Hi all,

Last time when we discussed on this topic, see meeting 
notes<https://pad.gpii.net/p/protect-the-preferences-server-jan-4-wy84nfy>, we 
agreed that OAuth2 Resource Owner 
Grant<https://tools.ietf.org/html/rfc6749#section-4.3> is a suitable solution 
for our use case where the local GPII acts as a highly privileged application 
to receive GPII user tokens, and then use user tokens to retrieve lifecycle 
instructions from GPII cloud. This leads to a question of how OAuth2 client ids 
and secrets can be securely stored on users' machines.

This wiki page collects the research of possible approaches for safely storing 
credentials such as OAuth2 client id/secret on native devices, especially 
devices at public spaces:

https://wiki.gpii.net/w/Continued_Researches_on_Possible_Approaches_for_Protecting_Communication_btw_LFM_and_CBFM#Results

I’d like to hear your opinions on:

1. Other approaches?
2. Other vulnerabilities for these approaches?
3. Other areas I should look at for this security issue.
4. Any corrections or improvements to this wiki.

Looking forward to your feedback. Thanks.

Cindy

_______________________________________________
Architecture mailing list
[email protected]
http://lists.gpii.net/mailman/listinfo/architecture

Reply via email to