Skip to main content
Top

2016 | OriginalPaper | Chapter

A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server

Authors : Jungsoo Park, Jinouk Kim, Minho Park, Souhwan Jung

Published in: Information Security Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

OAuth was created to simplify authentication procedure. OAuth is a protocol that allows access to the user’s assets in 3rd party web sites or applications without exposing the user’s identity and credential. OAuth can be used to grant the access rights for the user without exposing the user’s information to third parties. By utilizing the Token issued by the Authorization Server, client is able to gain access to the resources in the Resource Server. However, in current standards, the restrictions of token usage are not clearly defined. Although it specified Token expiration time, in reality, malicious client can reuse the Token to access Resource server. The existing Token Revocation operation has been carried out in a way that the client performs Revocation by requesting to the Authorization Server when special cases occur such as logout or identity change by resource owner. The revocation does not happen for the case that malicious code targets the Resource Server. This paper proposes a method for revoking the Token by requesting Revocation when the Resource Server performs abnormal behaviors by using Token.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pai, S., et al.: Formal verification of oauth 2.0 using alloy framework. In: International Conference on Communication Systems and Network Technologies (CSNT). IEEE (2011) Pai, S., et al.: Formal verification of oauth 2.0 using alloy framework. In: International Conference on Communication Systems and Network Technologies (CSNT). IEEE (2011)
2.
go back to reference Yang, F., Manoharan, S.: A security analysis of the OAuth protocol. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM). IEEE (2013) Yang, F., Manoharan, S.: A security analysis of the OAuth protocol. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM). IEEE (2013)
3.
go back to reference Campbell, B., et al.: OAuth working group internet-draft intended status: standards track (2012) Campbell, B., et al.: OAuth working group internet-draft intended status: standards track (2012)
4.
go back to reference Hardt, D.: The OAuth 2.0 authorization framework. RFC 6749, October 2012 Hardt, D.: The OAuth 2.0 authorization framework. RFC 6749, October 2012
5.
go back to reference Tassanaviboon, A., Gong, G.: Oauth and abe based authorization in semi-trusted cloud computing: aauth. In: Proceedings of the Second International Workshop on Data Intensive Computing in the Clouds. ACM (2011) Tassanaviboon, A., Gong, G.: Oauth and abe based authorization in semi-trusted cloud computing: aauth. In: Proceedings of the Second International Workshop on Data Intensive Computing in the Clouds. ACM (2011)
6.
go back to reference Lodderstedt, T., et al.: OAuth 2.0 token revocation. RFC 7009, August 2013 Lodderstedt, T., et al.: OAuth 2.0 token revocation. RFC 7009, August 2013
7.
go back to reference Sun, S.-T., Beznosov, K.: The devil is in the (implementation) details: an empirical analysis of oauth sso systems. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM (2012) Sun, S.-T., Beznosov, K.: The devil is in the (implementation) details: an empirical analysis of oauth sso systems. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM (2012)
8.
go back to reference Jones, M., et al.: JSON Web Token (JWT). RFCC 7519, May 2015 Jones, M., et al.: JSON Web Token (JWT). RFCC 7519, May 2015
9.
go back to reference Lodderstedt, T., et al.: OAuth 2.0 threat model and security considerations. RFC 6819, January 2013 Lodderstedt, T., et al.: OAuth 2.0 threat model and security considerations. RFC 6819, January 2013
Metadata
Title
A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server
Authors
Jungsoo Park
Jinouk Kim
Minho Park
Souhwan Jung
Copyright Year
2016
Publisher
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-319-31875-2_23

Premium Partner