Abstract
Recent practical studies have revealed that, in practice, widely used identity management schemes such as OAuth 2.0 and OpenID Connect are often poorly implemented by relying parties, and as a result very serious vulnerabilities can result. In any event, any system relying on browser redirections, as is the case for OAuth 2.0 and OpenID Connect, is vulnerable to web-spoofing and phishing attacks. Many of these vulnerabilities would disappear if the user‘s browser (or other agent under user control) remained in charge of what credentials are divulged to whom, and when. We outline a system known as Uni-IdM, which has been successfully prototyped, which provides a generic service of this type. Through the installation of a simple JavaScript plugin, the user is provided with a unified means of managing and using all his or her credentials via a simple and intuitive interface, which will work with a multiplicity of identity management systems. This not only reduces the risk of credential and/or account compromise, but also greatly simplifies the work of the user in credential management as well as providing a much clearer view to the user of which end parties are being sent user information.
Original language | English |
---|---|
Title of host publication | Information Security Solutions Europe |
Subtitle of host publication | ISSE 2015 |
Editors | H. Reimer, N. Pohlmann, W. Schneider |
Publisher | Springer |
Pages | 251-259 |
ISBN (Electronic) | 978-3-658-10934-9 |
ISBN (Print) | 978-3-658-10933-2 |
DOIs | |
Publication status | Published - 6 Oct 2015 |
Externally published | Yes |