[ 
https://issues.apache.org/jira/browse/SHINDIG-1732?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Adam Clarke closed SHINDIG-1732.
--------------------------------

    
> Restrictive OAuth2Client (endpoint whitelisting)
> ------------------------------------------------
>
>                 Key: SHINDIG-1732
>                 URL: https://issues.apache.org/jira/browse/SHINDIG-1732
>             Project: Shindig
>          Issue Type: Improvement
>          Components: Java
>    Affects Versions: 2.5.0-beta1
>            Reporter: Adam Clarke
>             Fix For: 2.5.0
>
>         Attachments: 1732_20120504.patch
>
>
> I have received comments asking for improvements in the OAuth2 Consumer to 
> help administrators with token security.
> One of these comments I plan on submitting a patch for is to allow 
> OAuth2Clients to be defined in a way that restricts where it will send OAuth2 
> tokens.
> One area of concern is already addressed with the "allowModuleOverride" 
> setting.
> 1) Adminstrator creates an OAuth2Client and binds Gadget X to it.
> 2) Gadget X changes it's <ModulePrefs> to a new authorization and/or token 
> url endpoint
> 3) If allowModuleOverride==true the OAuth2 Consumer will honor the 
> ModulePrefs and initiate the dance wherever Gadget X indicates.
> 4) Especially when using "client_credentials" this may be dangerous because 
> the admin's client_id/client_secret have been sent to a potentially untrusted 
> endpoint.
> 5) Today adminstrator can set allowModuleOverride=false on the OAuth2Client 
> and be assured the dance will only be initiated on the URLs they've setup, 
> ignoring the gadgets preferences.
> Setting allowModuleOverride is sufficient to protect the client_id and 
> client_secret.  However, Gadget X can still issue a makeRequest to any URL it 
> wants and the OAuth2 Consumer will send the access_token.
> This change will allow the administrator to define the valid servers/domains 
> for an OAuth2Client and prevent the Consumer from sending tokens anywhere 
> outside of the specified locations.  This was particularly important for 
> clients using "client_credentials" or other flows where compromised 
> access_tokens can open up large amounts of data on a server.
> Any suggestions on how to effectively implement the token whitelist are 
> appreciated...

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to