Главная
Study mode:
on
1
Intro
2
Me, using a service
3
API Security Maturity Model
4
The problem with API keys and Basic Auth
5
Example: The publisher
6
Scopes Example
7
Example: The Swish app
8
Passing information around
9
Verifying claims
10
Using Claims
11
Attribute sources
12
Claim data
13
How to identify data to put in the token
14
Scope not Scopes
15
Claims vs. Scopes
16
Custom Grouping
17
Usefulness
18
Access Control Example
19
Summary: No spaghetti
20
Summary: Attributes are not claims
Description:
Explore OAuth and OpenID Connect as powerful tools for managing identity in distributed systems during this 48-minute conference talk from GOTO Copenhagen 2019. Discover how to leverage these protocols to enhance agility, scalability, and security in your API infrastructure. Learn about tracing and delegating end-user identities, managing user permissions across large organizations, and implementing standards-based approaches for large-scale deployments. Delve into topics such as API security maturity models, the limitations of API keys and Basic Auth, and practical examples involving publishers and mobile apps. Gain insights on passing information securely, verifying claims, utilizing attribute sources, and effectively implementing access control. Understand the distinctions between claims and scopes, explore custom grouping techniques, and learn how to identify essential data for tokens. Conclude with a summary of best practices for maintaining a clean, non-spaghetti-like architecture and properly distinguishing between attributes and claims in your identity management strategy. Read more

OAuth Tokens As Your Identity API

GOTO Conferences
Add to list