Top Banner
Erik Wahlström Technology Strategist 9/19/2013 1
47

Protecting apps and APIs using Nordic eIDs

Jul 18, 2015

Download

Technology

Erik Wahlström
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/20131

Page 2: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/20132

Protecting your Applications and

APIs with Nordic e-IDs

Page 3: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/20133

Todays topics

eIDs is in the news.

What is an eID?

What are the Nordic eID?

Three ways to use your eIDs to protect apps and APIs.

Page 4: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/20134

What is a eID?

Digital passport to authenticate and sign.

Issued or trusted by governments.

Legally binding.

Page 5: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/20135

Page 6: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/20136

Smartcards or eIDs on file

Page 7: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/20137

Software based OTPs.

Page 8: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/20138

Tupas.

Page 9: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/20139

API based.

Page 10: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201310

What’s up next?

New platform for Swedish BankID.

SAML based identity federations like eID2.

New projects in Norway and Finland.

Page 11: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201311

How to protect an API using eID?

Web based APIs.

Protocol handlers.

Use browsers and OAuth2.

A token can be anything.

Alternatives to call an API:

Swedish Mobile BankID.

OAuth2 to authenticate using any other type of eID.

Bind two devices together to use smartcards on

smartphones.

Page 12: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201312

Alternative one – Swedish Mobile BankID

Page 13: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201313

Page 14: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201314

bankid://redirect=nexus%3A%2F%2Fstate%3Dxyz

Page 15: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201315

Page 16: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201316

nexus://state=xyz

Page 17: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201317

Page 18: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201318

Swedish Mobile BankID

Deep dive

Page 19: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201319

Personal number

Authentication

Collect

Token

Question

Page 20: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201320

Personal number

Authentication

Collect

Token

Question

Page 21: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201321

Personal number

Authentication

Collect

Token

Question

Page 22: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201322

Personal number

Authentication

Collect

Token

Question

Page 23: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201323

bankid://redirect=nexus%3A%2F%2Fstate%3Dxyz

Personal number

Authentication

Collect

Token

Question

Page 24: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201324

Personal number

Authentication

Collect

Token

Question

Page 25: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201325

Personal number

Authentication

Collect

Token

Question

Page 26: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201326

Personal number

Authentication

Collect

Token

Question

Page 27: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201327

nexus://state=xyz

Personal number

Authentication

Collect

Token

Question

Page 28: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201328

Personal number

Authentication

Collect

Token

Question

Page 29: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201329

Personal number

Authentication

Collect

Token

Question

Page 30: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201330

Alternative two – Others eIDs

Page 31: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201331

Use your browser to authenticate

using any eID

OAuth2 industry standard to protect APIs.

Define a way to get a authorization to use an API.

A token or two is good.

Use the token to access the API.

Use OAuth2 and a browser dance to authenticate.

Enables any method and eIDaaS.

Page 32: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201332

Page 33: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201333

https://example.com/oauth2?

response_type=code&client_id=nexus&redirect_uri=nexus%3A%2F%

2Fauthorization&scope=api&state=xyz

Page 34: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201334

Page 35: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201335

nexus://authorization?code=oauth2grant&stat

e=xyz

Page 36: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201336

Other eIDs

Deep dive

Page 37: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201337

Token

Question

Page 38: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201338

Token

Question

Page 39: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201339

Token

Question

Page 40: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201340

Alternative three – eID on other device

Page 41: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201341

Use an eID on another device

Put the rather sad user to work.

Connect two devices.

Refresh tokens makes it usable.

Page 42: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201342

Page 43: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201343

Page 44: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201344

Page 45: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201345

Final words

Page 46: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201346

Final words

BYOD and consumerization.

eIDaaS and OAuth2 for best coverage.

Refresh tokens is not always ok.

WebCrypto is cool.

Page 47: Protecting apps and APIs using Nordic eIDs

Erik Wahlström

Technology Strategist

9/19/201347

Thanks!

@erik_wahlstrom

[email protected]