Главная
Study mode:
on
1
Introduction
2
Three simple questions
3
The plan
4
OAuth vs OpenID Connect
5
OpenID Connect
6
Three parties
7
This face
8
Dynamic solution
9
ID token
10
Parameters
11
Attacks
12
Threat Model
13
Categories
14
Attacker Identity Provider
15
Single Phase Attacks
16
Another Attack
17
Replay Attacks
18
Supported Values
19
Singlephase attacks
20
Crossphase attacks
21
Endpoints
22
IDP Confusion Attack
23
Countermeasure
24
Malicious Endpoint Attacks
25
Out of Service
26
Demo
27
Professors
28
Tobias works
29
IDPs
30
Switch
31
Current State
32
Summary
Description:
Explore a comprehensive analysis of OpenID Connect security vulnerabilities and their solutions in this conference talk from AppSecEU 2016. Delve into the differences between OAuth and OpenID Connect, understanding the three-party system and dynamic solutions involved. Examine various attack vectors, including single-phase attacks, replay attacks, and IDP confusion attacks, along with their corresponding countermeasures. Learn about malicious endpoint attacks and out-of-service scenarios through practical demonstrations. Gain insights from security experts as they discuss current states of OpenID Connect implementation and provide a summary of key findings to enhance your understanding of this authentication protocol's security landscape.

Systematically Breaking and Fixing OpenID Connect

OWASP Foundation
Add to list