Download - ADUG 21-Oct 2013 Grahame Grieve

Transcript
Page 1: ADUG 21-Oct 2013 Grahame Grieve

ADUG 21-Oct 2013Grahame Grieve

Page 2: ADUG 21-Oct 2013 Grahame Grieve
Page 3: ADUG 21-Oct 2013 Grahame Grieve
Page 4: ADUG 21-Oct 2013 Grahame Grieve
Page 5: ADUG 21-Oct 2013 Grahame Grieve
Page 6: ADUG 21-Oct 2013 Grahame Grieve

The OAuth Protocol

• Allows an application to login users using someone else’s login details (without seeing their password)

• Protocol is web based– Web sites– Mobile Applications– Desktop Applications

Page 7: ADUG 21-Oct 2013 Grahame Grieve
Page 8: ADUG 21-Oct 2013 Grahame Grieve

What are User Resources?

• User Information– Email Address– Real world Identifying Information (name, etc)– Google/Facebook friend list

• User specific services– Post to facebook wall– Storage (e.g. DropBox)– Health Care information

Page 9: ADUG 21-Oct 2013 Grahame Grieve

OAuth Parties

• User– User who wants to achieve something

• Service Provider– Can authenticate the user (password etc)– Has things the user owns

• Service Consumer– Needs to use User’s resources (e.g. for the user)– Trusted by the service provider and the user

Page 10: ADUG 21-Oct 2013 Grahame Grieve
Page 11: ADUG 21-Oct 2013 Grahame Grieve

OAuth Parties

• User– User who wants to achieve something

• Service Provider– Can authenticate the user (password etc)– Has things the user owns

• Service Consumer– Needs to use User’s resources (e.g. for the user)– Trusted by the service provider and the user

Page 12: ADUG 21-Oct 2013 Grahame Grieve

Authorization vs Authentication

• Service Consumer doesn’t know who the user is

• Just knows that the Service Provider authorises the consumer to do things on behalf of anonymous user

• Which may include identifying information… if service provider authenticated the user

Page 13: ADUG 21-Oct 2013 Grahame Grieve

OAuth Example

• Desktop Application

• Allows user to load/save application configuration to their Dropbox store

Page 14: ADUG 21-Oct 2013 Grahame Grieve
Page 15: ADUG 21-Oct 2013 Grahame Grieve
Page 16: ADUG 21-Oct 2013 Grahame Grieve
Page 17: ADUG 21-Oct 2013 Grahame Grieve
Page 18: ADUG 21-Oct 2013 Grahame Grieve
Page 19: ADUG 21-Oct 2013 Grahame Grieve
Page 20: ADUG 21-Oct 2013 Grahame Grieve
Page 21: ADUG 21-Oct 2013 Grahame Grieve
Page 22: ADUG 21-Oct 2013 Grahame Grieve
Page 23: ADUG 21-Oct 2013 Grahame Grieve
Page 24: ADUG 21-Oct 2013 Grahame Grieve
Page 25: ADUG 21-Oct 2013 Grahame Grieve

OAuth Pro’s & Cons

• Delegate User Authentication problems

• Well understood protocol

• Amazing services on offer

• Relatively Simple API

• Each implementation differs – it’s a technique

• Documentation confusing and byzantine

• Errors obtuse and misleading

• Not a full solution yet

Page 26: ADUG 21-Oct 2013 Grahame Grieve

http://www.healthintersections.com.au/?p=1554