FIDO Alliance Osaka Seminar
This document discusses how to build an AngularJS application that utilizes Amazon Web Services (AWS) for authentication, storage, and database functionality. It recommends using AWS Identity and Access Management (IAM) to manage user access, AWS Simple Storage Service (S3) for file storage, AWS DynamoDB for the database, and AWS Security Token Service (STS) to generate temporary credentials for unauthenticated users. Code examples are provided for setting up Angular services to interface with each AWS service, handling user login/logout via the STS, and using the services in application controllers.
This document discusses authorization and authentication standards like OAuth2 and OpenID Connect and how an authorization proxy can be used to implement them on Kubernetes. It provides examples of using the authorization code flow and OpenID Connect to authenticate users and delegate access. It also discusses how authorization proxies can be used to secure access to the Kubernetes API and enable fine-grained access management with Istio.
Presentation describes different authentication ways to protect web application. It shows difference between custom approach and authentication with OAuth1 and OAuth2.
The document discusses several HTML5 APIs including notifications, push notifications, service workers, the manifest file, device orientation, ambient light, web speech, capturing audio and video, WebRTC, gamepads, fullscreen, and pointer lock. It provides code examples and explanations for how to implement these APIs to add features like notifications, offline support, motion sensing, microphone access, and immersive experiences to web applications.
Passkeys are a safer and easier alternative to passwords. With passkeys, users can sign in to apps and websites with a biometric sensor (such as a fingerprint or facial recognition), PIN, or pattern, freeing them from having to remember and manage passwords.
The document discusses OAuth 2.0 libraries for PHP and Ruby. For PHP, it describes thephpleague/oauth2-client library which allows configuring 3 endpoint URLs and implementing the OAuth flow with conditional checks. For Ruby, it mentions omniauth/omniauth libraries like omniauth-twitter which simplify implementation by handling most complexity, with differences only in the 3 URLs. It also describes Doorkeeper for developing OAuth servers in Ruby on Rails, which works with Devise and allows registering client apps and users through predefined functions.
Learn about the U2F solution - how it works from registration to authentication. Explore some questions you may have about U2F, and learn how Google uses FIDO-enabled U2F products to achieve their goals in simple, secure authentication. From FIDO Alliance Seminar in Washington, D.C., October, 2015.
What is a RESTful API ? How to build one ? This presentation explain what is a RESTful API and how to build it with a PHP backend.
The document discusses OAuth 2.0 identity management and authorization flows when using the FIWARE Identity Management (IdM) system. It provides examples of configuring an application with IdM, the OAuth 2.0 message flows for authentication and access token retrieval, and methods for securing backend APIs through authentication of access tokens, basic authorization of HTTP verbs and resources, and advanced authorization using XACML policies. Key aspects covered include preliminary application configuration in IdM, the OAuth 2.0 authentication code grant flow, validating access tokens with IdM, and calling APIs while passing authorization information in HTTP headers.