patterns and practices in mobile sso

34
Patterns & Practices in Mobile SSO Prabath Siriwardena, Director of Security, WSO2

Upload: wso2

Post on 18-Nov-2014

631 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Patterns and Practices in Mobile SSO

Patterns & Practices in Mobile SSO

Prabath Siriwardena, Director of Security, WSO2

Page 2: Patterns and Practices in Mobile SSO

About  WSO2  

๏  Global  enterprise,  founded  in  2005  by  acknowledged  leaders  in  XML,  web  services    technologies,  standards    and  open  source  

๏  Provides  only  open  source  pla:orm-­‐as-­‐a-­‐service  for  private,  public  and  hybrid  cloud  deployments  

๏  All  WSO2  products  are  100%  open  source  and  released  under  the  Apache  License  Version  2.0.  

๏  Is  an  AcIve  Member  of  OASIS,  Cloud  Security  Alliance,  OSGi  Alliance,  AMQP  Working  Group,  OpenID  FoundaIon  and  W3C.  

๏  Driven  by  InnovaIon  

๏  Launched  first  open  source  API  Management  soluIon  in  2012  

๏  Launched  App  Factory  in  2Q  2013  

๏  Launched  Enterprise  Store  and  first  open  source  Mobile  soluIon  in  4Q  2013  

 

Page 3: Patterns and Practices in Mobile SSO

What  WSO2  Deliver  

Page 4: Patterns and Practices in Mobile SSO

Within the first decade of the 21st century – internet worldwide increased from 350

million to more than 2 billion.

Page 5: Patterns and Practices in Mobile SSO

Mobile phone subscribers increased from

750 million to 5 billion

Today it’s around 6 billion

Page 6: Patterns and Practices in Mobile SSO

Only 30% of mobile users, password protect their mobile devices

Page 7: Patterns and Practices in Mobile SSO

Many SaaS providers ignore multifactor authentication for mobile applications

Page 8: Patterns and Practices in Mobile SSO

113 cell phones are lost or stolen every minute in the U.S and $7 million worth

of smartphones are lost daily

Page 9: Patterns and Practices in Mobile SSO

62% of mobile workers currently use their personal smartphones

for work

Page 10: Patterns and Practices in Mobile SSO

http://www.websense.com/assets/reports/websense-2013-threat-report.pdf

Page 11: Patterns and Practices in Mobile SSO

Mobile Device Management systems need to be an integral part of the corporate

Identity Management

Page 12: Patterns and Practices in Mobile SSO

Cloud service providers are becoming mobile friendly with REST/JSON APIs

Page 13: Patterns and Practices in Mobile SSO

OAuth 2.0 dominates Mobile and API security

Page 14: Patterns and Practices in Mobile SSO

Avoid using Resource Owner Password OAuth grant type

Page 15: Patterns and Practices in Mobile SSO

Mobile applications secured with OAuth can be vulnerable to phishing

Page 16: Patterns and Practices in Mobile SSO

Your Facebook or Twitter account credentials can be quite easily phished

through your mobile phone - than from a laptop computer

Page 17: Patterns and Practices in Mobile SSO

The need to bake-in client key and the secret key into the mobile app itself is an

issue yet to solve

Page 18: Patterns and Practices in Mobile SSO

OAuth has given a better failover capability to mobile applications in case

of an attack

Page 19: Patterns and Practices in Mobile SSO

It takes an average of 20 seconds for a user to log into a resource

Page 20: Patterns and Practices in Mobile SSO

Single Sign On increases user productivity

Page 21: Patterns and Practices in Mobile SSO

Browser based Single Sign On

Native App Native Web Browser

Authorization Server (IdP)

Mobile Device

Page 22: Patterns and Practices in Mobile SSO
Page 23: Patterns and Practices in Mobile SSO

Native Single Sign On

Native App Native IdP App

Mobile Device

Page 24: Patterns and Practices in Mobile SSO
Page 25: Patterns and Practices in Mobile SSO

OpenID Foundation is working on standardizing Native Single Sign On based on

OpenID Connect

Page 26: Patterns and Practices in Mobile SSO

Federated Single Sign On

Native App Native Web Browser

Authorization Server (IdP)

Mobile Device

SAML2 IdP

SAML2 IdP

Page 27: Patterns and Practices in Mobile SSO

Federated Single Sign On with heterogeneous Authorization Servers

Page 28: Patterns and Practices in Mobile SSO

Native App Native Web Browser

Authorization Server (IdP)

Mobile Device

Federation Hub

Authorization Server (IdP)

Page 29: Patterns and Practices in Mobile SSO

1 Native IdP Proxy App

Page 30: Patterns and Practices in Mobile SSO

2 Native IdP App

Page 31: Patterns and Practices in Mobile SSO

3 Native IdP App

Page 32: Patterns and Practices in Mobile SSO

4 Native IdP App

Page 33: Patterns and Practices in Mobile SSO

5 Native IdP App

Page 34: Patterns and Practices in Mobile SSO

Contact us !