SlideShare a Scribd company logo
Trust Elevation
Implementing an OAuth 2.0 Infrastructure
using the OpenID Connect & UMA profiles
sales@gluu.org@GluuFederation
By: Michael Schwartz
What is trust elevation?
“Trust Elevation methods increase the
mitigation of risk of false assertion of identity in
order to allow the subject to engage in a
transaction.”
OASIS Trust-EL TC
Authentication Step-Up Protocol and Metadata
Version 1.0-Draft 3
Don’t use 2FA, unless you have to...
“Civilization advances by extending the number
of important operations which we can perform
without thinking about them.”
Albert North Whitehead
English Mathematician and Philosopher
(1861 - 1947)
Authentication Involves Tradeoffs
Agenda
1. What tools do we have for person
identification?
2. OAuth2 for trust elevation?
3. Inter-domain trust elevation?
4. New challenges!
Who am I:
Founded & Sold ISP: ‘95-’99
IAM Integrator: ‘98-’09
Founder / CEO Gluu: ‘09 - Present
Dad, hacker, pigeon enthusiast
Part I: Identification
electron → meat correlation…
How do we know who
is on the other side of
that digital transaction?
Cognitive
Something you know or
something your browser saved.
Biometric
Something you are or…
something you can’t change.
Token
Something you have.
Mobile
Some device you control.
Smart Card
Something you probably don’t
have a reader for...
Wearables / NFC
Something you have on.
FIDO: Second Factor Experience
Some U2F device that you have.
FIDO: Passwordless Experience
Some UAF that device you have.
Context and Behavior
Some way you use your phone or browser.
Risk Scores
Some big-data footprint you’re not even aware of..
Contextual Combinations Complicate
Relative Scale
● Is the IP address a known hacker?
● Was the device rooted?
● Is a browser cookie present?
● Is the device running virus
protection?
● Is the location recognized?
● When was credential issued?
● What is the time of day?
According to Microsoft
research (page 11), every
authentication scheme does
worse than passwords on
deployability.
Pick your poison:
Part II: OAuth2
How do apps use all these crazy authentication methods?
● Deployability = cost
● Less Cost = consolidation
● No “one-offs”!
A brief history in Web
Authentication Standards
Developers want JSON REST
API’s for authentication.
OpenID Connect
Only one protected endpoint: “user_info” which returns id_token
UMA
The requesting party must provide
a valid RPT Token to the resource server.
How does the app know
what kind of authn happened?
id_token
User claims + info about authentication event
OpenID Provider Discovery
GET host + /.well-known/openid-configuration
OpenID Dynamic Client Registration
Authentication Request
That is a space delimited string
Scope based
Not ABAC policies!
Best Practice:
Centralize Policy Management
UMA provides the PDP
What kind of policies can you make?
Return Hint...
You are Forbidden because you need acr...
Part III
Federations for inter-domain trust
EDURoam for wifi
SAML Federations
Normalize legal and technical details for trust.
SAML Federation Metadata
Many SAML Federations publish user schema
Domains need to collaborate
on the values for acr’s and amr’s
So what values should we
use for amr and acr?
SAML Federations
Identity Providers and Websites (SP)
OAuth2 has new entities and new jargon
OAuth2 Schema, not just attributes
Open Trust Taxonomy for OAuth2
(OTTO)
Enter...
Where do we need federations?
Part IV: New Challenges
Who’s that knocking at my door?
IOT Challenges
New Services like Data Federation
Not “can you access?” But “what can you access?”
Summary
Questions?
sales@gluu.org
@GluuFederation

More Related Content

What's hot (20)

PDF
Identiverse - Microservices Security
Bertrand Carlier
 
PPTX
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
ForgeRock
 
PPTX
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
ForgeRock
 
PPTX
The New Venn of Access Control in the API-Mobile-IOT Era
ForgeRock
 
PDF
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Maxim Salnikov
 
PDF
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
ForgeRock
 
PPT
Authentication and strong authentication for Web Application
Sylvain Maret
 
PDF
The Future of Digital Identity in the Age of the Internet of Things
ForgeRock
 
PPTX
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock
 
PDF
Beyond username and password it's continuous authorization webinar
ForgeRock
 
PDF
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
ForgeRock
 
PPTX
NYC Identity Summit Tech Day: Best Practices for API Security
ForgeRock
 
PPTX
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
ForgeRock
 
PDF
FIDO Technical Specifications Overview
FIDO Alliance
 
PDF
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
PPTX
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
ForgeRock
 
PDF
NYC Identity Summit Tech Day: Authorization for the Modern World
ForgeRock
 
PPTX
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Alliance
 
PDF
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
ForgeRock
 
PDF
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
ForgeRock
 
Identiverse - Microservices Security
Bertrand Carlier
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
ForgeRock
 
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
ForgeRock
 
The New Venn of Access Control in the API-Mobile-IOT Era
ForgeRock
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Maxim Salnikov
 
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
ForgeRock
 
Authentication and strong authentication for Web Application
Sylvain Maret
 
The Future of Digital Identity in the Age of the Internet of Things
ForgeRock
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock
 
Beyond username and password it's continuous authorization webinar
ForgeRock
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
ForgeRock
 
NYC Identity Summit Tech Day: Best Practices for API Security
ForgeRock
 
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
ForgeRock
 
FIDO Technical Specifications Overview
FIDO Alliance
 
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
ForgeRock
 
NYC Identity Summit Tech Day: Authorization for the Modern World
ForgeRock
 
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Alliance
 
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
ForgeRock
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
ForgeRock
 

Similar to Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect & UMA (20)

PDF
Cryptograpy Exam
Lisa Olive
 
PPT
Re-using existing PKIs for online Identity Management
Martijn Oostdijk
 
PPTX
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Andrew Hughes
 
PDF
Nt2580 Final Project Essay Examples
Sherry Bailey
 
PDF
[WSO2Con EU 2018] Identity APIs is the New Black
WSO2
 
PDF
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
PPT
Cartes Asia Dem 2010 V2
Donald Malloy
 
PDF
Mobile Ad Hoc Networks ( Manets )
Heather Vargas
 
PDF
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
PPTX
Internet of Things: Identity & Security with Open Standards
George Fletcher
 
PPTX
RSA Europe: Future of Cloud Identity
Mike Schwartz
 
PDF
CIS14: Securing the Internet of Things with Open Standards
CloudIDSummit
 
PPTX
Kerberos-PKI-Federated identity
WAFAA AL SALMAN
 
PDF
Cybersecurity Slides
Jim Kaplan CIA CFE
 
PPTX
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Vikalp Sharma
 
PPTX
Security in microservices architectures
inovia
 
PPTX
SWXG 2010.6.9 v2
Paul Trevithick
 
PPTX
Introduction to Blockchain and BitCoin New Business Opportunties
Value Amplify Consulting
 
PDF
Network Security
Beth Hall
 
PDF
Lessons in privacy engineering from a nation scale identity system - connect id
David Kelts, CIPT
 
Cryptograpy Exam
Lisa Olive
 
Re-using existing PKIs for online Identity Management
Martijn Oostdijk
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Andrew Hughes
 
Nt2580 Final Project Essay Examples
Sherry Bailey
 
[WSO2Con EU 2018] Identity APIs is the New Black
WSO2
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
Cartes Asia Dem 2010 V2
Donald Malloy
 
Mobile Ad Hoc Networks ( Manets )
Heather Vargas
 
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
Internet of Things: Identity & Security with Open Standards
George Fletcher
 
RSA Europe: Future of Cloud Identity
Mike Schwartz
 
CIS14: Securing the Internet of Things with Open Standards
CloudIDSummit
 
Kerberos-PKI-Federated identity
WAFAA AL SALMAN
 
Cybersecurity Slides
Jim Kaplan CIA CFE
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Vikalp Sharma
 
Security in microservices architectures
inovia
 
SWXG 2010.6.9 v2
Paul Trevithick
 
Introduction to Blockchain and BitCoin New Business Opportunties
Value Amplify Consulting
 
Network Security
Beth Hall
 
Lessons in privacy engineering from a nation scale identity system - connect id
David Kelts, CIPT
 
Ad

More from Mike Schwartz (15)

PPTX
LASCON 2017: SAML v. OpenID v. Oauth
Mike Schwartz
 
PPTX
OTTO - Internet2 TechX 2017
Mike Schwartz
 
PPTX
The Client is not always right! How to secure OAuth authentication from your...
Mike Schwartz
 
PPTX
LASCON: Three Profiels of OAuth2 for Identity and Access Management
Mike Schwartz
 
PPTX
Kantara OTTO slides
Mike Schwartz
 
PPTX
RSA Conference 2016: Who Are You? From Meat to Electrons and Back Again
Mike Schwartz
 
PDF
Who Are You? From Meat to Electrons - SXSW 2014
Mike Schwartz
 
PDF
OpenID Connect vs. OpenID 1 & 2
Mike Schwartz
 
PPT
ID Next 2013 Keynote Slides by Mike Schwartz
Mike Schwartz
 
PPTX
Federation registry
Mike Schwartz
 
PPTX
Single Sign On 101
Mike Schwartz
 
PPTX
Requirements for Personal Clouds : Tech Ranch Talk 8/7/13
Mike Schwartz
 
PDF
Cloud Identity: A Recipe for Higher Education
Mike Schwartz
 
PDF
Gluu EDU Webinar: Shibboleth/SAML SSO
Mike Schwartz
 
PDF
SAML Protocol Overview
Mike Schwartz
 
LASCON 2017: SAML v. OpenID v. Oauth
Mike Schwartz
 
OTTO - Internet2 TechX 2017
Mike Schwartz
 
The Client is not always right! How to secure OAuth authentication from your...
Mike Schwartz
 
LASCON: Three Profiels of OAuth2 for Identity and Access Management
Mike Schwartz
 
Kantara OTTO slides
Mike Schwartz
 
RSA Conference 2016: Who Are You? From Meat to Electrons and Back Again
Mike Schwartz
 
Who Are You? From Meat to Electrons - SXSW 2014
Mike Schwartz
 
OpenID Connect vs. OpenID 1 & 2
Mike Schwartz
 
ID Next 2013 Keynote Slides by Mike Schwartz
Mike Schwartz
 
Federation registry
Mike Schwartz
 
Single Sign On 101
Mike Schwartz
 
Requirements for Personal Clouds : Tech Ranch Talk 8/7/13
Mike Schwartz
 
Cloud Identity: A Recipe for Higher Education
Mike Schwartz
 
Gluu EDU Webinar: Shibboleth/SAML SSO
Mike Schwartz
 
SAML Protocol Overview
Mike Schwartz
 
Ad

Recently uploaded (20)

PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 

Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect & UMA