Saturday, December 27, 2014

The OAuth Protocol – Authorization Framework

The oauth protocol is used to increase the security between client and server. It additionally involves authorization of users and token based security. The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
Introduction
In the traditional client-server authentication model, the client requests an access-restricted resource (protected resource) on the server by authenticating with the server using the resource owner’s credentials. In order to provide third-party applications access to restricted resources, the resource owner shares its credentials with the third party. This creates several problems and limitations:
    o   Third-party applications are required to store the resource
owner’s credentials for future use, typically a password in
clear-text.
o   Servers are required to support password authentication, despite
the security weaknesses inherent in passwords.
o   Third-party applications gain overly broad access to the resource
owner’s protected resources, leaving resource owners without any
ability to restrict duration or access to a limited subset of
resources.
o  Resource owners cannot revoke access to an individual third party
without revoking access to all third parties, and must do so by
changing the third party’s password.
o  Compromise of any third-party application results in compromise of
the end-user’s password and all of the data protected by that
password.
OAuth addresses these issues by introducing an authorization layer  and separating the role of the client from that of the resource owner. In OAuth, the client requests access to resources controlled by the resource owner and hosted by the resource server, and is issued a different set of credentials than those of the resource owner.
oauth protocol Flow

More >>The OAuth Protocol – Authorization Framework

No comments:

Post a Comment