Really important point, at least in the case of UMA we are clear about managing access, but even there authorization gets munged into authentication or identity.  Some stems from the name, but more from misunderstanding, thanks for reminding me about this article, good time to push it.

 

From: wg-uma-bounces@kantarainitiative.org [mailto:wg-uma-bounces@kantarainitiative.org] On Behalf Of Justin Richer
Sent: Sunday, November 13, 2016 3:05 PM
To: John Wunderlich
Cc: wg-uma@kantarainitiative.org UMA
Subject: Re: [WG-UMA] Applicability of OAuth 2.0 hack to UMA?

 

Not only that, but many of the attacks are on assumptions about how to use OAuth to make an authentication protocol. The paper does a decent job of explaining this, and I’ve also written an article on the topic:

 

https://oauth.net/articles/authentication/

 

The same assumptions would be applied to UMA, which is also not an identity and authentication protocol.

 

 — Justin

 

On Nov 14, 2016, at 4:46 AM, John Wunderlich <john@wunderlich.ca> wrote:

 

Thanks


 

Sincerely,
John Wunderlich
@PrivacyCDN

Call: +1 (647) 669-4749
eMail: john@wunderlich.ca

 

On 13 November 2016 at 14:44, Sarah Squire <sarah@engageidentity.com> wrote:

Because UMA leverages OAuth transactions, it is vulnerable to these same attacks. However, they can be mitigated by use of existing Proof Key for Code Exchange (PKCE - pronounced "pixie") protocols. I know Justin has implemented PKCE in MITREid Connect. Not sure about other implementations.

 

Sarah


Sarah Squire

Engage Identity

 

On Sun, Nov 13, 2016 at 11:28 AM, John Wunderlich <john@wunderlich.ca> wrote:

Has anyone looked at Signing into One Billion Mobile LApp Accounts Effortlessly with OAuth 2.0.” for applicability to UMA?

 

Sincerely,
John Wunderlich
@PrivacyCDN

Call: +1 (647) 669-4749
eMail: john@wunderlich.ca

 

 

This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.


_______________________________________________
WG-UMA mailing list
WG-UMA@kantarainitiative.org
http://kantarainitiative.org/mailman/listinfo/wg-uma

 

 

 

 

This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.

_______________________________________________
WG-UMA mailing list
WG-UMA@kantarainitiative.org
http://kantarainitiative.org/mailman/listinfo/wg-uma