SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Na#ve	
  Single	
  SignOn	
  
Interop	
  Demonstra#on	
  
	
  
Cloud	
  Iden#ty	
  Summit	
  2013	
  
1
Mo#va#on	
  
•  Enterprise	
  employees	
  use	
  mul#ple	
  applica#ons	
  
(combo	
  of	
  web	
  &	
  na#ve)	
  in	
  their	
  jobs	
  
•  Applica#ons	
  both	
  hosted	
  on-­‐prem	
  &	
  SaaS	
  
•  Current	
  reality	
  is	
  that	
  an	
  SSO	
  experience	
  limited	
  
to	
  the	
  browser	
  apps	
  
•  But	
  na#ve	
  applica#ons	
  becoming	
  more	
  and	
  more	
  
prevalent	
  
•  Poten#ally	
  significant	
  usability	
  burden	
  for	
  
employees	
  	
  	
  
Default	
  OAuth	
  paNern	
  for	
  na#ve	
  
applica#ons	
  
•  Employee	
  authen#ca#on/authorizes	
  each	
  
applica#on	
  individually	
  
•  Authoriza#on	
  manifested	
  as	
  the	
  issuance	
  of	
  
an	
  OAuth	
  token	
  to	
  each	
  na#ve	
  app	
  –	
  this	
  
presented	
  on	
  subsequent	
  API	
  calls	
  to	
  
corresponding	
  server	
  
•  Employee	
  interacts	
  with	
  each	
  OAuth	
  AS	
  
(corresponding	
  to	
  each	
  API)	
  to	
  obtain	
  an	
  
OAuth	
  token	
  
Implica#ons	
  of	
  default	
  paNern	
  
•  Employee	
  bears	
  burden	
  of	
  authen#ca#ng/
authorizing	
  each	
  na#ve	
  applica#on	
  separately	
  
•  Even	
  if	
  done	
  infrequently,	
  may	
  be	
  
unacceptable	
  
•  Each	
  SaaS	
  must	
  directly	
  support	
  OAuth	
  
(running	
  an	
  Authoriza#on	
  Server)	
  
•  Enterprise	
  distanced	
  from	
  employee's	
  use	
  of	
  
na#ve	
  applica#ons	
  
Na#ve	
  App	
  SSO	
  Alterna#ve	
  
•  An	
  employee	
  is	
  able	
  to	
  collec#vely	
  authorize	
  each	
  na#ve	
  
applica#on	
  on	
  device	
  in	
  one	
  step	
  
•  Rather	
  than	
  each	
  applica#on	
  individually	
  obtaining	
  OAuth	
  
tokens	
  for	
  itself	
  the	
  tokens	
  are	
  obtained	
  on	
  behalf	
  of	
  those	
  
na#ve	
  applica#ons	
  by	
  a	
  dedicated	
  'authoriza#on	
  agent'	
  (AZA)	
  
•  Employee	
  authorizes	
  the	
  AZA,	
  which	
  then	
  proceeds	
  to	
  obtain	
  for	
  
other	
  applica#ons	
  the	
  necessary	
  access	
  tokens	
  
•  Once	
  handed	
  the	
  tokens,	
  na#ve	
  applica#ons	
  use	
  them	
  as	
  
normal	
  on	
  API	
  calls	
  
•  For	
  user,	
  enables	
  an	
  SSO	
  experience	
  for	
  na#ve	
  applica#ons	
  
AZA	
  Alterna#ve	
  
	
  
	
  
6
Enterprise	
  
SaaS	
  
Device	
  
Browser	
   Na#ve	
  SaaS	
  
SaaS2	
  
Na#ve	
  SaaS2	
  
AS	
  
AS	
  
Client	
   Client	
  AZA	
  
AZA	
  Alterna#ve	
  
	
  
	
  
7
Enterprise	
  
SaaS	
  
Device	
  
Browser	
   Na#ve	
  SaaS	
  
SaaS2	
  
Na#ve	
  SaaS2	
  
AS	
  
AS	
  
Client	
   Client	
  AZA	
  
AS	
  
SaaS	
  
AZA	
  Alterna#ve	
  
	
  
	
  
8
Enterprise	
  
Device	
  
Browser	
  
AZA	
  
AS	
  
Browser	
   Na#ve	
  	
  
SaaS	
  AZA	
  
Na#ve	
  	
  
SaaS2	
  
SaaS2	
  
Alterna#ve	
  
	
  
	
  
9
Enterprise	
  
Device	
  
Browser	
   Na#ve	
  	
  
SaaS	
  
SaaS	
  
AZA	
  
Na#ve	
  	
  
SaaS2	
  
SaaS2	
  AS	
  
Implica#ons	
  
1.  Na#ve	
  apps	
  must	
  be	
  able	
  to	
  request	
  access	
  
tokens	
  of	
  a	
  local	
  AZA	
  
2.  AZA	
  must	
  be	
  able	
  to	
  request	
  access	
  tokens	
  
on	
  behalf	
  of	
  another	
  na#ve	
  applica#on	
  
3.  AZA	
  must	
  be	
  able	
  to	
  hand	
  over	
  access	
  tokens	
  
to	
  na#ve	
  applica#on	
  
4.  RS	
  must	
  be	
  able	
  to	
  validate	
  access	
  tokens	
  
(poten#ally	
  issued	
  by	
  a	
  remote	
  AS)	
  
10
Standardiza#on	
  
•  Mul#ple	
  pieces	
  (from	
  different	
  providers)	
  
implies	
  need	
  for	
  standards	
  
•  A	
  number	
  of	
  industry	
  players	
  working	
  to	
  
profile/extend	
  OpenID	
  Connect	
  for	
  the	
  AZA<-­‐
>AS	
  interac#on	
  
– New	
  WG	
  being	
  formed	
  in	
  OpenID	
  Founda#on	
  
•  Related	
  but	
  separate	
  effort	
  to	
  standardize	
  
App<-­‐>	
  AZA	
  messaging	
  emerging	
  
Interoperability	
  
•  We	
  are	
  demonstra#ng	
  interoperability	
  
between	
  different	
  AZAs,	
  OAuth	
  ASs,	
  na#ve	
  
applica#ons,	
  and	
  OAuth	
  RSs	
  	
  
•  The	
  AZA<-­‐>AS	
  protocol	
  is	
  based	
  on	
  OAuth	
  (not	
  
the	
  eventual	
  OIDC-­‐based	
  standard)	
  
•  MobileIron	
  &	
  Ping	
  also	
  implemented	
  a	
  back-­‐
channel	
  authoriza#on	
  query	
  interface	
  
12
Interop	
  Par#cipants	
  
13
Interop	
  Scenarios	
  
14
AZA	
  
AS	
  
AZA	
   AZA	
  
AS	
  

Mais conteúdo relacionado

Mais procurados

Extensible API Management
Extensible API ManagementExtensible API Management
Extensible API Management
WSO2
 
Patterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSOPatterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSO
WSO2
 

Mais procurados (20)

Intuit QuickBooks Payments API
Intuit QuickBooks Payments APIIntuit QuickBooks Payments API
Intuit QuickBooks Payments API
 
Mobile Devices in the Enterprise: What IT needs to know
Mobile Devices in the Enterprise: What IT needs to knowMobile Devices in the Enterprise: What IT needs to know
Mobile Devices in the Enterprise: What IT needs to know
 
LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
SAP certified Add-on of Intelligent Decision Dimensions powered by SAP Conver...
SAP certified Add-on of Intelligent Decision Dimensions powered by SAP Conver...SAP certified Add-on of Intelligent Decision Dimensions powered by SAP Conver...
SAP certified Add-on of Intelligent Decision Dimensions powered by SAP Conver...
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
 
How APIs Can Be Secured in Mobile Environments
How APIs Can Be Secured in Mobile EnvironmentsHow APIs Can Be Secured in Mobile Environments
How APIs Can Be Secured in Mobile Environments
 
Extensible API Management
Extensible API ManagementExtensible API Management
Extensible API Management
 
Mobile_app_security
Mobile_app_securityMobile_app_security
Mobile_app_security
 
Qark DefCon 23
Qark DefCon 23Qark DefCon 23
Qark DefCon 23
 
Azetone: Mobile A/B Testing & Personalization
Azetone: Mobile A/B Testing & Personalization Azetone: Mobile A/B Testing & Personalization
Azetone: Mobile A/B Testing & Personalization
 
Sencha Space review
Sencha Space reviewSencha Space review
Sencha Space review
 
Fluig - Identity
Fluig - IdentityFluig - Identity
Fluig - Identity
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Meet the Forge Runtime
Meet the Forge RuntimeMeet the Forge Runtime
Meet the Forge Runtime
 
Building Mobile Apps With Xamarin and Visual Studio App Center
Building Mobile Apps With Xamarin and Visual Studio App CenterBuilding Mobile Apps With Xamarin and Visual Studio App Center
Building Mobile Apps With Xamarin and Visual Studio App Center
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConference
 
Patterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSOPatterns and Practices in Mobile SSO
Patterns and Practices in Mobile SSO
 

Destaque

Safeguarding our Heritage for our Grandchildren - Can UNESCO help?
Safeguarding our Heritage for our Grandchildren - Can UNESCO help?Safeguarding our Heritage for our Grandchildren - Can UNESCO help?
Safeguarding our Heritage for our Grandchildren - Can UNESCO help?
InfoAndina CONDESAN
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
HasiniG
 

Destaque (10)

Safeguarding our Heritage for our Grandchildren - Can UNESCO help?
Safeguarding our Heritage for our Grandchildren - Can UNESCO help?Safeguarding our Heritage for our Grandchildren - Can UNESCO help?
Safeguarding our Heritage for our Grandchildren - Can UNESCO help?
 
CIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud Identity
 
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTIONIAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
 
Design and social responsibility, industrial heritage
Design and social responsibility, industrial heritageDesign and social responsibility, industrial heritage
Design and social responsibility, industrial heritage
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Securing and Scaling SaaS
Securing and Scaling SaaSSecuring and Scaling SaaS
Securing and Scaling SaaS
 
Denver Startup Week '15: Mobile SSO
Denver Startup Week '15: Mobile SSODenver Startup Week '15: Mobile SSO
Denver Startup Week '15: Mobile SSO
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity Service
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Moving To SaaS
Moving To SaaSMoving To SaaS
Moving To SaaS
 

Semelhante a CIS13: Authorization Agent (AZA) Mobile Protocol

Pradeep Kumar _Profile
Pradeep Kumar _ProfilePradeep Kumar _Profile
Pradeep Kumar _Profile
Pradeep Kumar
 
Enterprise API Adoption Patterns
Enterprise API Adoption PatternsEnterprise API Adoption Patterns
Enterprise API Adoption Patterns
Akana
 
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaSBuilding Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
Sameera Jayasoma
 
Generating Insights from WSO2 API Manager Statistics
Generating Insights from WSO2 API Manager StatisticsGenerating Insights from WSO2 API Manager Statistics
Generating Insights from WSO2 API Manager Statistics
WSO2
 
The Business Value for Internal APIs in the Enterprise
The Business Value for Internal APIs in the EnterpriseThe Business Value for Internal APIs in the Enterprise
The Business Value for Internal APIs in the Enterprise
Akana
 

Semelhante a CIS13: Authorization Agent (AZA) Mobile Protocol (20)

Iam f42 b
Iam f42 bIam f42 b
Iam f42 b
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
 
Pre-Con Ed: How to Provide Mobile Users With a Convenient, Yet Secure, Sessio...
Pre-Con Ed: How to Provide Mobile Users With a Convenient, Yet Secure, Sessio...Pre-Con Ed: How to Provide Mobile Users With a Convenient, Yet Secure, Sessio...
Pre-Con Ed: How to Provide Mobile Users With a Convenient, Yet Secure, Sessio...
 
Pradeep Kumar _Profile
Pradeep Kumar _ProfilePradeep Kumar _Profile
Pradeep Kumar _Profile
 
WSO2 Product Release Webinar - WSO2 API Manager 1.9
WSO2 Product Release Webinar - WSO2 API Manager 1.9WSO2 Product Release Webinar - WSO2 API Manager 1.9
WSO2 Product Release Webinar - WSO2 API Manager 1.9
 
Enterprise API Adoption Patterns
Enterprise API Adoption PatternsEnterprise API Adoption Patterns
Enterprise API Adoption Patterns
 
Enterprise API Adoption Patterns
Enterprise API Adoption PatternsEnterprise API Adoption Patterns
Enterprise API Adoption Patterns
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
 
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaSBuilding Multi-tenant SaaS Applications using WSO2 Private PaaS
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
 
Generating Insights from WSO2 API Manager Statistics
Generating Insights from WSO2 API Manager StatisticsGenerating Insights from WSO2 API Manager Statistics
Generating Insights from WSO2 API Manager Statistics
 
Software as a service (saa s) or opensource which is right for you
Software as a service (saa s) or opensource   which is right for youSoftware as a service (saa s) or opensource   which is right for you
Software as a service (saa s) or opensource which is right for you
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
 
MuleSoft London Community October 2017 - Hybrid and SAP Integration
MuleSoft London Community October 2017 - Hybrid and SAP IntegrationMuleSoft London Community October 2017 - Hybrid and SAP Integration
MuleSoft London Community October 2017 - Hybrid and SAP Integration
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
 
ShepHertz - A Complete Cloud Ecosystem for your Apps
ShepHertz - A Complete Cloud Ecosystem for your AppsShepHertz - A Complete Cloud Ecosystem for your Apps
ShepHertz - A Complete Cloud Ecosystem for your Apps
 
Office 365 and Cloud Identity – What Does It Mean For Me?
Office 365 and Cloud Identity – What Does It Mean For Me?Office 365 and Cloud Identity – What Does It Mean For Me?
Office 365 and Cloud Identity – What Does It Mean For Me?
 
SAP Single Sign-On 2.0 Overview
SAP Single Sign-On 2.0 OverviewSAP Single Sign-On 2.0 Overview
SAP Single Sign-On 2.0 Overview
 
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf ItalyAdvanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
 
The Business Value for Internal APIs in the Enterprise
The Business Value for Internal APIs in the EnterpriseThe Business Value for Internal APIs in the Enterprise
The Business Value for Internal APIs in the Enterprise
 
The Business Value for Internal APIs in the Enterprise
The Business Value for Internal APIs in the EnterpriseThe Business Value for Internal APIs in the Enterprise
The Business Value for Internal APIs in the Enterprise
 

Mais de CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

Mais de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

CIS13: Authorization Agent (AZA) Mobile Protocol

  • 1. Na#ve  Single  SignOn   Interop  Demonstra#on     Cloud  Iden#ty  Summit  2013   1
  • 2. Mo#va#on   •  Enterprise  employees  use  mul#ple  applica#ons   (combo  of  web  &  na#ve)  in  their  jobs   •  Applica#ons  both  hosted  on-­‐prem  &  SaaS   •  Current  reality  is  that  an  SSO  experience  limited   to  the  browser  apps   •  But  na#ve  applica#ons  becoming  more  and  more   prevalent   •  Poten#ally  significant  usability  burden  for   employees      
  • 3. Default  OAuth  paNern  for  na#ve   applica#ons   •  Employee  authen#ca#on/authorizes  each   applica#on  individually   •  Authoriza#on  manifested  as  the  issuance  of   an  OAuth  token  to  each  na#ve  app  –  this   presented  on  subsequent  API  calls  to   corresponding  server   •  Employee  interacts  with  each  OAuth  AS   (corresponding  to  each  API)  to  obtain  an   OAuth  token  
  • 4. Implica#ons  of  default  paNern   •  Employee  bears  burden  of  authen#ca#ng/ authorizing  each  na#ve  applica#on  separately   •  Even  if  done  infrequently,  may  be   unacceptable   •  Each  SaaS  must  directly  support  OAuth   (running  an  Authoriza#on  Server)   •  Enterprise  distanced  from  employee's  use  of   na#ve  applica#ons  
  • 5. Na#ve  App  SSO  Alterna#ve   •  An  employee  is  able  to  collec#vely  authorize  each  na#ve   applica#on  on  device  in  one  step   •  Rather  than  each  applica#on  individually  obtaining  OAuth   tokens  for  itself  the  tokens  are  obtained  on  behalf  of  those   na#ve  applica#ons  by  a  dedicated  'authoriza#on  agent'  (AZA)   •  Employee  authorizes  the  AZA,  which  then  proceeds  to  obtain  for   other  applica#ons  the  necessary  access  tokens   •  Once  handed  the  tokens,  na#ve  applica#ons  use  them  as   normal  on  API  calls   •  For  user,  enables  an  SSO  experience  for  na#ve  applica#ons  
  • 6. AZA  Alterna#ve       6 Enterprise   SaaS   Device   Browser   Na#ve  SaaS   SaaS2   Na#ve  SaaS2   AS   AS   Client   Client  AZA  
  • 7. AZA  Alterna#ve       7 Enterprise   SaaS   Device   Browser   Na#ve  SaaS   SaaS2   Na#ve  SaaS2   AS   AS   Client   Client  AZA   AS  
  • 8. SaaS   AZA  Alterna#ve       8 Enterprise   Device   Browser   AZA   AS   Browser   Na#ve     SaaS  AZA   Na#ve     SaaS2   SaaS2  
  • 9. Alterna#ve       9 Enterprise   Device   Browser   Na#ve     SaaS   SaaS   AZA   Na#ve     SaaS2   SaaS2  AS  
  • 10. Implica#ons   1.  Na#ve  apps  must  be  able  to  request  access   tokens  of  a  local  AZA   2.  AZA  must  be  able  to  request  access  tokens   on  behalf  of  another  na#ve  applica#on   3.  AZA  must  be  able  to  hand  over  access  tokens   to  na#ve  applica#on   4.  RS  must  be  able  to  validate  access  tokens   (poten#ally  issued  by  a  remote  AS)   10
  • 11. Standardiza#on   •  Mul#ple  pieces  (from  different  providers)   implies  need  for  standards   •  A  number  of  industry  players  working  to   profile/extend  OpenID  Connect  for  the  AZA<-­‐ >AS  interac#on   – New  WG  being  formed  in  OpenID  Founda#on   •  Related  but  separate  effort  to  standardize   App<-­‐>  AZA  messaging  emerging  
  • 12. Interoperability   •  We  are  demonstra#ng  interoperability   between  different  AZAs,  OAuth  ASs,  na#ve   applica#ons,  and  OAuth  RSs     •  The  AZA<-­‐>AS  protocol  is  based  on  OAuth  (not   the  eventual  OIDC-­‐based  standard)   •  MobileIron  &  Ping  also  implemented  a  back-­‐ channel  authoriza#on  query  interface   12
  • 14. Interop  Scenarios   14 AZA   AS   AZA   AZA   AS