Question

In: Computer Science

describe OAuth and OpenID

describe OAuth and OpenID

Solutions

Expert Solution

OAuth

OAuth is an open-standard authorization protocol or framework that provides applications the ability for “secure designated access.” For example, you can tell Facebook that it’s OK for ESPN.com to access your profile or post updates to your timeline without having to give ESPN your Facebook password. This minimizes risk in a major way: In the event ESPN suffers a breach, your Facebook password remains safe.OAuth doesn’t share password data but instead uses authorization tokens to prove an identity between consumers and service providers. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password.

OAuth is about authorization and not authentication. Authorization is asking for permission to do stuff. Authentication is about proving you are the correct person because you know things. OAuth doesn’t pass authentication data between consumers and service providers – but instead acts as an authorization token of sorts.The common analogy I’ve seen used while researching OAuth is the valet key to your car. The valet key allows the valet to start and move the car but doesn’t give them access to the trunk or the glove box.An OAuth token is like that valet key. As a user, you get to tell the consumers what they can use and what they can’t use from each service provider. You can give each consumer a different valet key. They never have the full key or any of the private data that gives them access to the full key.

OpenID

OpenID allows you to use an existing account to sign in to multiple websites, without needing to create new passwords.

You may choose to associate information with your OpenID that can be shared with the websites you visit, such as a name or email address. With OpenID, you control how much of that information is shared with the websites you visit.

With OpenID, your password is only given to your identity provider, and that provider then confirms your identity to the websites you visit. Other than your provider, no website ever sees your password, so you don’t need to worry about an unscrupulous or insecure website compromising your identity.

OpenID is rapidly gaining adoption on the web, with over one billion OpenID enabled user accounts and over 50,000 websites accepting OpenID for logins. Several large organizations either issue or accept OpenIDs, including Google, Facebook, Yahoo!, Microsoft, and many more.

OpenID was created in the summer of 2005 by an open source community trying to solve a problem that was not easily solved by other existing identity technologies. As such, OpenID is decentralized and not owned by anyone, nor should it be. Today, anyone can choose to use an OpenID or become an OpenID Provider for free without having to register or be approved by any organization.

The OpenID Foundation was formed to assist the open source model by providing a legal entity to be the steward for the community by providing needed infrastructure and generally helping to promote and support expanded adoption of OpenID.


Related Solutions

Telemedicine Describe the privacy risk of telemedicine Describe Security safeguard with telemedicine Describe the strategis for...
Telemedicine Describe the privacy risk of telemedicine Describe Security safeguard with telemedicine Describe the strategis for evaluating the Effectiveness of telemedicine
1-     Describe anxiety disorder. 2-     Describe obsessive-compulsive disorder. 3-     Describe posttraumatic stress disorder. 4-     Describe schizophrenia....
1-     Describe anxiety disorder. 2-     Describe obsessive-compulsive disorder. 3-     Describe posttraumatic stress disorder. 4-     Describe schizophrenia. 5-     Describe bipolar disorder. Note: No prejudice
1. a. describe the HIF1A pathway b. describe how the pathway functions in normoxia, c. describe...
1. a. describe the HIF1A pathway b. describe how the pathway functions in normoxia, c. describe how the pathway functions in hypoxia, d. define the sequence of the HIF response element (HRE) e. describe medical significance of HIF1A pathway
describe present value and future value in detail. Describe an annuity in detail. describe compound interest...
describe present value and future value in detail. Describe an annuity in detail. describe compound interest and simple interest.describe effective annual rate.describe amortization schedule and how principle payments changes over time in this table. you are 22 years old and just landed your first job after college ! explain how yoi should save for retirement ? needed ASAP
Describe the asset-based valuation approach, Name and describe the main drivers of a company value, Describe...
Describe the asset-based valuation approach, Name and describe the main drivers of a company value, Describe the advantages and disadvantages of the income-based approach and Describe the main limitations of the market-based valuation approach.?
1. Describe the purpose of diffusion experiment. 2. Describe the purpose of osmosis experiment. 3. Describe...
1. Describe the purpose of diffusion experiment. 2. Describe the purpose of osmosis experiment. 3. Describe the observation/results of the osmosis experiment.
For a tetrahedron -describe the type of groups of a rectangle -describe the orders of the...
For a tetrahedron -describe the type of groups of a rectangle -describe the orders of the groups -describe the structure of the groups -describe the elements of the groups (make sure to name all the elements and describe them as a group of permutations on the vertices) - describe each group as subgroups of permutation groups -describe all possible orders, types and generators for each subgroup of the group -are any of these groups cyclic and or abelian? -are any...
1. Describe the Unemployment among the different age groups. Describe the Unemployment among different races. Describe...
1. Describe the Unemployment among the different age groups. Describe the Unemployment among different races. Describe Unemployment based on education. Describe the current Unemployment's effect on society and the economy in the long run. You are in charge of recommending a new economic policy that will directly decrease the future's unemployment rate. Explain what your policy would look like. Describe your timeline for effect on unemployment rates; will it be right away, or will it be a long-term solution? Why?
1. Describe wireless networking standards 2. Describe the process of authentication 3. Describe wireless hacking and...
1. Describe wireless networking standards 2. Describe the process of authentication 3. Describe wireless hacking and tools used by hackers and security professionals 4. Explain that configuring an AP varies depending on the embedded OS. 5. Explain how data sent by one station moves between these three components to reach a second station. 6. Explain the security improvements of 802.11i over 802.11b. Book to use: Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hacking and Network Defense, Third Edition. (Chapter 11)...
describe crisis
describe crisis
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT