@inproceedings{a307130ceca24b7a8ede4deaf401f135,
title = "Security Issues in OAuth 2.0 SSO Implementations",
abstract = "Many Chinese websites (relying parties) use OAuth 2.0 as the basis of a single sign-on service to ease password management for users. Many sites support five or more different OAuth 2.0 identity providers, giving users choice in their trust point. However, although OAuth 2.0 has been widely implemented (particularly in China), little attention has been paid to security in practice. In this paper we report on a detailed study of OAuth 2.0 implementation security for ten major identity providers and 60 relying parties, all based in China. This study reveals two critical vulnerabilities present in many implementations, both allowing an attacker to control a victim user{\textquoteright}s accounts at a relying party without knowing the user{\textquoteright}s account name or password. We provide simple, practical recommendations for identity providers and relying parties to enable them to mitigate these vulnerabilities. The vulnerabilities have been reported to the parties concerned.",
keywords = "user agent, resource owner, identity provider, security assertion markup language, identity federation",
author = "Wanpeng Li and Chris Mitchell",
year = "2014",
month = oct,
day = "14",
doi = "10.1007/978-3-319-13257-0_34",
language = "English",
isbn = "978-3-319-13256-3",
series = "Lecture Notes in Computer Science",
publisher = "Springer ",
pages = "529--541",
editor = "SSM Chow and {Camenisch }, J and {Hui }, {LCK } and SM Yui",
booktitle = "International Conference on Information Security",
}