What is a secure model for implementing OAuth 2.0 like?

Ari-Pekka Koponen
Version 1.0

THIS PRESENTATION


      1. Overview: Research question
        and contents of the study

      2. What is authorization?

      3. How does OAuth 2.0 work?

      4. Research method and execution of the study 

      5. Current state of the study
        and personal experiences


    Overview: 

    Research question
    and
    contentS of the study

    RESEARCH QUESTION

     
    The aim of the research is to construct a secure model for implementing OAuth 2.0.

    In other words to answer the question:

    What is a secure model
    for implementing OAuth 2.0 like?

    CONTENTS OF THE STUDY

    (Development snapshot from 7.4.2014)

        1. INTRODUCTION
        2. PREVIOUS WORK
        3. SECURE AUTHENTICATION METHODS
        4. OAUTH 2.0 OVERVIEW
        5. RESEARCH METHOD
        6. A SECURE OAUTH 2.0 IMPLEMENTATION
          1. Security features
          2. Implementation
          3. Tests
        7. CONCLUSIONS


    WHAT IS AUTHORIZATION?

    SITUATION NOW

    • A growing amount of data is stored in the cloud and the number of web services is soaring. 
    • This has created a need for users to authorize third party applications to access their resources.

    AUTHORIZATION


    • The purpose of authorization is to let users allow third party applications access their resources.

    • The OAuth 2.0 authorization framework offers an open and standardized protocol for authorization.

    • OAuth 2.0 is used by e.g. Google, Microsoft and Facebook.

    AN EXAMPLE: FACEBOOK CONNECT

    • Facebook Connect is a good example of an implementation of OAuth 2.0: An application is allowed to access e.g. the users email address and posts.


    HOW DOES OAuth 2.0 

    WORK?

    PROTOCOL FLOW


    Research method
    and execution 
    of the study  

    RESEARCH METHOD



    The research will take a form of a design-science research study.

    EXECUTION OF THE STUDY


        1. With the help of current literature the features of a secure OAuth 2.0 implementation are identified

        2. Available libraries for implementing these features are assessed.

        3. OAuth 2.0 is implemented.

        4. The security of the resulting implementation is extensively tested and the test results analyzed.


    Current state of the study and personal experiences  

    CURRENT STATE


    To-do:

    Introduction [x]
    The rest [  ] 

    PERSONAL EXPERIENCE



    Most difficult so far: 
    Finding time and motivation.


    Thank You!


    Questions?

    M. Sc: Secure OAuth 2.0

    By apkoponen

    M. Sc: Secure OAuth 2.0

    Presentation for my Master's Thesis Seminar

    • 543