon – Six Apart
OAuth Phil Wilson, University of Bath, what the? "OAuth provides a way to grant access to your data on some website to a third website, without.
Smartphone-based authorization system Advisor: Dr. Wenjun Zeng - Professor Presenter: Yilihamujiang, Ailiyasijiang Zhou, Guanlong Al-Sinani, H. S. (2011).
OAuth 2.0 By “PJ” (JP on meetup.com) iOS and PHP developer, and occasional lawyer Contact me via:
22 May 2008IVOA Trieste: Grid & Web Services1 Alternate security mechanisms Matthew J. Graham (Caltech, NVO) T HE US N ATIONAL V IRTUAL O BSERVATORY.
Seven Secrets to Success – Library Cards All students need a valid Mesabi Range College Library card. It is required to checkout materials, place Interlibrary.
SAML basics A technical introduction to the Security Assertion Markup Language Eve Maler XML Standards Architect XML Technology Center Sun Microsystems,
The Dirty Little Secret of the Internet Jothy Rosenberg Chief Technology Officer & Co-founder November 2001.
OAuth Security for Gateways Zhenhua (Gerald) Guo and Marlon Pierce Indiana University.
Yahoo! OpenID and OAuth 1 Allen Tom Yahoo! Membership Architect OpenID Foundation Board
Lets build fluency! The people By the water You and I.
FI-WARE Testbed Access Control temporary solution.
Authentication Simon Cross Partner Engineer facebook.com/sicross An Overview.
MCB/Emerald. Name of service: Emerald License in place: country-wide for all university libraries, not-for-profit research and learning institutes within.
By Lilian Marchesoni
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
Can you see?. I like him. When will we go? All or some.
.com Click here to start!here How you can use MySignUp.com.
Stop the Silos: The road to federated RTC Presented by Robin Raymond Chief Architect, Hookflash / OpenPeer.org.
Wireless Connectivity at Pace University Wireless Connectivity is: Available at every Pace location Note: In NY 55 John St. & St. George have wireless.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Presented by: Your Firm Name. Your Firm Name Presented by: Secure Client Portals With NetClient CS secure portals, you can work with us any time, from.
Second Grade Economics Resources - SOL 2.7 Bartering - SOL 2.8 Scarcity - SOL 2.9 By: Barbara Peters.
As some of you may know its not that safe to go online. So we the student council are here to teach you how to be safe online. This is all you need to.
Beginner’s Guide for Students. Contents Page Responding to a FIZX invitation Accepting a FIZX invitation without a wikidot account Creating a wikidot.
MY NCBI (module 4.5). Part 5 – My NCBI Instructions This part of the course is a PowerPoint demonstration intended to give a guided tour of the PubMed.
Different Approaches to Single-Sign-On Jeff Kahn, Verbena Consulting.
Please access our website (www.visaswift.com). Once there please enter your username and password in the Account Holders Login section and click the Login.
Goal Setting – SSRSB * The South Shore Regional School Board is now providing a web based employee portal for its employees. This portal will be.
© 2016 SlidePlayer.com Inc. All rights reserved.