マイクロサービス時代の認証と認可 - AWS Dev Day Tokyo 2018 #AWSDevDay都元ダイスケ Miyamoto
マイクロサービスが話題を集め、コンポーネントの急速な API 化が進んでいます。
認証や認可は、主にエンドユーザとシステムの間の問題だと認識されますが、今やコンポーネント間のサービス呼び出しにおいても重要な役割を担っています。
複雑に入り組んだマイクロサービス間の認証と認可について、実際に開発している API プラットフォームの実例を元に、実践的な知見をお伝えします。
This document contains information about Nov Matake, including that he is a security engineer at GREE Inc. and evangelist for the OpenID Foundation. It discusses concepts related to digital identity including entity, identity, authentication, authorization, access control, and identity proofing. It also compares identity providers and relying parties in the context of single sign-on using services like Facebook and Disqus.
マイクロサービス時代の認証と認可 - AWS Dev Day Tokyo 2018 #AWSDevDay都元ダイスケ Miyamoto
マイクロサービスが話題を集め、コンポーネントの急速な API 化が進んでいます。
認証や認可は、主にエンドユーザとシステムの間の問題だと認識されますが、今やコンポーネント間のサービス呼び出しにおいても重要な役割を担っています。
複雑に入り組んだマイクロサービス間の認証と認可について、実際に開発している API プラットフォームの実例を元に、実践的な知見をお伝えします。
This document contains information about Nov Matake, including that he is a security engineer at GREE Inc. and evangelist for the OpenID Foundation. It discusses concepts related to digital identity including entity, identity, authentication, authorization, access control, and identity proofing. It also compares identity providers and relying parties in the context of single sign-on using services like Facebook and Disqus.
This document summarizes Microsoft Azure Active Directory's support for OpenID Connect. Key points include:
- Azure AD can function as an identity provider supporting protocols like SAML, WS-Federation, and OpenID Connect.
- It also functions as an authorization server, allowing applications to register as protected resources.
- OpenID Connect support in Azure AD allows using the authorization code flow and retrieving tokens to call APIs on behalf of signed-in users.
- The document provides an example workflow using OWIN middleware and notifications in an ASP.NET MVC application.
Client Initiated Backchannel Authentication (CIBA) and Authlete’s ApproachTatsuo Kudo
This document discusses client initiated backchannel authentication (CIBA) and Authlete's approach. CIBA separates the device used for consumption from the device used for authentication. It allows a client to directly make a "backchannel authentication request" to an authorization server without browser redirects. The authorization server then sends a notification to the user's authentication device to authenticate. Authlete supports CIBA through its semi-hosted API architecture, providing APIs for the authorization server to handle backchannel requests and issue tokens once authentication is complete on the user's device.
In-house OAuth/OIDC Infrastructure as a Competitive Advantage #eic2021Tatsuo Kudo
Leading service providers have started developing their software in-house to achieve competitive business advantages. They naturally think that their OAuth 2.0 / OpenID Connect servers could be built in that way, but neither existing IAM software nor IDaaS meet their requirements. This session introduces a new OAuth/OIDC service architecture with agility and controllability. https://www.kuppingercole.com/sessions/4952/2
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Tatsuo Kudo
This document discusses authorization architecture patterns for OAuth/OIDC deployment and avoiding pitfalls. It begins with an introduction to the speaker and their company Authlete, which provides an API authorization backend service. The document then covers OAuth/OIDC basics and common deployment patterns including having the authorization server embedded in the application runtime, as a separate IAM system, or integrated with API gateways. It argues that the semi-hosted pattern, where the authorization server frontend is separate from the backend, provides the most flexibility. Authlete is presented as an example semi-hosted authorization server solution.
This document contains an agenda for a presentation on APIs and authorization. It discusses API definitions and types, the growth of APIs, examples of companies using APIs like Uber, and standards for financial-grade and open banking APIs. It also introduces Authlete as a backend as a service for API authorization, and how it can be used to add OAuth and OpenID Connect to APIs. Key topics covered include API definitions, trends, standards like FAPI and OAuth/OIDC, and an overview of Authlete's API authorization capabilities.
This document summarizes trends in banking APIs. It discusses how standards like Open Banking UK define API access authorization, typically using OAuth 2.0. Open Banking UK specifies the client credentials grant type and OIDC hybrid flow for account information and payment initiation APIs. It involves the TPP obtaining an identifier from the ASPSP, including it in a request object for authorization. Other standards like NextGenPSD2 and PolishAPI also utilize decoupled or OAuth-based authorization flows. Mutual TLS authentication between TPPs and ASPSPs is common across specifications.
The document discusses various approaches to open banking APIs and strong customer authentication. It summarizes the OAuth flows and API specifications used in the UK Open Banking framework as well as approaches taken by the Berlin Group, Polish Banking Association, and a French bank. It also compares embedded and decoupled flows for customer authentication.
IoT Devices Compliant with JC-STAR Using Linux as a Container OSTomohiro Saneyoshi
Security requirements for IoT devices are becoming more defined, as seen with the EU Cyber Resilience Act and Japan’s JC-STAR.
It's common for IoT devices to run Linux as their operating system. However, adopting general-purpose Linux distributions like Ubuntu or Debian, or Yocto-based Linux, presents certain difficulties. This article outlines those difficulties.
It also, it highlights the security benefits of using a Linux-based container OS and explains how to adopt it with JC-STAR, using the "Armadillo Base OS" as an example.
Feb.25.2025@JAWS-UG IoT