SlideShare a Scribd company logo
Na#ve	
  Single	
  SignOn	
  
Interop	
  Demonstra#on	
  
	
  
Cloud	
  Iden#ty	
  Summit	
  2013	
  
1
Mo#va#on	
  
•  Enterprise	
  employees	
  use	
  mul#ple	
  applica#ons	
  
(combo	
  of	
  web	
  &	
  na#ve)	
  in	
  their	
  jobs	
  
•  Applica#ons	
  both	
  hosted	
  on-­‐prem	
  &	
  SaaS	
  
•  Current	
  reality	
  is	
  that	
  an	
  SSO	
  experience	
  limited	
  
to	
  the	
  browser	
  apps	
  
•  But	
  na#ve	
  applica#ons	
  becoming	
  more	
  and	
  more	
  
prevalent	
  
•  Poten#ally	
  significant	
  usability	
  burden	
  for	
  
employees	
  	
  	
  
Default	
  OAuth	
  paNern	
  for	
  na#ve	
  
applica#ons	
  
•  Employee	
  authen#ca#on/authorizes	
  each	
  
applica#on	
  individually	
  
•  Authoriza#on	
  manifested	
  as	
  the	
  issuance	
  of	
  
an	
  OAuth	
  token	
  to	
  each	
  na#ve	
  app	
  –	
  this	
  
presented	
  on	
  subsequent	
  API	
  calls	
  to	
  
corresponding	
  server	
  
•  Employee	
  interacts	
  with	
  each	
  OAuth	
  AS	
  
(corresponding	
  to	
  each	
  API)	
  to	
  obtain	
  an	
  
OAuth	
  token	
  
Implica#ons	
  of	
  default	
  paNern	
  
•  Employee	
  bears	
  burden	
  of	
  authen#ca#ng/
authorizing	
  each	
  na#ve	
  applica#on	
  separately	
  
•  Even	
  if	
  done	
  infrequently,	
  may	
  be	
  
unacceptable	
  
•  Each	
  SaaS	
  must	
  directly	
  support	
  OAuth	
  
(running	
  an	
  Authoriza#on	
  Server)	
  
•  Enterprise	
  distanced	
  from	
  employee's	
  use	
  of	
  
na#ve	
  applica#ons	
  
Na#ve	
  App	
  SSO	
  Alterna#ve	
  
•  An	
  employee	
  is	
  able	
  to	
  collec#vely	
  authorize	
  each	
  na#ve	
  
applica#on	
  on	
  device	
  in	
  one	
  step	
  
•  Rather	
  than	
  each	
  applica#on	
  individually	
  obtaining	
  OAuth	
  
tokens	
  for	
  itself	
  the	
  tokens	
  are	
  obtained	
  on	
  behalf	
  of	
  those	
  
na#ve	
  applica#ons	
  by	
  a	
  dedicated	
  'authoriza#on	
  agent'	
  (AZA)	
  
•  Employee	
  authorizes	
  the	
  AZA,	
  which	
  then	
  proceeds	
  to	
  obtain	
  for	
  
other	
  applica#ons	
  the	
  necessary	
  access	
  tokens	
  
•  Once	
  handed	
  the	
  tokens,	
  na#ve	
  applica#ons	
  use	
  them	
  as	
  
normal	
  on	
  API	
  calls	
  
•  For	
  user,	
  enables	
  an	
  SSO	
  experience	
  for	
  na#ve	
  applica#ons	
  
AZA	
  Alterna#ve	
  
	
  
	
  
6
Enterprise	
  
SaaS	
  
Device	
  
Browser	
   Na#ve	
  SaaS	
  
SaaS2	
  
Na#ve	
  SaaS2	
  
AS	
  
AS	
  
Client	
   Client	
  AZA	
  
AZA	
  Alterna#ve	
  
	
  
	
  
7
Enterprise	
  
SaaS	
  
Device	
  
Browser	
   Na#ve	
  SaaS	
  
SaaS2	
  
Na#ve	
  SaaS2	
  
AS	
  
AS	
  
Client	
   Client	
  AZA	
  
AS	
  
SaaS	
  
AZA	
  Alterna#ve	
  
	
  
	
  
8
Enterprise	
  
Device	
  
Browser	
  
AZA	
  
AS	
  
Browser	
   Na#ve	
  	
  
SaaS	
  AZA	
  
Na#ve	
  	
  
SaaS2	
  
SaaS2	
  
Alterna#ve	
  
	
  
	
  
9
Enterprise	
  
Device	
  
Browser	
   Na#ve	
  	
  
SaaS	
  
SaaS	
  
AZA	
  
Na#ve	
  	
  
SaaS2	
  
SaaS2	
  AS	
  
Implica#ons	
  
1.  Na#ve	
  apps	
  must	
  be	
  able	
  to	
  request	
  access	
  
tokens	
  of	
  a	
  local	
  AZA	
  
2.  AZA	
  must	
  be	
  able	
  to	
  request	
  access	
  tokens	
  
on	
  behalf	
  of	
  another	
  na#ve	
  applica#on	
  
3.  AZA	
  must	
  be	
  able	
  to	
  hand	
  over	
  access	
  tokens	
  
to	
  na#ve	
  applica#on	
  
4.  RS	
  must	
  be	
  able	
  to	
  validate	
  access	
  tokens	
  
(poten#ally	
  issued	
  by	
  a	
  remote	
  AS)	
  
10
Standardiza#on	
  
•  Mul#ple	
  pieces	
  (from	
  different	
  providers)	
  
implies	
  need	
  for	
  standards	
  
•  A	
  number	
  of	
  industry	
  players	
  working	
  to	
  
profile/extend	
  OpenID	
  Connect	
  for	
  the	
  AZA<-­‐
>AS	
  interac#on	
  
– New	
  WG	
  being	
  formed	
  in	
  OpenID	
  Founda#on	
  
•  Related	
  but	
  separate	
  effort	
  to	
  standardize	
  
App<-­‐>	
  AZA	
  messaging	
  emerging	
  
Interoperability	
  
•  We	
  are	
  demonstra#ng	
  interoperability	
  
between	
  different	
  AZAs,	
  OAuth	
  ASs,	
  na#ve	
  
applica#ons,	
  and	
  OAuth	
  RSs	
  	
  
•  The	
  AZA<-­‐>AS	
  protocol	
  is	
  based	
  on	
  OAuth	
  (not	
  
the	
  eventual	
  OIDC-­‐based	
  standard)	
  
•  MobileIron	
  &	
  Ping	
  also	
  implemented	
  a	
  back-­‐
channel	
  authoriza#on	
  query	
  interface	
  
12
Interop	
  Par#cipants	
  
13
Interop	
  Scenarios	
  
14
AZA	
  
AS	
  
AZA	
   AZA	
  
AS	
  

More Related Content

PPT
Amtelco June 2010 webinar on Infinity Contact-Based Architecture New
AMTELCO
 
PPTX
Build and graduate your app in ring central
Anirban Sen Chowdhary
 
PPTX
Kodak - OpenID Retail Summit at PayPal
Ashish Jain
 
PPS
Cisco Finesse Chat Gadgets
PRANJOL SAIKIA
 
PPTX
CIS 2015 Mobile SSO
Ashish Jain
 
PDF
OAuth for QuickBooks Online REST Services
Intuit Developer
 
PDF
LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Corporation
 
PPTX
Skf authenticate
alireza rezaie
 
Amtelco June 2010 webinar on Infinity Contact-Based Architecture New
AMTELCO
 
Build and graduate your app in ring central
Anirban Sen Chowdhary
 
Kodak - OpenID Retail Summit at PayPal
Ashish Jain
 
Cisco Finesse Chat Gadgets
PRANJOL SAIKIA
 
CIS 2015 Mobile SSO
Ashish Jain
 
OAuth for QuickBooks Online REST Services
Intuit Developer
 
LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Corporation
 
Skf authenticate
alireza rezaie
 

What's hot (20)

PPTX
Intuit QuickBooks Payments API
Intuit Developer
 
PPTX
Mobile Devices in the Enterprise: What IT needs to know
Ashish Jain
 
PDF
LINE Things - LINE IoT平台新技術分享
LINE Corporation
 
PDF
Enabling the Multi-Device Universe
CA API Management
 
PDF
SAP certified Add-on of Intelligent Decision Dimensions powered by SAP Conver...
Tatiana Kojar
 
PDF
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
CA API Management
 
PPTX
The curious case of mobile app security.pptx
Ankit Giri
 
PDF
How APIs Can Be Secured in Mobile Environments
WSO2
 
PDF
Extensible API Management
WSO2
 
PDF
Mobile_app_security
Hassan El Hadary
 
PDF
Qark DefCon 23
☠Tony Trummer☠
 
PDF
Azetone: Mobile A/B Testing & Personalization
Philippe Dumont
 
PDF
Sencha Space review
Grgur Grisogono
 
PPT
Fluig - Identity
Fluig
 
PPTX
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
CA API Management
 
PDF
Meet the Forge Runtime
Atlassian
 
PPTX
Building Mobile Apps With Xamarin and Visual Studio App Center
SharePoint Saturday New Jersey
 
PDF
Mobile SSO: Give App Users a Break from Typing Passwords
CA API Management
 
PPTX
Single sign-on Across Mobile Applications from RSAConference
CA API Management
 
PDF
Patterns and Practices in Mobile SSO
WSO2
 
Intuit QuickBooks Payments API
Intuit Developer
 
Mobile Devices in the Enterprise: What IT needs to know
Ashish Jain
 
LINE Things - LINE IoT平台新技術分享
LINE Corporation
 
Enabling the Multi-Device Universe
CA API Management
 
SAP certified Add-on of Intelligent Decision Dimensions powered by SAP Conver...
Tatiana Kojar
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
CA API Management
 
The curious case of mobile app security.pptx
Ankit Giri
 
How APIs Can Be Secured in Mobile Environments
WSO2
 
Extensible API Management
WSO2
 
Mobile_app_security
Hassan El Hadary
 
Qark DefCon 23
☠Tony Trummer☠
 
Azetone: Mobile A/B Testing & Personalization
Philippe Dumont
 
Sencha Space review
Grgur Grisogono
 
Fluig - Identity
Fluig
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
CA API Management
 
Meet the Forge Runtime
Atlassian
 
Building Mobile Apps With Xamarin and Visual Studio App Center
SharePoint Saturday New Jersey
 
Mobile SSO: Give App Users a Break from Typing Passwords
CA API Management
 
Single sign-on Across Mobile Applications from RSAConference
CA API Management
 
Patterns and Practices in Mobile SSO
WSO2
 
Ad

Viewers also liked (10)

PDF
Safeguarding our Heritage for our Grandchildren - Can UNESCO help?
InfoAndina CONDESAN
 
PDF
CIS14: Lean In: Enterprise Cloud Identity
CloudIDSummit
 
PPTX
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
ForgeRock
 
PPTX
Design and social responsibility, industrial heritage
Sandra Draskovic
 
PPTX
Standardizing Identity Provisioning with SCIM
HasiniG
 
PDF
Securing and Scaling SaaS
guest05bda0
 
PPTX
Denver Startup Week '15: Mobile SSO
Brian Campbell
 
PDF
CIS13: Bootcamp: PingOne as a Simple Identity Service
CloudIDSummit
 
PDF
Standardizing Identity Provisioning with SCIM
WSO2
 
PPT
Moving To SaaS
Alistair Croll
 
Safeguarding our Heritage for our Grandchildren - Can UNESCO help?
InfoAndina CONDESAN
 
CIS14: Lean In: Enterprise Cloud Identity
CloudIDSummit
 
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
ForgeRock
 
Design and social responsibility, industrial heritage
Sandra Draskovic
 
Standardizing Identity Provisioning with SCIM
HasiniG
 
Securing and Scaling SaaS
guest05bda0
 
Denver Startup Week '15: Mobile SSO
Brian Campbell
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CloudIDSummit
 
Standardizing Identity Provisioning with SCIM
WSO2
 
Moving To SaaS
Alistair Croll
 
Ad

Similar to CIS13: Authorization Agent (AZA) Mobile Protocol (20)

PDF
Iam f42 b
SelectedPresentations
 
PDF
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CloudIDSummit
 
PPTX
Pre-Con Ed: How to Provide Mobile Users With a Convenient, Yet Secure, Sessio...
CA Technologies
 
DOC
Pradeep Kumar _Profile
Pradeep Kumar
 
PDF
WSO2 Product Release Webinar - WSO2 API Manager 1.9
WSO2
 
PPTX
Enterprise API Adoption Patterns
Akana
 
PPTX
Enterprise API Adoption Patterns
Akana
 
PDF
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
CA Technologies
 
PDF
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
Sameera Jayasoma
 
PDF
Generating Insights from WSO2 API Manager Statistics
WSO2
 
PDF
Software as a service (saa s) or opensource which is right for you
Andolasoft Inc
 
PPTX
Defining Advanced AAA Policies for Access Networks
Aruba, a Hewlett Packard Enterprise company
 
PPTX
MuleSoft London Community October 2017 - Hybrid and SAP Integration
Pace Integration
 
PPTX
Identity as a Matter of Public Safety
Adam Lewis
 
PDF
ShepHertz - A Complete Cloud Ecosystem for your Apps
ShepHertz
 
PDF
Office 365 and Cloud Identity – What Does It Mean For Me?
Scott Hoag
 
PDF
SAP Single Sign-On 2.0 Overview
SAP Technology
 
PPTX
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
Aruba, a Hewlett Packard Enterprise company
 
PPTX
The Business Value for Internal APIs in the Enterprise
Akana
 
PPTX
The Business Value for Internal APIs in the Enterprise
Akana
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CloudIDSummit
 
Pre-Con Ed: How to Provide Mobile Users With a Convenient, Yet Secure, Sessio...
CA Technologies
 
Pradeep Kumar _Profile
Pradeep Kumar
 
WSO2 Product Release Webinar - WSO2 API Manager 1.9
WSO2
 
Enterprise API Adoption Patterns
Akana
 
Enterprise API Adoption Patterns
Akana
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
CA Technologies
 
Building Multi-tenant SaaS Applications using WSO2 Private PaaS
Sameera Jayasoma
 
Generating Insights from WSO2 API Manager Statistics
WSO2
 
Software as a service (saa s) or opensource which is right for you
Andolasoft Inc
 
Defining Advanced AAA Policies for Access Networks
Aruba, a Hewlett Packard Enterprise company
 
MuleSoft London Community October 2017 - Hybrid and SAP Integration
Pace Integration
 
Identity as a Matter of Public Safety
Adam Lewis
 
ShepHertz - A Complete Cloud Ecosystem for your Apps
ShepHertz
 
Office 365 and Cloud Identity – What Does It Mean For Me?
Scott Hoag
 
SAP Single Sign-On 2.0 Overview
SAP Technology
 
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
Aruba, a Hewlett Packard Enterprise company
 
The Business Value for Internal APIs in the Enterprise
Akana
 
The Business Value for Internal APIs in the Enterprise
Akana
 

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
CloudIDSummit
 
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 
CIS 2016 Content Highlights
CloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 

Recently uploaded (20)

PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
The Future of Artificial Intelligence (AI)
Mukul
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Software Development Methodologies in 2025
KodekX
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 

CIS13: Authorization Agent (AZA) Mobile Protocol

  • 1. Na#ve  Single  SignOn   Interop  Demonstra#on     Cloud  Iden#ty  Summit  2013   1
  • 2. Mo#va#on   •  Enterprise  employees  use  mul#ple  applica#ons   (combo  of  web  &  na#ve)  in  their  jobs   •  Applica#ons  both  hosted  on-­‐prem  &  SaaS   •  Current  reality  is  that  an  SSO  experience  limited   to  the  browser  apps   •  But  na#ve  applica#ons  becoming  more  and  more   prevalent   •  Poten#ally  significant  usability  burden  for   employees      
  • 3. Default  OAuth  paNern  for  na#ve   applica#ons   •  Employee  authen#ca#on/authorizes  each   applica#on  individually   •  Authoriza#on  manifested  as  the  issuance  of   an  OAuth  token  to  each  na#ve  app  –  this   presented  on  subsequent  API  calls  to   corresponding  server   •  Employee  interacts  with  each  OAuth  AS   (corresponding  to  each  API)  to  obtain  an   OAuth  token  
  • 4. Implica#ons  of  default  paNern   •  Employee  bears  burden  of  authen#ca#ng/ authorizing  each  na#ve  applica#on  separately   •  Even  if  done  infrequently,  may  be   unacceptable   •  Each  SaaS  must  directly  support  OAuth   (running  an  Authoriza#on  Server)   •  Enterprise  distanced  from  employee's  use  of   na#ve  applica#ons  
  • 5. Na#ve  App  SSO  Alterna#ve   •  An  employee  is  able  to  collec#vely  authorize  each  na#ve   applica#on  on  device  in  one  step   •  Rather  than  each  applica#on  individually  obtaining  OAuth   tokens  for  itself  the  tokens  are  obtained  on  behalf  of  those   na#ve  applica#ons  by  a  dedicated  'authoriza#on  agent'  (AZA)   •  Employee  authorizes  the  AZA,  which  then  proceeds  to  obtain  for   other  applica#ons  the  necessary  access  tokens   •  Once  handed  the  tokens,  na#ve  applica#ons  use  them  as   normal  on  API  calls   •  For  user,  enables  an  SSO  experience  for  na#ve  applica#ons  
  • 6. AZA  Alterna#ve       6 Enterprise   SaaS   Device   Browser   Na#ve  SaaS   SaaS2   Na#ve  SaaS2   AS   AS   Client   Client  AZA  
  • 7. AZA  Alterna#ve       7 Enterprise   SaaS   Device   Browser   Na#ve  SaaS   SaaS2   Na#ve  SaaS2   AS   AS   Client   Client  AZA   AS  
  • 8. SaaS   AZA  Alterna#ve       8 Enterprise   Device   Browser   AZA   AS   Browser   Na#ve     SaaS  AZA   Na#ve     SaaS2   SaaS2  
  • 9. Alterna#ve       9 Enterprise   Device   Browser   Na#ve     SaaS   SaaS   AZA   Na#ve     SaaS2   SaaS2  AS  
  • 10. Implica#ons   1.  Na#ve  apps  must  be  able  to  request  access   tokens  of  a  local  AZA   2.  AZA  must  be  able  to  request  access  tokens   on  behalf  of  another  na#ve  applica#on   3.  AZA  must  be  able  to  hand  over  access  tokens   to  na#ve  applica#on   4.  RS  must  be  able  to  validate  access  tokens   (poten#ally  issued  by  a  remote  AS)   10
  • 11. Standardiza#on   •  Mul#ple  pieces  (from  different  providers)   implies  need  for  standards   •  A  number  of  industry  players  working  to   profile/extend  OpenID  Connect  for  the  AZA<-­‐ >AS  interac#on   – New  WG  being  formed  in  OpenID  Founda#on   •  Related  but  separate  effort  to  standardize   App<-­‐>  AZA  messaging  emerging  
  • 12. Interoperability   •  We  are  demonstra#ng  interoperability   between  different  AZAs,  OAuth  ASs,  na#ve   applica#ons,  and  OAuth  RSs     •  The  AZA<-­‐>AS  protocol  is  based  on  OAuth  (not   the  eventual  OIDC-­‐based  standard)   •  MobileIron  &  Ping  also  implemented  a  back-­‐ channel  authoriza#on  query  interface   12
  • 14. Interop  Scenarios   14 AZA   AS   AZA   AZA   AS