Enable Oauth2.0 with Sentinet API
Management
Enable Oauth2.0 with Sentinet API Management
Nice to meet you
Massimo Crippa
Integration Architect at Codit
 BizTalk D/I
 Api Management
massimo.crippa@codit.eu
codit.eu/blog
@mas_que_crippa
linkedin.com/in/massimocrippa
Agenda
The rise of APIs
0
10000
20000
30000
40000
50000
60000
2007 2008 2009 2010 2011 2012 2013 2014 2015
Number of Public APIs
Managed Total APIs
➔ Fueled by mobile, cloud, open & big data,
IoT
➔ Public APIs are just the “tip of the iceberg”
➔ Open Innovation and New Markets
➔ Enable Composite Enterprise Approach
➔ Build on Partner Capabilities
➔ APIs are drivers of innovation in the
enterprises.
APIs are booming and this reflects
the importance of their management
API Management – The Pillars
Gets more insights in
performance and quality of
your solution. Runtime
quality.
Capability to support traffic
peak, avoid to flooding the
backend service
Scalability
API security is one of the
biggest concerns for
enterprises
Security
Software quality, versioning,
standards, complete life-
cycle, drive the adoption
Governance Insights
Concept - Service Broker
The service broker deals with the challenges
SOA and API consumers
Security
Scalability
Governance
Insights
Nodes / Proxies
Software intermediaries
Management portal
Configure the façade, get insights
Management APIs
Interoperable web services
Repository
Persist and durable repository
• Configure the virtualization / design your service
• Configurations and Policies are stored in the repository
• Node(s) poll for configuration changes
• Node(s) apply new configuration
• At runtime, the Node enforces the design-time decisions
• Tracking data is asynchronously transmitted to the repository
• Get insights about the performances and quality of the solution
API Management components
Customer case : Before - unmanaged
> 300 endpoints
various security
configuration
BizTalk GroupConsumers
B2B
LOB
After : Managed via Virtualization
1 security
configuration
BizTalk GroupConsumers
B2B
LOB
Security
Monitoring
Governance
SLA
Discoverable
Accessible
Sentinet
Sentinet and BizTalk Server
ESB Layer
orchestration
transformation
pub&sub
validation
HR systemPayroll system
security
mediation
virtualization
governance
SENTINET Layer
SLA extensibility
transformation,
validation,
routing, etc
alerting
Tonight use case: As is
Internal app
Dev/Test
REST http
SOAP net.tcp
SOAP http
Tonight use case: To be
Internal app
Dev/Test
http
SOAP net.tcp
SOAP http
Business
partner
OAuth2.0 net.tcp OAuth2.0
No impact on the current BizTalk implementation
No impact on the consumers
Protocol enablement
OAuth 2.0
It’s not for Authentication
…and not for Authorization
OAuth is a delegation protocol
Authorization flows:
➔ Authorization code (native apps)
➔ Implicit (js / SPAs)
➔ Resource owner password credentials (trusted client / applications)
➔ Client credentials (server to server)
Authorization Code (simplified)
Four actors:
➔ Resource owner
➔ Client application
➔ Authorization Server (AAD)
➔ Resource Server (APIs)
OAuth 2.0
One very important thing
The Client knows nothing about the user
JWT: JSON Web Token
{
“typ": "JWT",
"alg": "RS256"
}
{
"aud": "5db8b7cb-c027-43cf-991b-ae399dc883e0",
"iss": "https://sts.windows.net/38179760-91c3-4593-9510-d8d4938527d2/",
"iat": 1444589612,
"nbf": 1444589612,
"exp": 1444593512,
"tid": "38179760-91c3-4593-9510-d8d4938527d2",
"oid": "37f764d3-63f9-492c-ae02-990687aa1c25",
"roles": [ "Editor", "Reader", "Guest“ ],
"sub": "HDTX9yqHzslOUqLbXwlTid-xb1aJwTVMGvzKw7ruDVg"
}
Header
Claims
eyJhbGciOiJIUzI1NiIsIIkpXVCJ9.eyJzdWIiOiIxMjM0NTY3O4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxQ
Header Claims Signature
OAuth 2.0 with Sentinet
Passive authorization mode :
• Resource owner
• Client credentials
Passive authorization mode :
• Validate authorization token
Demo
Extensibility
Runtime msg
processing
Sentinet features
Governance
RoutingSecurity
Monitoring
SLA
Management
Audit
Virtualization Testing
Cloud
enablement
Reporting
Takeaways
➔ Protocol enablement in a non-invasive way
➔ Protocol mediation SOAP to REST
➔ Integration service is claim-aware
➔ Get insights about performance and quality of our APIs
Thank you

More Related Content

PDF
Cisco Connect Ottawa 2018 multi cloud
PDF
Accenture Motivated By Mobility
PPTX
Deloitte consulting case competition.
PDF
Atlas Copco Smart Connected Assembly Industry 4.0
PPTX
Key trend in strategic sourcing
PDF
Oracle Social Welfare and the Cloud - WernbergTougaard
PDF
Accenture 5 g-municipalities-become-smart-cities
PDF
Pwc digital-iq-report final
Cisco Connect Ottawa 2018 multi cloud
Accenture Motivated By Mobility
Deloitte consulting case competition.
Atlas Copco Smart Connected Assembly Industry 4.0
Key trend in strategic sourcing
Oracle Social Welfare and the Cloud - WernbergTougaard
Accenture 5 g-municipalities-become-smart-cities
Pwc digital-iq-report final

What's hot (20)

PDF
Digital platforms and services: A development opportunity for ASEAN
PDF
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
PDF
Manufacturing and the data conundrum
PDF
Reaching Net Zero by 2050
PDF
Accenture: ACIC Rome & Commvault
PDF
HEALTHCARE, THE CLOUD, AND ITS SECURITY
PPT
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
PDF
Accenture & Commvault
PPT
VEA Services Portfolio
PPTX
Accenture + Red Hat
PDF
Oracle Technology Vision 2021
PDF
Accenture SaaS Reference - FullForce Solution
PDF
Taking Windows Containers to Enterprise Level
PPTX
Accenture tech vision 2018 slideshare trend2_extended_reality_aw_a_mc
PDF
The CIO agenda: A compedium of Deloitte insights
PDF
Accenture and Mercedes Case Study
PDF
Value journal - August 2021
PDF
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
PDF
View point4 - the evolution of the corporate website
PDF
Highlights on the five key trends
Digital platforms and services: A development opportunity for ASEAN
Case Study - Microsemi Uses Microsoft Dynamics AX to Reduce Costs and Improve...
Manufacturing and the data conundrum
Reaching Net Zero by 2050
Accenture: ACIC Rome & Commvault
HEALTHCARE, THE CLOUD, AND ITS SECURITY
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
Accenture & Commvault
VEA Services Portfolio
Accenture + Red Hat
Oracle Technology Vision 2021
Accenture SaaS Reference - FullForce Solution
Taking Windows Containers to Enterprise Level
Accenture tech vision 2018 slideshare trend2_extended_reality_aw_a_mc
The CIO agenda: A compedium of Deloitte insights
Accenture and Mercedes Case Study
Value journal - August 2021
WUD2010 Sophia 03 - A. Andres Del Valle (Accenture Labs) : Technology design ...
View point4 - the evolution of the corporate website
Highlights on the five key trends
Ad

Viewers also liked (20)

DOC
PPTX
P 5 journal
PPT
Future simple
PPTX
التويتر
PPTX
More diary entries
DOCX
Political Islam and its discrimination with Salafism in contemporary ages: fi...
PPTX
Researching the market place 2
PPT
Kpi for accounting
PPTX
Morphy blood
PPT
College kpi
PPT
IT-TITLE
PDF
3 the diary of a young girl
PDF
Peti-Déj du Digital N°2 : Digital Learning
PDF
Maria Paula Garcia Pereira - English CV
PDF
сLasik
PPTX
Elainne's journal
PPT
It kpi dashboard
PPTX
Stamp diary
PPTX
Ноутбук та його характеристики
PPTX
Optimizing Your Author Website for Google and Social Media
P 5 journal
Future simple
التويتر
More diary entries
Political Islam and its discrimination with Salafism in contemporary ages: fi...
Researching the market place 2
Kpi for accounting
Morphy blood
College kpi
IT-TITLE
3 the diary of a young girl
Peti-Déj du Digital N°2 : Digital Learning
Maria Paula Garcia Pereira - English CV
сLasik
Elainne's journal
It kpi dashboard
Stamp diary
Ноутбук та його характеристики
Optimizing Your Author Website for Google and Social Media
Ad

Similar to Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event) (20)

PDF
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
PDF
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
PDF
What's new in API Connect and DataPower - 2019
PDF
2019 devoxx - apis, microservices, et le service mesh
PPTX
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
PPTX
Why Assertion-based Access Token is preferred to Handle-based one?
PDF
Melbourne API Management Seminar
PPTX
Platform for Secure Digital Business
PPTX
Twelve factor-app
PDF
Api management customer
PPTX
Overview of azure microservices and the impact on integration
PPTX
Gateway/APIC security
PDF
API Gateway How-To: The Many Ways to Apply the Gateway Pattern
PPTX
2014 q3-platform-update-v1.06.johnmathon
PDF
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
PPTX
SSO Agility Made Possible - November 2014
PDF
Service Virtualization + API Management together
PDF
Managing the Complexity of Microservices Deployments
PDF
Telliant-Pres-_9-2-22 (1).pdf
PDF
OAuth in the Real World featuring Webshell
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
What's new in API Connect and DataPower - 2019
2019 devoxx - apis, microservices, et le service mesh
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
Why Assertion-based Access Token is preferred to Handle-based one?
Melbourne API Management Seminar
Platform for Secure Digital Business
Twelve factor-app
Api management customer
Overview of azure microservices and the impact on integration
Gateway/APIC security
API Gateway How-To: The Many Ways to Apply the Gateway Pattern
2014 q3-platform-update-v1.06.johnmathon
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
SSO Agility Made Possible - November 2014
Service Virtualization + API Management together
Managing the Complexity of Microservices Deployments
Telliant-Pres-_9-2-22 (1).pdf
OAuth in the Real World featuring Webshell

More from Codit (20)

PPTX
Cloud Native Demystified: Build Once, Run Anywhere!
PPTX
Getting started with IoT
PPTX
What's Next for Microsoft's BizTalk Server
PPTX
Introduction to Time Series Analytics with Microsoft Azure
PPTX
CI/CD for a Data Platform
PPTX
AI-Driven Fraud Detection
PPTX
Blockchain in Practice
PPTX
Exploring IoT Edge
PPTX
The Future of Integration | Webinar of the 24th of April 2020
PPTX
Application Autoscaling Made Easy with Kubernetes Event-Driven Autoscaling (K...
PPTX
The Ideal Approach to Application Modernization; Which Way to the Cloud?
PDF
Lessons learned when integrating with Dynamics 365
PDF
Five Reasons IoT Projects Fail - CTO Sam Vanhoutte @ IoT Convention 2019
PDF
Real time Analytics in IoT - Marcel Lattmann Codit Switzerland @.NET Day 2019
PDF
Unlock a Smarter Business with Digital Identity - Sylvia Vandevelde @CONNECT19
PDF
AI as Driver of Transformation - Didier Ongena @CONNECT19
PDF
Extending Operations from On-premises Solutions Towards Hybrid and Cloud - Da...
PDF
Why your business needs an API driven strategy - Massimo Crippa @CONNECT19
PDF
Pushing the boundaries with IoT - Glenn Colpaert @CONNECT19
PDF
The Future of Integration - Toon Vanhoutte @CONNECT19
Cloud Native Demystified: Build Once, Run Anywhere!
Getting started with IoT
What's Next for Microsoft's BizTalk Server
Introduction to Time Series Analytics with Microsoft Azure
CI/CD for a Data Platform
AI-Driven Fraud Detection
Blockchain in Practice
Exploring IoT Edge
The Future of Integration | Webinar of the 24th of April 2020
Application Autoscaling Made Easy with Kubernetes Event-Driven Autoscaling (K...
The Ideal Approach to Application Modernization; Which Way to the Cloud?
Lessons learned when integrating with Dynamics 365
Five Reasons IoT Projects Fail - CTO Sam Vanhoutte @ IoT Convention 2019
Real time Analytics in IoT - Marcel Lattmann Codit Switzerland @.NET Day 2019
Unlock a Smarter Business with Digital Identity - Sylvia Vandevelde @CONNECT19
AI as Driver of Transformation - Didier Ongena @CONNECT19
Extending Operations from On-premises Solutions Towards Hybrid and Cloud - Da...
Why your business needs an API driven strategy - Massimo Crippa @CONNECT19
Pushing the boundaries with IoT - Glenn Colpaert @CONNECT19
The Future of Integration - Toon Vanhoutte @CONNECT19

Recently uploaded (20)

PPTX
Blending method and technology for hydrogen.pptx
PDF
Identification of potential depression in social media posts
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Launch a Bumble-Style App with AI Features in 2025.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PPTX
Information-Technology-in-Human-Society.pptx
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Examining Bias in AI Generated News Content.pdf
PDF
Streamline Vulnerability Management From Minimal Images to SBOMs
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PPTX
Report in SIP_Distance_Learning_Technology_Impact.pptx
PPTX
How to Convert Tickets Into Sales Opportunity in Odoo 18
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
Blending method and technology for hydrogen.pptx
Identification of potential depression in social media posts
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Launch a Bumble-Style App with AI Features in 2025.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
Information-Technology-in-Human-Society.pptx
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Presentation - Principles of Instructional Design.pptx
CEH Module 2 Footprinting CEH V13, concepts
Examining Bias in AI Generated News Content.pdf
Streamline Vulnerability Management From Minimal Images to SBOMs
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
Build automations faster and more reliably with UiPath ScreenPlay
Report in SIP_Distance_Learning_Technology_Impact.pptx
How to Convert Tickets Into Sales Opportunity in Odoo 18
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...

Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)

  • 1. Enable Oauth2.0 with Sentinet API Management
  • 2. Enable Oauth2.0 with Sentinet API Management
  • 3. Nice to meet you Massimo Crippa Integration Architect at Codit  BizTalk D/I  Api Management [email protected] codit.eu/blog @mas_que_crippa linkedin.com/in/massimocrippa
  • 5. The rise of APIs 0 10000 20000 30000 40000 50000 60000 2007 2008 2009 2010 2011 2012 2013 2014 2015 Number of Public APIs Managed Total APIs ➔ Fueled by mobile, cloud, open & big data, IoT ➔ Public APIs are just the “tip of the iceberg” ➔ Open Innovation and New Markets ➔ Enable Composite Enterprise Approach ➔ Build on Partner Capabilities ➔ APIs are drivers of innovation in the enterprises. APIs are booming and this reflects the importance of their management
  • 6. API Management – The Pillars Gets more insights in performance and quality of your solution. Runtime quality. Capability to support traffic peak, avoid to flooding the backend service Scalability API security is one of the biggest concerns for enterprises Security Software quality, versioning, standards, complete life- cycle, drive the adoption Governance Insights
  • 7. Concept - Service Broker The service broker deals with the challenges SOA and API consumers Security Scalability Governance Insights
  • 8. Nodes / Proxies Software intermediaries Management portal Configure the façade, get insights Management APIs Interoperable web services Repository Persist and durable repository • Configure the virtualization / design your service • Configurations and Policies are stored in the repository • Node(s) poll for configuration changes • Node(s) apply new configuration • At runtime, the Node enforces the design-time decisions • Tracking data is asynchronously transmitted to the repository • Get insights about the performances and quality of the solution API Management components
  • 9. Customer case : Before - unmanaged > 300 endpoints various security configuration BizTalk GroupConsumers B2B LOB
  • 10. After : Managed via Virtualization 1 security configuration BizTalk GroupConsumers B2B LOB Security Monitoring Governance SLA Discoverable Accessible Sentinet
  • 11. Sentinet and BizTalk Server ESB Layer orchestration transformation pub&sub validation HR systemPayroll system security mediation virtualization governance SENTINET Layer SLA extensibility transformation, validation, routing, etc alerting
  • 12. Tonight use case: As is Internal app Dev/Test REST http SOAP net.tcp SOAP http
  • 13. Tonight use case: To be Internal app Dev/Test http SOAP net.tcp SOAP http Business partner OAuth2.0 net.tcp OAuth2.0 No impact on the current BizTalk implementation No impact on the consumers Protocol enablement
  • 14. OAuth 2.0 It’s not for Authentication …and not for Authorization OAuth is a delegation protocol Authorization flows: ➔ Authorization code (native apps) ➔ Implicit (js / SPAs) ➔ Resource owner password credentials (trusted client / applications) ➔ Client credentials (server to server)
  • 15. Authorization Code (simplified) Four actors: ➔ Resource owner ➔ Client application ➔ Authorization Server (AAD) ➔ Resource Server (APIs)
  • 16. OAuth 2.0 One very important thing The Client knows nothing about the user
  • 17. JWT: JSON Web Token { “typ": "JWT", "alg": "RS256" } { "aud": "5db8b7cb-c027-43cf-991b-ae399dc883e0", "iss": "https://sts.windows.net/38179760-91c3-4593-9510-d8d4938527d2/", "iat": 1444589612, "nbf": 1444589612, "exp": 1444593512, "tid": "38179760-91c3-4593-9510-d8d4938527d2", "oid": "37f764d3-63f9-492c-ae02-990687aa1c25", "roles": [ "Editor", "Reader", "Guest“ ], "sub": "HDTX9yqHzslOUqLbXwlTid-xb1aJwTVMGvzKw7ruDVg" } Header Claims eyJhbGciOiJIUzI1NiIsIIkpXVCJ9.eyJzdWIiOiIxMjM0NTY3O4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxQ Header Claims Signature
  • 18. OAuth 2.0 with Sentinet Passive authorization mode : • Resource owner • Client credentials Passive authorization mode : • Validate authorization token
  • 19. Demo
  • 21. Takeaways ➔ Protocol enablement in a non-invasive way ➔ Protocol mediation SOAP to REST ➔ Integration service is claim-aware ➔ Get insights about performance and quality of our APIs

Editor's Notes

  • #19: Passive authorization mode Service side Client side