Addressing Threats to Real-World Identity Management Systems

Wanpeng Li, Chris J. Mitchell

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

Abstract

Recent practical studies have revealed that, in practice, widely used identity management schemes such as OAuth 2.0 and OpenID Connect are often poorly implemented by relying parties, and as a result very serious vulnerabilities can result. In any event, any system relying on browser redirections, as is the case for OAuth 2.0 and OpenID Connect, is vulnerable to web-spoofing and phishing attacks. Many of these vulnerabilities would disappear if the user‘s browser (or other agent under user control) remained in charge of what credentials are divulged to whom, and when. We outline a system known as Uni-IdM, which has been successfully prototyped, which provides a generic service of this type. Through the installation of a simple JavaScript plugin, the user is provided with a unified means of managing and using all his or her credentials via a simple and intuitive interface, which will work with a multiplicity of identity management systems. This not only reduces the risk of credential and/or account compromise, but also greatly simplifies the work of the user in credential management as well as providing a much clearer view to the user of which end parties are being sent user information.
Original languageEnglish
Title of host publicationInformation Security Solutions Europe
Subtitle of host publicationISSE 2015
EditorsH. Reimer, N. Pohlmann, W. Schneider
PublisherSpringer
Pages251-259
ISBN (Electronic)978-3-658-10934-9
ISBN (Print)978-3-658-10933-2
DOIs
Publication statusPublished - 6 Oct 2015
Externally publishedYes

Fingerprint

Dive into the research topics of 'Addressing Threats to Real-World Identity Management Systems'. Together they form a unique fingerprint.

Cite this