Adding Identity Management and Access Control to your Application 
Joaquin Salvachua // Álvaro Alonso 
UPM – DIT 
Security Chapter. FIWARE 
jsalvachua@dit.upm.es, @jsalvachua 
aalonsog@dit.upm.es, @larsonalonso
Identity Manager 
2
Identity Manager 
3 
Account
Oauth 2.0 
Login with
FIWARE Account (Identity Manager) Demo 
5
OAuth 2.0 
6
Oauth 2.0 Message Flow 
redirect 
access-code 
Web App Account 
request access-token 
access-token 
7 
OAuth Library 
Request user info using access-token
Oauth 2.0 Libraries 
• http://oauth.net/2/ 
– PHP, Cocoa, iOS, Java, Ruby, Javascript, 
Python. 
• Example using Node.js 
– https://github.com/ging/oauth2-example-client 
8
Oauth 2.0 Demo 
9
Web Applications and GEs 
10 
Generic Enabler 
Account 
Request + 
access-token 
Oauth2 flows 
access-token 
OK + user info (roles) 
Web App 
OAuth Library 
access_token
Web Applications and GEs 
GET https://GE_URL HTTP/1.1 
Host: GE_hostname 
X-Auth-Token: access_token 
11
Securing your back-end 
Oauth2 flows 
access_token 
12 
Web App 
Back-end 
Apps 
Account 
Request + 
access-token 
Oauth Library 
Proxy 
access-token 
OK + user info (roles)
Securing your back-end 
• Level 1: Authentication 
– Check if a user has a FIWARE account 
• Level 2: Basic Authorization 
– Checks if a user has permissions to access a 
resource 
– HTTP verb + resource path 
• Level 3: Advanced Authorization 
– Custom XACML policies
Level 1: Authentication 
Oauth2 flows 
access_token 
14 
Web App 
Back-end 
Apps 
Account 
Request + 
access-token 
Oauth Library 
Proxy 
access-token 
OK + user info (roles)
Level 2: Basic Authorization 
Oauth2 flows 
access_token 
15 
Web App 
Back-end 
Apps 
Account 
Request + 
access-token 
Oauth Library 
Proxy 
access-token + verb + path 
OK + user info 
AC GE
Level 3: Advanced Authorization 
Oauth2 flows 
access_token 
16 
Web App 
Back-end 
Apps 
Account 
Request + 
access-token 
Oauth Library 
Proxy extension 
XACML policy 
OK + user info 
AC GE
FIWARE Proxy Demo 
17
Documentation 
• FIWARE Account: 
– Source Code: https://github.com/ging/fi-ware- 
idm 
– Documentation: https://github.com/ging/fi-ware- 
idm/wiki 
• FIWARE Access Control 
– http://catalogue.fi-ware.org/enablers/access-control- 
tha-implementation/documentation 
• FIWARE OAuth2 Demo: 
– https://github.com/ging/oauth2-example-client 
• FIWARE Proxy: 
– https://github.com/ging/fi-ware-pep-proxy 
18
Adding Identity Management and Access Control to your Application 
Álvaro Alonso 
UPM – DIT 
Security Chapter. FIWARE 
aalonsog@dit.upm.es, @larsonalonso

More Related Content

PPTX
FI-WARE Account and OAuth solution
PDF
How to authenticate users in your apps using FI-WARE Account - Introduction
PPTX
PPTX
Adding Identity Management and Access Control to your Application, Authorization
PDF
FIware Identity Manager
PDF
FIWARE Identity Manager Exercises
PPTX
Adding Identity Management and Access Control to your Application
PPTX
Adding Identity Management and Access Control to your Application - Exersices
FI-WARE Account and OAuth solution
How to authenticate users in your apps using FI-WARE Account - Introduction
Adding Identity Management and Access Control to your Application, Authorization
FIware Identity Manager
FIWARE Identity Manager Exercises
Adding Identity Management and Access Control to your Application
Adding Identity Management and Access Control to your Application - Exersices

What's hot (20)

PDF
Integrating Fiware Orion, Keyrock and Wilma
PPTX
Api security-eic-prabath
PPTX
Adding Identity Management and Access Control to your App
PPTX
Hybrid authentication - Talking To Major Social Networks
PPTX
Securing RESTful APIs using OAuth 2 and OpenID Connect
PPTX
Securing the Web @DevDay Da Nang 2018
PPT
Openid & Oauth: An Introduction
PDF
OAuth2 and Spring Security
PPTX
Securing RESTful Payment APIs Using OAuth 2
PPTX
REST Service Authetication with TLS & JWTs
PPTX
JWT Authentication with AngularJS
PPTX
Intro to Deception techniques - Honey-*
PPTX
Security Function
PPTX
Pentest Expectations
PDF
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
PDF
Building an API Security Ecosystem
PDF
Wakanda and the top 5 security risks - JS.everyrwhere(2012) Europe
PDF
Fun With Spring Security
PPTX
Demystifying REST
PPTX
JWT SSO Inbound Authenticator
Integrating Fiware Orion, Keyrock and Wilma
Api security-eic-prabath
Adding Identity Management and Access Control to your App
Hybrid authentication - Talking To Major Social Networks
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing the Web @DevDay Da Nang 2018
Openid & Oauth: An Introduction
OAuth2 and Spring Security
Securing RESTful Payment APIs Using OAuth 2
REST Service Authetication with TLS & JWTs
JWT Authentication with AngularJS
Intro to Deception techniques - Honey-*
Security Function
Pentest Expectations
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
Building an API Security Ecosystem
Wakanda and the top 5 security risks - JS.everyrwhere(2012) Europe
Fun With Spring Security
Demystifying REST
JWT SSO Inbound Authenticator
Ad

Viewers also liked (15)

PDF
Chela stress test
PDF
May: If I Were 22
PDF
Cwin16 - Paris - ux design
PDF
Ia32 Modo Protegido
PDF
Marc Stickdorn & Jakob Schneider – Mobile ethnography and ExperienceFellow, a...
PDF
Netflix Nebula - Gradle Summit 2014
PDF
MMDS 2014 Talk - Distributing ML Algorithms: from GPUs to the Cloud
PDF
Cwin16 tls-partner-hpe-digital economy & Hybrid IT
PDF
Disciplined agile business analysis
PDF
How Comcast uses Data Science to Improve the Customer Experience
PDF
How to Start a Startup at NYU
PDF
Introduction to the Innovation Corps (NSF I-Corps)
PPTX
[PREMONEY 2014] Mayfield Fund >> Tim Chang, "Mobile Is The Future Of YOU: Why...
PDF
Cwin16 - lyon - faurecia customer cockpit
PDF
April: My Best Mistake
Chela stress test
May: If I Were 22
Cwin16 - Paris - ux design
Ia32 Modo Protegido
Marc Stickdorn & Jakob Schneider – Mobile ethnography and ExperienceFellow, a...
Netflix Nebula - Gradle Summit 2014
MMDS 2014 Talk - Distributing ML Algorithms: from GPUs to the Cloud
Cwin16 tls-partner-hpe-digital economy & Hybrid IT
Disciplined agile business analysis
How Comcast uses Data Science to Improve the Customer Experience
How to Start a Startup at NYU
Introduction to the Innovation Corps (NSF I-Corps)
[PREMONEY 2014] Mayfield Fund >> Tim Chang, "Mobile Is The Future Of YOU: Why...
Cwin16 - lyon - faurecia customer cockpit
April: My Best Mistake
Ad

Similar to Adding Identity Management and Access Control to your Application (20)

PDF
FIWARE ID Management
PDF
FIWARE Global Summit - Adding Identity Management, Access Control and API Man...
PPTX
Adding identity management and access control to your app
PPTX
Id fiware upm-dit
PPTX
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
PDF
Securing FIWARE Architectures
PDF
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
PPTX
Secure your app with keycloak
PPTX
Security Access with OAuth2.0
PPTX
FIWARE Wednesday Webinars - How to Secure FIWARE Architectures
PDF
FIWARE Identity Management and Access Control
PDF
Navigating Identity and Access Management in the Modern Enterprise
PDF
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
PPTX
Esquema de pasos de ejecución IdM
PDF
API Security - OWASP top 10 for APIs + tips for pentesters
PDF
Full stack security
PDF
FIWARE Global Summit - Identity Management and Access Control
PPTX
Mit 2014 introduction to open id connect and o-auth 2
PDF
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
PDF
FIWARE Identity Management and Access Control
FIWARE ID Management
FIWARE Global Summit - Adding Identity Management, Access Control and API Man...
Adding identity management and access control to your app
Id fiware upm-dit
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
Securing FIWARE Architectures
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
Secure your app with keycloak
Security Access with OAuth2.0
FIWARE Wednesday Webinars - How to Secure FIWARE Architectures
FIWARE Identity Management and Access Control
Navigating Identity and Access Management in the Modern Enterprise
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
Esquema de pasos de ejecución IdM
API Security - OWASP top 10 for APIs + tips for pentesters
Full stack security
FIWARE Global Summit - Identity Management and Access Control
Mit 2014 introduction to open id connect and o-auth 2
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
FIWARE Identity Management and Access Control

More from Fernando Lopez Aguilar (20)

PDF
Introduction to FIWARE technology
PDF
DW2020 Data Models - FIWARE Platform
PPTX
FIWARE and Smart Data Models
PPTX
How to deploy a smart city platform?
PPTX
Building the Smart City Platform on FIWARE Lab
PDF
Data Modeling with NGSI, NGSI-LD
PDF
FIWARE and Robotics
PDF
Big Data and Machine Learning with FIWARE
PDF
Operational Dashboards with FIWARE WireCloud
PDF
Creating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
PDF
Data persistency (draco, cygnus, sth comet, quantum leap)
PDF
How to debug IoT Agents
PDF
Core Context Management
PDF
What is an IoT Agent
PDF
FIWARE Overview
PDF
Overview of the FIWARE Ecosystem
PPTX
Cloud and Big Data in the agriculture sector
PDF
Berlin OpenStack Summit'18
PPTX
Context Information Management in IoT enabled smart systems - the basics
PPTX
FIWARE IoT Introduction 1
Introduction to FIWARE technology
DW2020 Data Models - FIWARE Platform
FIWARE and Smart Data Models
How to deploy a smart city platform?
Building the Smart City Platform on FIWARE Lab
Data Modeling with NGSI, NGSI-LD
FIWARE and Robotics
Big Data and Machine Learning with FIWARE
Operational Dashboards with FIWARE WireCloud
Creating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
Data persistency (draco, cygnus, sth comet, quantum leap)
How to debug IoT Agents
Core Context Management
What is an IoT Agent
FIWARE Overview
Overview of the FIWARE Ecosystem
Cloud and Big Data in the agriculture sector
Berlin OpenStack Summit'18
Context Information Management in IoT enabled smart systems - the basics
FIWARE IoT Introduction 1

Recently uploaded (20)

PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
PPTX
Presentation - Principles of Instructional Design.pptx
PPTX
How to use fields_get method in Odoo 18
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PPTX
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
PDF
Decision Optimization - From Theory to Practice
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
The AI Revolution in Customer Service - 2025
PDF
Launch a Bumble-Style App with AI Features in 2025.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Streamline Vulnerability Management From Minimal Images to SBOMs
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Data Virtualization in Action: Scaling APIs and Apps with FME
Build automations faster and more reliably with UiPath ScreenPlay
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
Presentation - Principles of Instructional Design.pptx
How to use fields_get method in Odoo 18
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
Decision Optimization - From Theory to Practice
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
The AI Revolution in Customer Service - 2025
Launch a Bumble-Style App with AI Features in 2025.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
Connector Corner: Transform Unstructured Documents with Agentic Automation
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Co-training pseudo-labeling for text classification with support vector machi...
Streamline Vulnerability Management From Minimal Images to SBOMs
AI-driven Assurance Across Your End-to-end Network With ThousandEyes

Adding Identity Management and Access Control to your Application

  • 1. Adding Identity Management and Access Control to your Application Joaquin Salvachua // Álvaro Alonso UPM – DIT Security Chapter. FIWARE [email protected], @jsalvachua [email protected], @larsonalonso
  • 5. FIWARE Account (Identity Manager) Demo 5
  • 7. Oauth 2.0 Message Flow redirect access-code Web App Account request access-token access-token 7 OAuth Library Request user info using access-token
  • 8. Oauth 2.0 Libraries • http://oauth.net/2/ – PHP, Cocoa, iOS, Java, Ruby, Javascript, Python. • Example using Node.js – https://github.com/ging/oauth2-example-client 8
  • 10. Web Applications and GEs 10 Generic Enabler Account Request + access-token Oauth2 flows access-token OK + user info (roles) Web App OAuth Library access_token
  • 11. Web Applications and GEs GET https://GE_URL HTTP/1.1 Host: GE_hostname X-Auth-Token: access_token 11
  • 12. Securing your back-end Oauth2 flows access_token 12 Web App Back-end Apps Account Request + access-token Oauth Library Proxy access-token OK + user info (roles)
  • 13. Securing your back-end • Level 1: Authentication – Check if a user has a FIWARE account • Level 2: Basic Authorization – Checks if a user has permissions to access a resource – HTTP verb + resource path • Level 3: Advanced Authorization – Custom XACML policies
  • 14. Level 1: Authentication Oauth2 flows access_token 14 Web App Back-end Apps Account Request + access-token Oauth Library Proxy access-token OK + user info (roles)
  • 15. Level 2: Basic Authorization Oauth2 flows access_token 15 Web App Back-end Apps Account Request + access-token Oauth Library Proxy access-token + verb + path OK + user info AC GE
  • 16. Level 3: Advanced Authorization Oauth2 flows access_token 16 Web App Back-end Apps Account Request + access-token Oauth Library Proxy extension XACML policy OK + user info AC GE
  • 18. Documentation • FIWARE Account: – Source Code: https://github.com/ging/fi-ware- idm – Documentation: https://github.com/ging/fi-ware- idm/wiki • FIWARE Access Control – http://catalogue.fi-ware.org/enablers/access-control- tha-implementation/documentation • FIWARE OAuth2 Demo: – https://github.com/ging/oauth2-example-client • FIWARE Proxy: – https://github.com/ging/fi-ware-pep-proxy 18
  • 19. Adding Identity Management and Access Control to your Application Álvaro Alonso UPM – DIT Security Chapter. FIWARE [email protected], @larsonalonso