May 2What happened to MITREid Connect?MITREid Connect was, at one time, one of the top open source implementations of OpenID Connect and OAuth 2.0. Written in Java and targeted for enterprise systems in the days before cloud services, it fit a niche and did it well. Where is it today and where is it going? How It Started …Openid Connect5 min readOpenid Connect5 min read
Apr 11, 2022The GNAPathonAt the recent IETF 113 meeting in Vienna, Austria, we put the GNAP protocol to the test by submitting it as a Hackathon project. Over the course of the weekend, we built out GNAP components and pointed them at each other to see what stuck. Here’s what we learned. Our Goals GNAP…Gnap4 min readGnap4 min read
May 4, 2021Signing HTTP MessagesThere’s a new draft in the HTTP working group that deals with signing HTTP messages of all types. Why is it here, and what does that give us? HTTP is irrefutably a fundamental building block of most of today’s software systems. Yet security and identity need to be layered alongside…Security7 min readSecurity7 min read
Oct 22, 2020Filling in the GNAPAbout a year ago I wrote an article arguing for creating the next generation of the OAuth protocol. That article, and some of the other writing around it, has been picked up recently, and so people have been asking me what’s the deal with XYZ, TxAuth, OAuth 3.0, and anything…Oauth4 min readOauth4 min read
Jul 1, 2020XYZ: Cryptographic BindingThis article is part of a series about XYZ and how it works, also including articles on Why?, Handles, Interaction, and Compatibility. OAuth 2 loves its bearer tokens. They’re a really useful construct because they are simple: if you have the token, you can do whatever the token is good…Oauth5 min readOauth5 min read
Jun 18, 2020XYZ: InteractionThis article is part of a series about XYZ and how it works, also including articles on Why?, Handles, Compatibility, and Cryptographic Agility. When OAuth 1 was first invented, it primarily sought to solve the problem of one website talking to another website’s API. It could also be used with…Oauth27 min readOauth27 min read
Jun 16, 2020XYZ: Compatibility With OAuth 2This article is part of a series about XYZ and how it works, also including articles on Why?, Handles, Interaction, and Cryptographic Agility. XYZ is a novel protocol, and one of its goals is to move beyond what OAuth 2 enables in any easy fashion. …Oauth6 min readOauth6 min read
Jun 8, 2020XYZ: Handles, Passing by Reference, and Polymorphic JSONThis article is part of a series about XYZ and how it works, also including articles on Why?, Interaction, Compatibility, and Cryptographic Agility. One comment I’ve gotten from several people when reading the XYZ spec text and surrounding documentation is about one of its core innovations. …Oauth8 min readOauth8 min read
Jun 3, 2020XYZ: Why?This article is part of a series about XYZ and how it works, also including articles on Handles, Interaction, Compatibility, and Cryptographic Agility. It’s been about a year and a half since I started in earnest on the XYZ project. I’ve talked with a variety of different people and companies…Oauth6 min readOauth6 min read
Apr 9, 2020A Sandwich of Bread and MagicA contract in the world of computer science is something that defines what the inputs and outputs of a given function are allowed to be, and what you can expect to get as outputs when you hand over a certain set of inputs. …Did4 min readDid4 min read