26
ADUG 21-Oct 2013 Grahame Grieve

ADUG 21-Oct 2013 Grahame Grieve

  • Upload
    gali

  • View
    33

  • Download
    0

Embed Size (px)

DESCRIPTION

ADUG 21-Oct 2013 Grahame Grieve. The OAuth Protocol. Allows an application to login users using someone else’s login details (without seeing their password) Protocol is web based Web sites Mobile Applications Desktop Applications. What are User Resources?. User Information Email Address - PowerPoint PPT Presentation

Citation preview

Page 1: ADUG 21-Oct 2013 Grahame Grieve

ADUG 21-Oct 2013Grahame Grieve

Page 2: ADUG 21-Oct 2013 Grahame Grieve
Page 3: ADUG 21-Oct 2013 Grahame Grieve
Page 4: ADUG 21-Oct 2013 Grahame Grieve
Page 5: ADUG 21-Oct 2013 Grahame Grieve
Page 6: ADUG 21-Oct 2013 Grahame Grieve

The OAuth Protocol

• Allows an application to login users using someone else’s login details (without seeing their password)

• Protocol is web based– Web sites– Mobile Applications– Desktop Applications

Page 7: ADUG 21-Oct 2013 Grahame Grieve
Page 8: ADUG 21-Oct 2013 Grahame Grieve

What are User Resources?

• User Information– Email Address– Real world Identifying Information (name, etc)– Google/Facebook friend list

• User specific services– Post to facebook wall– Storage (e.g. DropBox)– Health Care information

Page 9: ADUG 21-Oct 2013 Grahame Grieve

OAuth Parties

• User– User who wants to achieve something

• Service Provider– Can authenticate the user (password etc)– Has things the user owns

• Service Consumer– Needs to use User’s resources (e.g. for the user)– Trusted by the service provider and the user

Page 10: ADUG 21-Oct 2013 Grahame Grieve
Page 11: ADUG 21-Oct 2013 Grahame Grieve

OAuth Parties

• User– User who wants to achieve something

• Service Provider– Can authenticate the user (password etc)– Has things the user owns

• Service Consumer– Needs to use User’s resources (e.g. for the user)– Trusted by the service provider and the user

Page 12: ADUG 21-Oct 2013 Grahame Grieve

Authorization vs Authentication

• Service Consumer doesn’t know who the user is

• Just knows that the Service Provider authorises the consumer to do things on behalf of anonymous user

• Which may include identifying information… if service provider authenticated the user

Page 13: ADUG 21-Oct 2013 Grahame Grieve

OAuth Example

• Desktop Application

• Allows user to load/save application configuration to their Dropbox store

Page 14: ADUG 21-Oct 2013 Grahame Grieve
Page 15: ADUG 21-Oct 2013 Grahame Grieve
Page 16: ADUG 21-Oct 2013 Grahame Grieve
Page 17: ADUG 21-Oct 2013 Grahame Grieve
Page 18: ADUG 21-Oct 2013 Grahame Grieve
Page 19: ADUG 21-Oct 2013 Grahame Grieve
Page 20: ADUG 21-Oct 2013 Grahame Grieve
Page 21: ADUG 21-Oct 2013 Grahame Grieve
Page 22: ADUG 21-Oct 2013 Grahame Grieve
Page 23: ADUG 21-Oct 2013 Grahame Grieve
Page 24: ADUG 21-Oct 2013 Grahame Grieve
Page 25: ADUG 21-Oct 2013 Grahame Grieve

OAuth Pro’s & Cons

• Delegate User Authentication problems

• Well understood protocol

• Amazing services on offer

• Relatively Simple API

• Each implementation differs – it’s a technique

• Documentation confusing and byzantine

• Errors obtuse and misleading

• Not a full solution yet

Page 26: ADUG 21-Oct 2013 Grahame Grieve

http://www.healthintersections.com.au/?p=1554