SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
Securing APIs With WSO2 Identity Server
Thursday, November 05, 2020
Hello!
Janak Amarasena
Isura Karunaratne
Senior Software Engineer
isura@wso2.com
janak@wso2.com
Technical Lead
About ‘API Security and Beyond’ Webinar Series
3
4
Addresses full API lifecycle
management operations. Open,
extensible, customizable.
200K+ APIs for 20K+ Orgs
Hybrid integration platform for
quick, iterative integration of any
application, data, or system.
6 Trillion Transactions/yr
Federates and manages identities
across both cloud service and
enterprise environments.
250M+ identities managed
WSO2 API MANAGER WSO2 IDENTITY SERVERWSO2 ENTERPRISE INTEGRATOR
WSO2 Integration Platform
5
WSO2 Identity Server is a strong performer
among the 13 CIAM providers that matter
most according to Forrester Research, Inc..
● Highest scores possible in customer
authentication, self service, business
integration, reporting and dashboarding, and
privacy & consent management in the
Product Offering category
● Highest scores for commercial model in
strategy and authentication plans
WSO2 Identity Server has been recognized as a strong performer
API Economy
100% of revenue comes
through API calls
Source
https://www.information-age.com/organisations-advantage-api-economy-123485729/
APIs and API Economy
7
Akamai Survey Report 2019
“Our survey of API traffic surprised us by revealing that 83% of the
hits we see there are API driven. ”
“For security practitioners, this is vitally important.”
Source -
(https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/state-of-the-internet-security-retail-attacks-and-api-traffic-report-2
019.pdf)
APIs and API Economy
8
Importance of API security
APIs will become the
#1 Attack vector by 2022
10
● Facebook Security breach
⦾ 50 million affected users
● Google plus security breach
⦾ Over 50 million affected users
● An average Application or API has 26.7 vulnerabilities.
● 81% of confirmed data breaches have used stolen valid credentials.
Importance of API security
11
Source -
(https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html, https://www.wired.com/story/google-plus-bug-52-million-users-data-exposed,
https://techbeacon.com/app-dev-testing/post-equifax-why-api-security-should-be-priority)
Failure of API security can affect on
● Operation level disruptions
● Negative publicity
● Legal problems
● Repeat attacks
Importance of API security
12
Role of API Key Manager
Role of API Key Manager
14
Introduction to WSO2 Identity Server
16
Key Capabilities
● Identity federation and SSO
● Identity bridging
● MFA and adaptive authentication
● Managing access to APIs
● Fine-grained access control
● Consent management
● Accounts management
● Progressive profiling
● RESTful APIs for integration
● Regulatory compliance
● Identity analytics
WSO2 Identity Server Capabilities
17
Key Capabilities
● Extended Access Delegation Capabilities
● Strong and Adaptive Authentication
● Cross Protocol Single Sign-On / Sign-Out
● Enforce authorization
● End-User Identity Management
● Privacy management
Why IAM is important in API Management
API Security capabilities of WSO2
Identity Server
Leveraging OAuth 2.0 capabilities
● Generating access tokens with various grant types and flows
⦿ Authorization Code grant
⦿ Client Credentials grant
⦿ Implicit grant | Discouraged in OAuth 2.0 Security BCP document
⦿ Password grant | Deprecated in OAuth 2.0 Security BCP document
⦿ JWT Bearer grant
⦿ SAML2 Bearer grant
⦿ OIDC hybrid flow
⦿ Several other grant types and flows
⦿ Extension points to easily deploy custom grants and flows
● Support for security best practices
⦿ PKCE flow for authorization code grant
⦿ Refresh token rotation
⦿ Encryption/Hashing of client secret
19
Leveraging OAuth 2.0 capabilities contd.
● Token introspection
⦿ Checking the validity of the token received to the API Gateway
● Revoking tokens
⦿ Supports token revocation via standard API
⦿ Auto token revocation when a user state changes (locked, deleted, credential
change, etc)
⦿ Auto token revocation when a application state changes (disabled, deleted, etc.)
⦿ Extension points to add token revocation based on events
⦿ Firing events when token revocation happens
20
Easy integration of capabilities
● Fully API enabled
⦿ Support for standard APIs
● Service discovery via standard APIs
⦿ Webfinger
⦿ Discovery
⦿ JWKS
● DCR and DCRM API support for client application registration and
management via APIs
21
Scope validation
● Scope is a mechanism in OAuth 2.0 to limit the application's access to a user's
protected resources
● Able to define scope validators to validate the scopes being assigned to a
access token
● OOTB scope validators
⦿ Roles based
⦿ XACML based
● Extension point to easily deploy a custom scope validator
● REST API to manage scopes
22
Fine-grained access control
● Includes a fully fledged XACML engine
● API enabled. Invoke XACML policy checks via APIs.
● Integration support with a Open Policy Agent(OPA) engine for policy evaluation
at user authentication for token generation
23
Event notifications and extensibility
● Eventing framework that fires events
⦿ Several examples;
⦾ Alerts on user such claim updates
⦾ Alerts on user getting locked
● Extension points to easily deploy event listeners to listen on required events
and relay information to the API Manager
⦾ Ex: Clear gateway token related cache when a token revocation happens
● Extension points to add custom components and extend product capabilities
according to business needs
⦿ Several examples;
⦾ Adding a custom token type
⦾ Adding custom token validation at introspection
⦾ Introducing a new grant type
24
Demo
Setup
26
Scenario 01 - Secured API calls
Generate an access token with user John using the Authorization Code grant to
make a secured API call
● Generate a token
● Invoke introspection endpoint
● Invoke the [GET] /menu API
27
Scenario 02 - Implicit token revocation
Update user Johns’ credentials and try to invoke a API with the previously generated
token
● Invoke introspection endpoint
● Update user Johns’ credentials
● Invoke the [GET] /menu API
● Invoke introspection endpoint
28
Scenario 03 - Role based scope validation
Obtain a token with the “add” scope to call the [POST]/order API
● Check role required for the scope “add”
● Try to generate a token with user John
● Generate a token with user Jane
● Invoke the [POST] /order API
29
Scenario 04 - Explicit token revocation
Call the OAuth token revocation endpoint and revoke an access token
● Invoke introspection endpoint
● Invoke token revocation endpoint
● Invoke the [POST] /order API
● Invoke introspection endpoint
30
Scenario 05 - Fine-grained access control with XACML
Invoke the XACML policy decision point for a [POST]/order API call
● XACML configuration
● Generate an access token with client credentials grant
● Invoke XACML PDP
31
Let’s Recap
32
● API Economy
● Importance of API security
● Role of API Key Manager
● Introduction to WSO2 Identity Server
● API Security capabilities of WSO2 Identity Server
● Demo
Question Time!
33
Next in the Series
34
wso2.com
Thanks!

Weitere ähnliche Inhalte

Mehr von WSO2

WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...WSO2
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2
 
WSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2
 

Mehr von WSO2 (20)

WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in Uganda
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
 

Kürzlich hochgeladen

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Securing APIs With WSO2 Identity Server

  • 1. Securing APIs With WSO2 Identity Server Thursday, November 05, 2020
  • 2. Hello! Janak Amarasena Isura Karunaratne Senior Software Engineer isura@wso2.com janak@wso2.com Technical Lead
  • 3. About ‘API Security and Beyond’ Webinar Series 3
  • 4. 4 Addresses full API lifecycle management operations. Open, extensible, customizable. 200K+ APIs for 20K+ Orgs Hybrid integration platform for quick, iterative integration of any application, data, or system. 6 Trillion Transactions/yr Federates and manages identities across both cloud service and enterprise environments. 250M+ identities managed WSO2 API MANAGER WSO2 IDENTITY SERVERWSO2 ENTERPRISE INTEGRATOR WSO2 Integration Platform
  • 5. 5 WSO2 Identity Server is a strong performer among the 13 CIAM providers that matter most according to Forrester Research, Inc.. ● Highest scores possible in customer authentication, self service, business integration, reporting and dashboarding, and privacy & consent management in the Product Offering category ● Highest scores for commercial model in strategy and authentication plans WSO2 Identity Server has been recognized as a strong performer
  • 7. 100% of revenue comes through API calls Source https://www.information-age.com/organisations-advantage-api-economy-123485729/ APIs and API Economy 7
  • 8. Akamai Survey Report 2019 “Our survey of API traffic surprised us by revealing that 83% of the hits we see there are API driven. ” “For security practitioners, this is vitally important.” Source - (https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/state-of-the-internet-security-retail-attacks-and-api-traffic-report-2 019.pdf) APIs and API Economy 8
  • 9. Importance of API security
  • 10. APIs will become the #1 Attack vector by 2022 10
  • 11. ● Facebook Security breach ⦾ 50 million affected users ● Google plus security breach ⦾ Over 50 million affected users ● An average Application or API has 26.7 vulnerabilities. ● 81% of confirmed data breaches have used stolen valid credentials. Importance of API security 11 Source - (https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html, https://www.wired.com/story/google-plus-bug-52-million-users-data-exposed, https://techbeacon.com/app-dev-testing/post-equifax-why-api-security-should-be-priority)
  • 12. Failure of API security can affect on ● Operation level disruptions ● Negative publicity ● Legal problems ● Repeat attacks Importance of API security 12
  • 13. Role of API Key Manager
  • 14. Role of API Key Manager 14
  • 15. Introduction to WSO2 Identity Server
  • 16. 16 Key Capabilities ● Identity federation and SSO ● Identity bridging ● MFA and adaptive authentication ● Managing access to APIs ● Fine-grained access control ● Consent management ● Accounts management ● Progressive profiling ● RESTful APIs for integration ● Regulatory compliance ● Identity analytics WSO2 Identity Server Capabilities
  • 17. 17 Key Capabilities ● Extended Access Delegation Capabilities ● Strong and Adaptive Authentication ● Cross Protocol Single Sign-On / Sign-Out ● Enforce authorization ● End-User Identity Management ● Privacy management Why IAM is important in API Management
  • 18. API Security capabilities of WSO2 Identity Server
  • 19. Leveraging OAuth 2.0 capabilities ● Generating access tokens with various grant types and flows ⦿ Authorization Code grant ⦿ Client Credentials grant ⦿ Implicit grant | Discouraged in OAuth 2.0 Security BCP document ⦿ Password grant | Deprecated in OAuth 2.0 Security BCP document ⦿ JWT Bearer grant ⦿ SAML2 Bearer grant ⦿ OIDC hybrid flow ⦿ Several other grant types and flows ⦿ Extension points to easily deploy custom grants and flows ● Support for security best practices ⦿ PKCE flow for authorization code grant ⦿ Refresh token rotation ⦿ Encryption/Hashing of client secret 19
  • 20. Leveraging OAuth 2.0 capabilities contd. ● Token introspection ⦿ Checking the validity of the token received to the API Gateway ● Revoking tokens ⦿ Supports token revocation via standard API ⦿ Auto token revocation when a user state changes (locked, deleted, credential change, etc) ⦿ Auto token revocation when a application state changes (disabled, deleted, etc.) ⦿ Extension points to add token revocation based on events ⦿ Firing events when token revocation happens 20
  • 21. Easy integration of capabilities ● Fully API enabled ⦿ Support for standard APIs ● Service discovery via standard APIs ⦿ Webfinger ⦿ Discovery ⦿ JWKS ● DCR and DCRM API support for client application registration and management via APIs 21
  • 22. Scope validation ● Scope is a mechanism in OAuth 2.0 to limit the application's access to a user's protected resources ● Able to define scope validators to validate the scopes being assigned to a access token ● OOTB scope validators ⦿ Roles based ⦿ XACML based ● Extension point to easily deploy a custom scope validator ● REST API to manage scopes 22
  • 23. Fine-grained access control ● Includes a fully fledged XACML engine ● API enabled. Invoke XACML policy checks via APIs. ● Integration support with a Open Policy Agent(OPA) engine for policy evaluation at user authentication for token generation 23
  • 24. Event notifications and extensibility ● Eventing framework that fires events ⦿ Several examples; ⦾ Alerts on user such claim updates ⦾ Alerts on user getting locked ● Extension points to easily deploy event listeners to listen on required events and relay information to the API Manager ⦾ Ex: Clear gateway token related cache when a token revocation happens ● Extension points to add custom components and extend product capabilities according to business needs ⦿ Several examples; ⦾ Adding a custom token type ⦾ Adding custom token validation at introspection ⦾ Introducing a new grant type 24
  • 25. Demo
  • 27. Scenario 01 - Secured API calls Generate an access token with user John using the Authorization Code grant to make a secured API call ● Generate a token ● Invoke introspection endpoint ● Invoke the [GET] /menu API 27
  • 28. Scenario 02 - Implicit token revocation Update user Johns’ credentials and try to invoke a API with the previously generated token ● Invoke introspection endpoint ● Update user Johns’ credentials ● Invoke the [GET] /menu API ● Invoke introspection endpoint 28
  • 29. Scenario 03 - Role based scope validation Obtain a token with the “add” scope to call the [POST]/order API ● Check role required for the scope “add” ● Try to generate a token with user John ● Generate a token with user Jane ● Invoke the [POST] /order API 29
  • 30. Scenario 04 - Explicit token revocation Call the OAuth token revocation endpoint and revoke an access token ● Invoke introspection endpoint ● Invoke token revocation endpoint ● Invoke the [POST] /order API ● Invoke introspection endpoint 30
  • 31. Scenario 05 - Fine-grained access control with XACML Invoke the XACML policy decision point for a [POST]/order API call ● XACML configuration ● Generate an access token with client credentials grant ● Invoke XACML PDP 31
  • 32. Let’s Recap 32 ● API Economy ● Importance of API security ● Role of API Key Manager ● Introduction to WSO2 Identity Server ● API Security capabilities of WSO2 Identity Server ● Demo
  • 34. Next in the Series 34