A Performance Optimization Model towards OAuth 2.0 Adoption in the Enterprise

نویسندگان

  • M. Noureddine
  • R. Bashroush
چکیده

As Cloud software (Software-as-a-Service) become more and more ubiquitous, the scale and performance expectations become an important factor impacting architectural decisions for security protocol adoption. WS-Trust[6] and WS-Federation[7] are enterprise scale protocols but lacked wide adoption due to complexity. OAuth 1.0 emerged as an industry standard for unifying identity management for major SaaS players. However, OAuth 1.0 soon was proven to fail performance criteria for enterprise adoption. With the introduction of OAuth 2.0 some of the performance concerns were addressed. This paper proposes an optimization to OAuth 2.0 for enterprise adoption. This optimization is achieved by introducing manageability steps to pre-establish trust amongst the client and the protected resource server. In this model, the client needs to set up trust with the protected resource server as well as with the authorization server. These clients are called highly trusted clients. We believe such optimization makes it feasible to adopt OAuth in the enterprise where scale and performance are critical factors.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The quest towards a winning Enterprise 2.0 collaboration technology adoption strategy

Although Enterprise 2.0 collaboration technologies present enterprises with a significant amount of business benefits; enterprises are still facing challenges in promoting and sustaining end-user adoption. The purpose of this paper is to provide a systematic review on Enterprise 2.0 collaboration technology adoption models, challenges, as well as to provide emerging statistic approaches that pu...

متن کامل

A Proposed Model for Assessing the Determinants of Enterprise Resource Planning Adoption and Satisfaction

 The complex information systems such as enterprise resource planning (ERP) systems are essential for organizations to make them competitive. However, the success of ERP system projects is a difficult process as it involves different types of end user assessment. The main objective of the present study is to find the key determinants that open the door to employee satisfaction and adoption of E...

متن کامل

Future Proofing the OAuth 2.0 Authorization Code Grant Protocol by the application of BCM Principles

OAuth 2.0 Authorization Framework, while achieved an extremely large adoption, has been exposed to various attacks and a number of additional specifications to patch the problem has been created. It is expected that other attacks would come in the future requiring yet another patch specification. To avoid such future problems, a more systematic approach is needed. This paper attempts to do it b...

متن کامل

Security evaluation of the OAuth 2.0 framework

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third party ap...

متن کامل

Towards Improving the Usability and Security of Web Single Sign-On Systems

OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted by high-profile identity providers (IdPs), such as Facebook, Google, Microsoft, and Yahoo, and millions of relying party (RP) websites. However, the average users’ perceptions of web SSO and the systems’ security guarantees are still poorly understood. Aimed at filling these knowledge gaps, we co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011