Top Banner
Patterns & Practices in Mobile SSO Prabath Siriwardena, Director of Security, WSO2
34

Patterns and Practices in Mobile SSO

Nov 18, 2014

Download

Technology

WSO2

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Patterns and Practices in Mobile SSO

Patterns & Practices in Mobile SSO

Prabath Siriwardena, Director of Security, WSO2

Page 2: Patterns and Practices in Mobile SSO

About  WSO2  

๏  Global  enterprise,  founded  in  2005  by  acknowledged  leaders  in  XML,  web  services    technologies,  standards    and  open  source  

๏  Provides  only  open  source  pla:orm-­‐as-­‐a-­‐service  for  private,  public  and  hybrid  cloud  deployments  

๏  All  WSO2  products  are  100%  open  source  and  released  under  the  Apache  License  Version  2.0.  

๏  Is  an  AcIve  Member  of  OASIS,  Cloud  Security  Alliance,  OSGi  Alliance,  AMQP  Working  Group,  OpenID  FoundaIon  and  W3C.  

๏  Driven  by  InnovaIon  

๏  Launched  first  open  source  API  Management  soluIon  in  2012  

๏  Launched  App  Factory  in  2Q  2013  

๏  Launched  Enterprise  Store  and  first  open  source  Mobile  soluIon  in  4Q  2013  

 

Page 3: Patterns and Practices in Mobile SSO

What  WSO2  Deliver  

Page 4: Patterns and Practices in Mobile SSO

Within the first decade of the 21st century – internet worldwide increased from 350

million to more than 2 billion.

Page 5: Patterns and Practices in Mobile SSO

Mobile phone subscribers increased from

750 million to 5 billion

Today it’s around 6 billion

Page 6: Patterns and Practices in Mobile SSO

Only 30% of mobile users, password protect their mobile devices

Page 7: Patterns and Practices in Mobile SSO

Many SaaS providers ignore multifactor authentication for mobile applications

Page 8: Patterns and Practices in Mobile SSO

113 cell phones are lost or stolen every minute in the U.S and $7 million worth

of smartphones are lost daily

Page 9: Patterns and Practices in Mobile SSO

62% of mobile workers currently use their personal smartphones

for work

Page 10: Patterns and Practices in Mobile SSO

http://www.websense.com/assets/reports/websense-2013-threat-report.pdf

Page 11: Patterns and Practices in Mobile SSO

Mobile Device Management systems need to be an integral part of the corporate

Identity Management

Page 12: Patterns and Practices in Mobile SSO

Cloud service providers are becoming mobile friendly with REST/JSON APIs

Page 13: Patterns and Practices in Mobile SSO

OAuth 2.0 dominates Mobile and API security

Page 14: Patterns and Practices in Mobile SSO

Avoid using Resource Owner Password OAuth grant type

Page 15: Patterns and Practices in Mobile SSO

Mobile applications secured with OAuth can be vulnerable to phishing

Page 16: Patterns and Practices in Mobile SSO

Your Facebook or Twitter account credentials can be quite easily phished

through your mobile phone - than from a laptop computer

Page 17: Patterns and Practices in Mobile SSO

The need to bake-in client key and the secret key into the mobile app itself is an

issue yet to solve

Page 18: Patterns and Practices in Mobile SSO

OAuth has given a better failover capability to mobile applications in case

of an attack

Page 19: Patterns and Practices in Mobile SSO

It takes an average of 20 seconds for a user to log into a resource

Page 20: Patterns and Practices in Mobile SSO

Single Sign On increases user productivity

Page 21: Patterns and Practices in Mobile SSO

Browser based Single Sign On

Native App Native Web Browser

Authorization Server (IdP)

Mobile Device

Page 22: Patterns and Practices in Mobile SSO
Page 23: Patterns and Practices in Mobile SSO

Native Single Sign On

Native App Native IdP App

Mobile Device

Page 24: Patterns and Practices in Mobile SSO
Page 25: Patterns and Practices in Mobile SSO

OpenID Foundation is working on standardizing Native Single Sign On based on

OpenID Connect

Page 26: Patterns and Practices in Mobile SSO

Federated Single Sign On

Native App Native Web Browser

Authorization Server (IdP)

Mobile Device

SAML2 IdP

SAML2 IdP

Page 27: Patterns and Practices in Mobile SSO

Federated Single Sign On with heterogeneous Authorization Servers

Page 28: Patterns and Practices in Mobile SSO

Native App Native Web Browser

Authorization Server (IdP)

Mobile Device

Federation Hub

Authorization Server (IdP)

Page 29: Patterns and Practices in Mobile SSO

1 Native IdP Proxy App

Page 30: Patterns and Practices in Mobile SSO

2 Native IdP App

Page 31: Patterns and Practices in Mobile SSO

3 Native IdP App

Page 32: Patterns and Practices in Mobile SSO

4 Native IdP App

Page 33: Patterns and Practices in Mobile SSO

5 Native IdP App

Page 34: Patterns and Practices in Mobile SSO

Contact us !