SlideShare une entreprise Scribd logo
1  sur  137
Télécharger pour lire hors ligne
From authentication
to identity
management
Mehdi Medjaoui
Mehdi
Medjaoui
@medjawi
webshell.io
oauth.io
Authentication
Bob
I want to upload my
photos to access
them from anywhere
Photo.service
Photo.service

Hi Photo.
service!
Photo.service

Hi! Who is it?
Photo.service

I’m Bob
Photo.service

Prove it!
Photo.service

Here’s my
secret: ...
Photo.service

Oh it’s you
Bob!
Photo.service
Photo.service
Here’s my
secret: ...
Here’s my
password
Why passwords?
Identification
Authentication = Identification + Verification
To correctly verify someone,
a secret must relate to:
- what they know
- what they have
- what they are
- what they can do
But why passwords???
In theory
Security vs Convenience
Photo.service
Photo.service

Music.service
Photo.service

Music.service
Photo.service

Social.service

Music.service

Video.service

Email.service
Photo.service

Social.service

Photo.service

Social.service

Photo.service

Social.service

Music.service

Email.service

Video.service

Music.service

Email.service

Video.service

Music.service

Video.service

Email.service
Got cloudy these days...
Multiplication of web services have
made passwords
- hard to remember if unique
Multiplication of web services have
made passwords
- hard to remember if unique
- annoying to type all day if strong
password hell
Multiplication of web services have
made passwords
- hard to remember if unique
- annoying to type all day if strong
- weak if not unique
Passwords (even strong)
do not scale
with a growing number of services
Solution = Password manager ?
simple interface design
Single Sign-On
Single Sign-On

Single sign-on (SSO) is a property of
access control of multiple related,
but independent software systems.
The promise of SSO:
- UX with frictionless sign in and higher conversion
- Reduced IT costs
- Retrieving data with user’s consent but without annoying
forms
- Reduced password leak risks
- SAML
- OpenID
- Facebook connect
- OAuth
- Persona
IDP
Identity
provider
Photo.service
I’m Bob from
IDP
Is it really
Bob?

Photo.service

IDP
Identity
provider
IDP
Identity
provider
Photo.service

Prove to me
you’re Bob!
IDP
Identity
provider
Photo.service

Here’s my
session /
password
IDP
Identity
provider
Photo.service
You’re good
He’s indeed
Bob.

Photo.service

IDP
Identity
provider
Hi Bob!
Gimme fotoz!

Photo.service

IDP
Identity
provider
Google

myspace

Yahoo

Photo.service
?

The user
makes the
choice
-

Based on URLs for personal data
http://google.com/profiles/me
username.wordpress.com
blogname.blogspot.com
www.myspace.com/username
Authorization
I want to print my
photos from photo.
service with printer.
service
The wrong way:
Photo.service
has Resource
Printer.service
needs Resource

Key to photo.
service
Photo.service
has Resource
Printer.service
needs Resource
Hi, I want to
print my
photos.
Photo.service
credentials?

Printer.service
needs Resource

Photo.service
has Resource
Photo.service
has Resource
Printer.service
needs Resource
Sure:
Hi I’m Bob & I
have the key

Printer.service
needs Resource

Photo.service
has Resource
You’re indeed
Bob.

Printer.service
needs Resource

Photo.service
has Resource
Please send
me these
photos
Printer.service
needs Resource

Photo.service
has Resource
Here you go

Printer.service
needs Resource

Photo.service
has Resource
I printed the
photos.

Printer.service
needs Resource

Photo.service
has Resource
I’m gonna
look at all of
Bob’s photos!
Rogue Printer.
service
needs Resource

Photo.service
has Resource
without his
consent...

Rogue Printer.
service
needs Resource

Photo.service
has Resource
Never give your
password to
other services
Authorization is
the solution
2008
Facebook
has Resource
some.service
needs
resource
Photo.service
has Resource
Printer.service
needs Resource

Key to photo.
service
Photo.service
has Resource
Printer.service
needs Resource
Hi, I’m Bob.
I have support
for Photo.
service, ...
Printer.service
needs Resource

Photo.service
has Resource
I have support
for Photo.
service, ...
Printer.service
needs Resource

Photo.service
has Resource

Note: choice of
supported resource
providers has also to
be made by printer.
service
Photo.service
has Resource
Printer.service
needs Resource
Please use
Photo.service
Hi, I’m Printer.
service

Printer.service
needs Resource

Photo.service
has Resource
Prove it!

Printer.service
needs Resource

Photo.service
has Resource
Here’s my
client_secret

Printer.service
needs Resource

Photo.service
has Resource
You’re good.

Printer.service
needs Resource

Photo.service
has Resource
I need access to
Bob’s photos

Printer.service
needs Resource

Photo.service
has Resource
Photo.service
has Resource
Printer.service
needs Resource

Who are you?
Photo.service
has Resource
Printer.service
needs Resource
I’m Bob. Here’
s my key
Photo.service
has Resource
Printer.service
needs Resource

Do you allow
Pr.S. to access
your photos?
Photo.service
has Resource
Printer.service
needs Resource
Sure!
You now have
access to Bob’
s photos
Printer.service
needs Resource

Photo.service
has Resource
Send me the
holiday photos!

Printer.service
needs Resource

Photo.service
has Resource
Here you go!

Printer.service
needs Resource

Photo.service
has Resource
I printed the
photos.

Printer.service
needs Resource

Photo.service
has Resource
Photo.service
has Resource
Printer.service
needs Resource
Note: Printer.service
does not hold Bob’s
key to Photo.service
The PHOTO app chooses and
control what OAuth provider to
integrate, so the user cannot
choose the identity he wants
Based on API authorizations and
endpoints between applications
-
Single Sign-On
conclusion
- OpenID (URLs) is a group of companies that trust
each other to be an identity provider (IDP)
OpenID let the choice to the user of the IDP
- Facebook connect (Facebook Connect was the single
sign on of Facebook affiliate ecosystem)
- OAuth : the OAuth provider know the user AND the
application. The End user application choose the IDP
the end user can connect with.
OpenID

OAuth

SAML

Dates from

2005

2006

2001

Current version

OpenID 2.0

OAuth 2.0

SAML 2.0

API
Single sign-on
Single sign-on authorization
for enterprise
Main purpose for consumers
between
users
applications

Protocols used

XRDS, HTTP

JSON, HTTP

SAM, XML,
HTTP, SOAP
OAuth and the
Highway to Hell
OAuth 2.0 and the
Road to Hell
(Eran Hammer)
OAuth 1.0
(2007)
OAuth provides a method for clients to access server
resources on behalf of a resource owner (such as a
different client or an end- user). It also provides a
process for end-users to authorize third-party access to
their server resources without sharing their credentials
(typically, a username and password pair), using useragent redirections.

http://tools.ietf.org/html/rfc5849
Context :
- php 4
- no https
- Google involved
- not Open ID

OAuth 1.0
(2007)

Pain:
- Signatures
- Broken libraries
- Extensions
- Crappy specifications
From Eran Hammer #FuckOauth
OAuth 2.0 - Looking Back and Moving On
OAuth 1.0a
(one legged)

OAuthBible

#
OAuth 1.0a
(two legged)

OAuthBible

#
OAuth 1.0a
(three legged)

OAuthBible

#
OAuth 1.0a
(Echo)

OAuthBible

#
OAuth 1.0a
(xAuth)

OAuthBible

#
OAuth 2.0
Authentication and Signatures
- Stop cryptographic requirements of
signing requests with the client ID and
secret and replaces signatures with
requiring HTTPS for all
communications between browsers,
clients and the API.
User Experience and Alternative Authorization
Flows

OAuth 2 supports a better user experience for
native applications, and supports extending
the protocol to provide compatibility with
future device requirements.
Performance at Scale
- Many steps require state management and temporary
credentials, which require shared storage and are
difficult to synchronize across data centers.
- requires that the API server has access to the
application's ID and secret, which often breaks the
architecture of most large providers where the
authorization server and API servers are completely
separate.
- OAuth 2.0 (Two-legged)
Client credential
Resource user password
- OAuth 2.0 (Three-legged)
- OAuth 2.0 (Refresh token)
Scopes are often not implemented the good way,
following the specs.
Sometimes spaces are not set, names are different
from providers….
#OAuthBible
OAuth is fragmented.
OAuth is broken.
OAuth 2.0 is a
compromise.
-
Eran Hammer has quit the
OAuth 2.0 Board.
He is building Oz.
Solutions to Consume OAuth ?
- The IETF specs
- The OAuth Bible
- Open source libraries (omniauth
for ruby, requests or foauth for
python, passport for node.js…)
- Janrain, Dailycred
- OAuth.io
OAuth.io
Demo
OAuth.io
OAuth.io
Demo
oauthd
Open source version of
OAuth.io
The Glue of OAuth?
https://github.com/oauth-io/oauthd/blob/master/providers
OAuth Report
#SOCIAL LOGIN
The future?
Mozilla Persona (Browser ID)
Docker.io
Thank you!
Mehdi Medjaoui
@medjawi
webshell.io
oauth.io

Contenu connexe

Similaire à OAuth with OAuth.io : solving the OAuth Fragmentation for Identity Management on the Web

APIdays Paris 2018 - Learning the OAuth Dance (Without Stepping on Anyone's T...
APIdays Paris 2018 - Learning the OAuth Dance (Without Stepping on Anyone's T...APIdays Paris 2018 - Learning the OAuth Dance (Without Stepping on Anyone's T...
APIdays Paris 2018 - Learning the OAuth Dance (Without Stepping on Anyone's T...apidays
 
Broker: adventure through architecture pattern
Broker: adventure through architecture patternBroker: adventure through architecture pattern
Broker: adventure through architecture patternPivorak MeetUp
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground UpMichael Bleigh
 
Authentication across the Atlassian Ecosystem - AtlasCamp 2011
Authentication across the Atlassian Ecosystem - AtlasCamp 2011Authentication across the Atlassian Ecosystem - AtlasCamp 2011
Authentication across the Atlassian Ecosystem - AtlasCamp 2011Atlassian
 
Serverless OAuth: Authorizing Third-Party Applications to Your Serverless API...
Serverless OAuth: Authorizing Third-Party Applications to Your Serverless API...Serverless OAuth: Authorizing Third-Party Applications to Your Serverless API...
Serverless OAuth: Authorizing Third-Party Applications to Your Serverless API...Amazon Web Services
 
Web Services with OAuth
Web Services with OAuthWeb Services with OAuth
Web Services with OAuthMarcus Ramberg
 
Data Synchronization Patterns in Mobile Application Design
Data Synchronization Patterns in Mobile Application DesignData Synchronization Patterns in Mobile Application Design
Data Synchronization Patterns in Mobile Application DesignEric Maxwell
 
Better Service Through Promise Theory
Better Service Through Promise TheoryBetter Service Through Promise Theory
Better Service Through Promise TheoryJeff Sussna
 
OAuth you said
OAuth you saidOAuth you said
OAuth you saidOAuth.io
 
Kata Pengantar Proposal Pdf. Online assignment writing service.
Kata Pengantar Proposal Pdf. Online assignment writing service.Kata Pengantar Proposal Pdf. Online assignment writing service.
Kata Pengantar Proposal Pdf. Online assignment writing service.Julie Smith
 
03_Overview of Azure AI and How to Use It Today_GAB2019
03_Overview of Azure AI and How to Use It Today_GAB201903_Overview of Azure AI and How to Use It Today_GAB2019
03_Overview of Azure AI and How to Use It Today_GAB2019Kumton Suttiraksiri
 
Torii: Ember.js Authentication Library
Torii: Ember.js Authentication LibraryTorii: Ember.js Authentication Library
Torii: Ember.js Authentication LibraryCory Forsyth
 
How did you use new media technologies in
How did you use new media technologies inHow did you use new media technologies in
How did you use new media technologies inJessicaChong96
 
Introduction to OAuth 2.0 - Part 1
Introduction to OAuth 2.0  - Part 1Introduction to OAuth 2.0  - Part 1
Introduction to OAuth 2.0 - Part 1Nabeel Yoosuf
 
Integrating services with OAuth
Integrating services with OAuthIntegrating services with OAuth
Integrating services with OAuthLuca Mearelli
 

Similaire à OAuth with OAuth.io : solving the OAuth Fragmentation for Identity Management on the Web (20)

APIdays Paris 2018 - Learning the OAuth Dance (Without Stepping on Anyone's T...
APIdays Paris 2018 - Learning the OAuth Dance (Without Stepping on Anyone's T...APIdays Paris 2018 - Learning the OAuth Dance (Without Stepping on Anyone's T...
APIdays Paris 2018 - Learning the OAuth Dance (Without Stepping on Anyone's T...
 
OAuth
OAuthOAuth
OAuth
 
Broker: adventure through architecture pattern
Broker: adventure through architecture patternBroker: adventure through architecture pattern
Broker: adventure through architecture pattern
 
Focus on Publishers
Focus on PublishersFocus on Publishers
Focus on Publishers
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground Up
 
Authentication across the Atlassian Ecosystem - AtlasCamp 2011
Authentication across the Atlassian Ecosystem - AtlasCamp 2011Authentication across the Atlassian Ecosystem - AtlasCamp 2011
Authentication across the Atlassian Ecosystem - AtlasCamp 2011
 
Serverless OAuth: Authorizing Third-Party Applications to Your Serverless API...
Serverless OAuth: Authorizing Third-Party Applications to Your Serverless API...Serverless OAuth: Authorizing Third-Party Applications to Your Serverless API...
Serverless OAuth: Authorizing Third-Party Applications to Your Serverless API...
 
Web Services with OAuth
Web Services with OAuthWeb Services with OAuth
Web Services with OAuth
 
Data Synchronization Patterns in Mobile Application Design
Data Synchronization Patterns in Mobile Application DesignData Synchronization Patterns in Mobile Application Design
Data Synchronization Patterns in Mobile Application Design
 
Better Service Through Promise Theory
Better Service Through Promise TheoryBetter Service Through Promise Theory
Better Service Through Promise Theory
 
OAuth you said
OAuth you saidOAuth you said
OAuth you said
 
Kata Pengantar Proposal Pdf. Online assignment writing service.
Kata Pengantar Proposal Pdf. Online assignment writing service.Kata Pengantar Proposal Pdf. Online assignment writing service.
Kata Pengantar Proposal Pdf. Online assignment writing service.
 
Top X OAuth 2 Hacks
Top X OAuth 2 HacksTop X OAuth 2 Hacks
Top X OAuth 2 Hacks
 
OSDC - Open and Accessible
OSDC - Open and AccessibleOSDC - Open and Accessible
OSDC - Open and Accessible
 
03_Overview of Azure AI and How to Use It Today_GAB2019
03_Overview of Azure AI and How to Use It Today_GAB201903_Overview of Azure AI and How to Use It Today_GAB2019
03_Overview of Azure AI and How to Use It Today_GAB2019
 
Torii: Ember.js Authentication Library
Torii: Ember.js Authentication LibraryTorii: Ember.js Authentication Library
Torii: Ember.js Authentication Library
 
How did you use new media technologies in
How did you use new media technologies inHow did you use new media technologies in
How did you use new media technologies in
 
Introduction to OAuth 2.0 - Part 1
Introduction to OAuth 2.0  - Part 1Introduction to OAuth 2.0  - Part 1
Introduction to OAuth 2.0 - Part 1
 
Q4
Q4Q4
Q4
 
Integrating services with OAuth
Integrating services with OAuthIntegrating services with OAuth
Integrating services with OAuth
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

OAuth with OAuth.io : solving the OAuth Fragmentation for Identity Management on the Web