SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Erik Wahlström
Technology Strategist
9/19/2013
1
Erik Wahlström
Technology Strategist
9/19/2013
2
Protecting your Applications and
APIs with Nordic e-IDs
Erik Wahlström
Technology Strategist
9/19/2013
3
Todays topics
 eIDs is in the news.
 What is an eID?
 What are the Nordic eID?
 Three ways to use your eIDs to protect apps and APIs.
Erik Wahlström
Technology Strategist
9/19/2013
4
What is a eID?
 Digital passport to authenticate and sign.
 Issued or trusted by governments.
 Legally binding.
Erik Wahlström
Technology Strategist
9/19/2013
5
Erik Wahlström
Technology Strategist
9/19/2013
6
Smartcards or eIDs on file
Erik Wahlström
Technology Strategist
9/19/2013
7
Software based OTPs.
Erik Wahlström
Technology Strategist
9/19/2013
8
Tupas.
Erik Wahlström
Technology Strategist
9/19/2013
9
API based.
Erik Wahlström
Technology Strategist
9/19/2013
10
What’s up next?
 New platform for Swedish BankID.
 SAML based identity federations like eID2.
 New projects in Norway and Finland.
Erik Wahlström
Technology Strategist
9/19/2013
11
How to protect an API using eID?
 Web based APIs.
 Protocol handlers.
 Use browsers and OAuth2.
 A token can be anything.
 Alternatives to call an API:
 Swedish Mobile BankID.
 OAuth2 to authenticate using any other type of eID.
 Bind two devices together to use smartcards on
smartphones.
Erik Wahlström
Technology Strategist
9/19/2013
12
Alternative one – Swedish Mobile BankID
Erik Wahlström
Technology Strategist
9/19/2013
13
Erik Wahlström
Technology Strategist
9/19/2013
14
bankid://redirect=nexus%3A%2F%2Fstate%3Dxyz
Erik Wahlström
Technology Strategist
9/19/2013
15
Erik Wahlström
Technology Strategist
9/19/2013
16
nexus://state=xyz
Erik Wahlström
Technology Strategist
9/19/2013
17
Erik Wahlström
Technology Strategist
9/19/2013
18
Swedish Mobile BankID
Deep dive
Erik Wahlström
Technology Strategist
9/19/2013
19
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
20
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
21
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
22
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
23
bankid://redirect=nexus%3A%2F%2Fstate%3Dxyz
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
24
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
25
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
26
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
27
nexus://state=xyz
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
28
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
29
Personal number
Authentication
Collect
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
30
Alternative two – Others eIDs
Erik Wahlström
Technology Strategist
9/19/2013
31
Use your browser to authenticate
using any eID
 OAuth2 industry standard to protect APIs.
 Define a way to get a authorization to use an API.
 A token or two is good.
 Use the token to access the API.
 Use OAuth2 and a browser dance to authenticate.
 Enables any method and eIDaaS.
Erik Wahlström
Technology Strategist
9/19/2013
32
Erik Wahlström
Technology Strategist
9/19/2013
33
https://example.com/oauth2?
response_type=code&client_id=nexus&redirect_uri=nexus%3A%2F%
2Fauthorization&scope=api&state=xyz
Erik Wahlström
Technology Strategist
9/19/2013
34
Erik Wahlström
Technology Strategist
9/19/2013
35
nexus://authorization?code=oauth2grant&stat
e=xyz
Erik Wahlström
Technology Strategist
9/19/2013
36
Other eIDs
Deep dive
Erik Wahlström
Technology Strategist
9/19/2013
37
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
38
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
39
Token
Question
Erik Wahlström
Technology Strategist
9/19/2013
40
Alternative three – eID on other device
Erik Wahlström
Technology Strategist
9/19/2013
41
Use an eID on another device
 Put the rather sad user to work.
 Connect two devices.
 Refresh tokens makes it usable.
Erik Wahlström
Technology Strategist
9/19/2013
42
Erik Wahlström
Technology Strategist
9/19/2013
43
Erik Wahlström
Technology Strategist
9/19/2013
44
Erik Wahlström
Technology Strategist
9/19/2013
45
Final words
Erik Wahlström
Technology Strategist
9/19/2013
46
Final words
 BYOD and consumerization.
 eIDaaS and OAuth2 for best coverage.
 Refresh tokens is not always ok.
 WebCrypto is cool.
Erik Wahlström
Technology Strategist
9/19/2013
47
Thanks!
 @erik_wahlstrom
 erik.wahlstrom@nexusgroup.com

Weitere ähnliche Inhalte

Ähnlich wie Protecting apps and APIs using Nordic eIDs

CIO Roundtable IOT
CIO Roundtable IOTCIO Roundtable IOT
CIO Roundtable IOT
Jim Sutter
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOT
James Sutter
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Capgemini
 

Ähnlich wie Protecting apps and APIs using Nordic eIDs (20)

Vietnam cyber security market size, shre & market forecast 2016 2026
Vietnam cyber security market size, shre & market forecast  2016 2026Vietnam cyber security market size, shre & market forecast  2016 2026
Vietnam cyber security market size, shre & market forecast 2016 2026
 
Paranoia or risk management 2013
Paranoia or risk management 2013Paranoia or risk management 2013
Paranoia or risk management 2013
 
Fuelling Digital Innovation - Webinar Deck
Fuelling Digital Innovation - Webinar DeckFuelling Digital Innovation - Webinar Deck
Fuelling Digital Innovation - Webinar Deck
 
The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
 
Secured home with 3 factor authentication using android application
Secured home with 3 factor authentication  using  android application Secured home with 3 factor authentication  using  android application
Secured home with 3 factor authentication using android application
 
Military Enlists Digital Twin Technology to Secure Chips
Military Enlists Digital Twin Technology to Secure ChipsMilitary Enlists Digital Twin Technology to Secure Chips
Military Enlists Digital Twin Technology to Secure Chips
 
Top SSL Certificate Providers for Your Business
Top SSL Certificate Providers for Your BusinessTop SSL Certificate Providers for Your Business
Top SSL Certificate Providers for Your Business
 
CIO Roundtable IOT
CIO Roundtable IOTCIO Roundtable IOT
CIO Roundtable IOT
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOT
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...
 
Blockchain Devices.pdf
Blockchain Devices.pdfBlockchain Devices.pdf
Blockchain Devices.pdf
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summit
 
Smart lock market
Smart lock marketSmart lock market
Smart lock market
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 

Kürzlich hochgeladen

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Kürzlich hochgeladen (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 

Protecting apps and APIs using Nordic eIDs