Trust Based Identity Sharing For Token Grants

07/29/2018
by   Kavindu Dodanduwa, et al.
0

Authentication and authorization are two key elements of a software application. In modern day, OAuth 2.0 framework and OpenID Connect protocol are widely adopted standards fulfilling these requirements. The protocols are implemented in to authorization servers. It is common to call these authorization servers as identity server or identity providers since they hold user identity information. Applications registered to an identity provider can use OpenID Connect to retrieve ID token for authentication. Access token obtained along with ID token allows application to consume OAuth 2.0 protected resources. In this approach, client application is bound to a single identity provider. If the application needs to consume a protected resource from a different domain, which only accepts tokens of a defined identity provider, then client must again follow OpenID Connect protocol to obtain new tokens. This requires user identity details to be stored in the second identity provider as well. This paper proposes an extension to OpenID Connect protocol to overcome this issue. It proposes a client centric mechanism to exchange identity information as token grants against a trusted identity provider. Once grant is accepted, resulting token response contains an access token, which is good enough to access protected resources

READ FULL TEXT

page 3

page 4

research
07/31/2023

OIDC^2: Open Identity Certification with OpenID Connect

OpenID Connect (OIDC) is a widely used authentication standard for the W...
research
11/09/2022

A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences

Controlled sharing is fundamental to distributed systems. We consider a ...
research
07/08/2019

xRAC: Execution and Access Control for Restricted Application Containers on Managed Hosts

We propose xRAC to permit users to run special applications on managed h...
research
12/15/2020

Building an ID Card Repository with Progressive Web Application to Mitigate Fraud

A lot of service requires identity of users to mitigate undesirable inci...
research
07/07/2020

WLCG Authorisation from X.509 to Tokens

The WLCG Authorisation Working Group was formed in July 2017 with the ob...
research
10/10/2018

True2F: Backdoor-resistant authentication tokens

We present True2F, a system for second-factor authentication that provid...
research
08/31/2018

Role of Trust in OAuth 2.0 and OpenID Connect

OAuth 2.0 is a framework for authorization. Being a framework, OAuth 2.0...

Please sign up or login with your details

Forgot password? Click here to reset