Главная
Study mode:
on
1
Intro
2
High Security OAuth
3
Relevant Documents
4
OAuth 2.1
5
Rich Authorization Requests (RAR)
6
Example (2)
7
Example Authorization Request
8
JWT Secured Authorization Requests
9
Enabling JAR in IdentityServer
10
Pushed Authorization Requests PAR
11
Pushed Authorization Request & Respo
12
Authorization Request using request_
13
Shared Secrets
14
Recommendations
15
Sending a private_key_jwt
16
"Proof-of-Possession" History
17
Weakness of Bearer Tokens
18
Proof of Possession using MTLS
19
Mutual TLS
20
Sender Constrained Access Tokens w
21
Creating an X.509 Client Certificate
22
Setting a Client Certificate
23
Calling the Token Endpoint
24
MTLS Endpoints
25
Server Metadata
26
Choice of Web Server / Proxy
27
Example: Sub-domains with Nginx
28
Reading Certificate from Header
29
Certificate Authentication Handler
30
Enabling MTLS in IdentityServer
31
Verifying Access Token Ownership at Rese
32
Pipeline Overview
33
Summary
Description:
Explore the evolution of OAuth and its modern security enhancements in this NDC Oslo 2020 conference talk. Delve into the proposed OAuth 2.1 standard and advanced OAuth-related techniques, including strong client authentication, proof-of-possession access tokens, resource indicators, and identity delegation. Learn about hardening authorization requests using JWTs (JAR) and pushed parameters (PAR). Discover the implementation of high-security OAuth features, rich authorization requests (RAR), and JWT secured authorization requests. Examine the weaknesses of bearer tokens and explore proof-of-possession methods, including Mutual TLS (MTLS) and sender-constrained access tokens. Gain insights into creating and configuring X.509 client certificates, setting up MTLS endpoints, and implementing certificate authentication handlers. Understand how to enable MTLS in IdentityServer and verify access token ownership at the resource server level. By the end of this talk, acquire a comprehensive understanding of OAuth's latest security improvements and their practical applications in modern authentication scenarios. Read more

OAuth 2.1 and Beyond

NDC Conferences
Add to list
0:00 / 0:00