Unified Singular Protocol Flow for OAuth (USPFO) Ecosystem

01/29/2023
by   Jaimandeep Singh, et al.
0

OAuth 2.0 is a popular authorization framework that allows third-party clients such as websites and mobile apps to request limited access to a user's account on another application. The specification classifies clients into different types based on their ability to keep client credentials confidential. It also describes different grant types for obtaining access to the protected resources, with the authorization code and implicit grants being the most commonly used. Each client type and associated grant type have their unique security and usability considerations. In this paper, we propose a new approach for OAuth ecosystem that combines different client and grant types into a unified singular protocol flow for OAuth (USPFO), which can be used by both confidential and public clients. This approach aims to reduce the vulnerabilities associated with implementing and configuring different client types and grant types. Additionally, it provides built-in protections against known OAuth 2.0 vulnerabilities such as client impersonation, token (or code) thefts and replay attacks through integrity, authenticity, and audience binding. The proposed USPFO is largely compatible with existing Internet Engineering Task Force (IETF) Proposed Standard Request for Comments (RFCs), OAuth 2.0 extensions and active internet drafts.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/05/2017

Trustware: A Device-based Protocol for Verifying Client Legitimacy

Online services commonly attempt to verify the legitimacy of users with ...
research
12/12/2017

Keyword-Based Delegable Proofs of Storage

Cloud users (clients) with limited storage capacity at their end can out...
research
09/23/2021

Security Review of Ethereum Beacon Clients

The beacon chain is the backbone of the Ethereum's evolution towards a p...
research
02/11/2022

Very Pwnable Network: Cisco AnyConnect Security Analysis

Corporate Virtual Private Networks (VPNs) enable users to work from home...
research
12/01/2018

A Scheme to Verify Services with Unboundedly many Clients using NuSMV

We study model checking of client - server systems, where the servers of...
research
02/14/2018

Internet Location Verification: Challenges and Solutions

This thesis addresses the problem of verifying the geographic locations ...
research
04/02/2019

DNS-Morph: UDP-Based Bootstrapping Protocol For Tor

Tor is one of the most popular systems for anonymous communication and c...

Please sign up or login with your details

Forgot password? Click here to reset