Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE /
This book will guide you you through the maze of options and shares industry leading best practices in designing APIs for rock-solid security. It will explain, in depth, securing APIs from traditional HTTP Basic Authentication to OAuth 2.0 and the standards built around it. This book will: provide a...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Berkeley, CA] :
Apress,
2014.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Machine generated contents note: API Evolution
- API vs. Managed API
- API vs. Service
- Discovering and Describing APIs
- Managed APIs in Practice
- Twitter API
- Salesforce API
- Summary
- Design Challenges
- User Comfort
- Design Principles
- Least Privilege
- Fail-Safe Defaults
- Economy of Mechanism
- Complete Mediation
- Open Design
- Separation of Privilege
- Least Common Mechanism
- Psychological Acceptability
- Confidentiality, Integrity, Availability (CIA)
- Confidentiality
- Integrity
- Availability
- Security Controls
- Authentication
- Authorization
- Nonrepudiation
- Auditing
- Security Patterns
- Direct Authentication Pattern
- Sealed Green Zone Pattern
- Least Common Mechanism Pattern
- Brokered Authentication Pattern
- Policy-Based Access Control Pattern
- Threat Modeling
- Summary
- HTTP Basic Authentication
- HTTP Digest Authentication
- Summary
- Evolution of TLS
- How TLS Works
- TLS Handshake
- Application Data Transfer
- Summary
- Direct Delegation vs. Brokered Delegation
- Evolution of Identity Delegation
- Google ClientLogin
- Google AuthSub
- Flickr Authentication API
- Yahoo! Browser-Based Authentication (BBAuth)
- Summary
- Token Dance
- Temporary-Credential Request Phase
- Resource-Owner Authorization Phase
- Token-Credential Request Phase
- Invoking a Secured Business API with OAuth 1.0
- Demystifying oauth_signature
- Three-Legged OAuth vs. Two-Legged OAuth
- OAuth WRAP
- Summary
- OAuth WRAP
- Client Account and Password Profile
- Assertion Profile4
- Username and Password Profile
- Web App Profile
- Rich App Profile
- Accessing a WRAP-Protected API
- WRAP to OAuth 2.0
- OAuth 2.0 Grant Types
- Authorization Code Grant Type
- Implicit Grant Type
- Resource Owner Password Credentials Grant Type
- Client Credentials Grant Type
- OAuth 2.0 Token Types
- OAuth 2.0 Bearer Token Profile
- OAuth 2.0 Client Types
- OAuth 2.0 and Facebook
- OAuth 2.0 and LinkedIn
- OAuth 2.0 and Salesforce
- OAuth 2.0 and Google
- Authentication vs. Authorization
- Summary
- Bearer Token vs. MAC Token
- Obtaining a MAC Token
- Invoking an API Protected with the OAuth 2.0 MAC Token Profile
- Calculating the MAC
- MAC Validation by the Resource Server
- OAuth Grant Types and the MAC Token Profile
- OAuth 1.0 vs. OAuth 2.0 MAC Token Profile
- Summary
- Token Introspection Profile
- XACML and OAuth Token Introspection
- Chain Grant Type Profile
- Dynamic Client Registration Profile
- Token Revocation Profile
- Summary
- ProtectServe
- UMA and OAuth
- UMA Architecture
- UMA Phases
- UMA Phase 1: Protecting a Resource
- UMA Phase 2: Getting Authorization
- UMA Phase 3: Accessing the Protected Resource
- UMA APIs
- Protection API
- Authorization API
- Role of UMA in API Security
- Summary
- Enabling Federation
- Brokered Authentication
- SAML 2.0 Profile for OAuth: Client Authentication
- SAML 2.0 Profile for OAuth: Grant Type
- JWT Profile for OAuth 2.0 Client Authentication and Authorization Grants
- Summary
- Brief History of OpenID Connect
- Understanding OpenID Connect
- Anatomy of the ID Token
- OpenID Connect Request
- Requesting User Attributes
- Grant Types for OpenID Connect
- Requesting Custom User Attributes
- OpenID Connect Discovery
- OpenID Connect Identity Provider Metadata
- OpenID Connect Dynamic Client Registration
- OpenID Connect for Securing APIs
- Summary
- JSON Web Token
- JOSE Working Group
- JSON Web Signature
- Signature Algorithms
- Serialization
- JSON Web Encryption
- Content Encryption vs. Key Wrapping
- Serialization
- Summary
- Direct Authentication with the Trusted Subsystem Pattern
- Single Sign-On with the Delegated Access Control Pattern
- Single Sign-On with the Integrated Windows Authentication Pattern
- Identity Proxy with the Delegated Access Control Pattern
- Delegated Access Control with the JSON Web Token Pattern
- Nonrepudiation with the JSON Web Signature Pattern
- Chained Access Delegation Pattern
- Trusted Master Access Delegation Pattern
- Resource Security Token Service (STS) with the Delegated Access Control Pattern
- Delegated Access Control with the Hidden Credentials Pattern
- Summary.