Authentication

Implementing OAuth 1.0a Authentication Using WebAuthenticationBroker

Downloads


Implementing OAuth 1.0a Authentication Using WebAuthenticationBroker [PDF 407.62 KB]

What is OAuth?


OAuth is the open standard for the authorization and authentication. OAuth provides a method for clients to access server resources on behalf of a resource owner. It also provides a process for end users to authorize third-party access to their server resources without sharing their credentials (typically, a username and a password), using user-agent redirections.

  • Sviluppatori
  • Microsoft Windows* 8.x
  • Windows*
  • Authentication
  • twitter
  • application
  • Third Party Access
  • OAuth
  • The future of authentication and transactions over the web (Part 1)

    Banks and the payment industry have realized long ago that knowledge is not enough to confirm money transactions through the web. Even apparently strong techniques such as tokens and smartcards have been facing the challenge to deal with Malware and Hacker attacks. Then, to avoid blind signing, institutions have been appealing to external devices, which are likely to fail due to network flaws or challenging user experience.

  • Sviluppatori
  • Partner
  • Professori
  • Studenti
  • Microsoft Windows* (XP, Vista, 7)
  • Microsoft Windows* 8.x
  • Client business
  • Servizi cloud
  • Windows*
  • Principiante
  • token
  • OTP
  • two-factor authentication
  • IPT
  • transaction
  • Authentication
  • Tecnologia Intel® Active Management
  • Sicurezza
  • The future of authentication and transactions over the web (Part 1)

    Banks and the payment industry have realized long ago that knowledge is not enough to confirm money transactions through the web. Even apparently strong techniques such as tokens and smartcards have been facing the challenge to deal with Malware and Hacker attacks. Then, to avoid blind signing, institutions have been appealing to external devices, which are likely to fail due to network flaws or challenging user experience.

    How about a Security Layer?

    I recently had a great discussion with Wendy Nather from the 451 Analyst Group. She had found one of my previous posts on using a service gateway to protect against the OWASP Top 10 and had some follow up questions. I wanted to share some of the discussion as well as her questions because it really got me thinking more about Enterprise application architecture and security.

    Using a Service Gateway to Protect against the OWASP Top 10

    The Open Web Application Security Project (OWASP) maintains and publishes an oingoing list of top ten threats to web applications. With some of exceptions, the threats listed in the OWASP top ten can be applicable to any service, be it a web application, REST service, SOAP service or custom application. It is interesting to note that while there are changes to the bottom five threats, the top five threats remain unchanged since 2007.

    Iscriversi a Authentication