In this article, you will learn the basics of the OAuth 2.0 authorization framework and a simple identity layer which located on top of the framework – OpenID Connect.

Introduction

Before OAuth, the common pattern for granting access to an external application’s account was to simply give it your password and let it act as a you. Communication always consisted of entering the user’s password in the application and then using it to get access to a particular service with data. Thus, the application was given access to the entire user account, even though in truth it only needed access to part of it – the scope was much broader than realistically needed.

Once the application has obtained the user’s password, it is granted unlimited access to the user’s account, including access to capabilities such as changing the password. Additionally, these passwords were stored in plain text, which makes them vulnerable to a potential attack. Another problem was that after providing an app with your password, the only way you would be able to revoke that access was by changing your password, something that users are usually reluctant to do.

Companies realized that such solutions are not safe and unfriendly, so they started implementing their own solutions. As a result, in 2007, the OAuth framework version 1.0 was created. But not all things were clarified, many of the aspects were difficult or confusing and a revised version 2.0 of OAuth was launched in 2012.

Authentication vs Authorization

To understand exactly what the framework is all about, two terms must first be explained. Authentication and authorization, although often used interchangeably, represent fundamentally different functions. To put it simply, authentication is the process of verifying who the user is, while authorization is the process of verifying what the user has access to. Let’s take a quick look at the differences between authentication and authorization.

Authentication

  • Determines if users are who they claim to be
  • Requires the user to confirm credentials (e.g., through passwords, security question or biometric data)
  • In general, it transmits information via an ID Token
  • Example: Employees in a company are required to authenticate themselves over the network before accessing company e-mail

Authorization

  • Determines what users can access
  • Verifies that access is permitted by policies and rules
  • In general, it transmits information via an Access Token
  • Example: after successfully authenticating an employee, the system determines what information employees have access to

OAuth deals with authorization and its main purpose is to delegate authorization. Basically, it answers the question: How can I let an app, access my data, without giving it my password?

OAuth 2.0

So, how does it all work?

When an app wants to access your data, e.g., contacts, it simply redirects you to an authorization server (which you’re probably already logged in), where you are then greeted by the consent screen, telling you what specific data the app will be able to access in your account, if you allow it, and all this without entering your password.

Such a process has many benefits:

  • The password remains only in the service that knows it, it is not required externally, e.g., in another application
  • The range of permissions is defined, there is no more full access to user account
  • The probability of password leakage is much lower, because thanks to this solution we do not disclose our password to the application we are using
  • Also, the fewer screens for entering a password, the lower the risk of password leakage
  • All processes such as password reset, password change, two-factor authentication are then in the logic of the authorization server, so the user does not need to implement this in each application

Roles in OAuth

Resource Owner (The user)

  • A role that is in possession of some resource, such as a physical user.

Client (The application)

  • An application that wants to get access to a resource, its task is to obtain an access token and with its help send requests to the API.

Authorization Server

  • Server which oversees the entire OAuth process.

Resource Server (API)

  • The server which holds the data.

Looak at the picture no. 2.

Client Types

The application must be registered and configured on the authorization server before the whole process begins, one of the most important data is the client type. There are two client types in OAuth 2.0:

  • Public – unable to use registered client secrets, such as applications running in a browser or on a mobile device.
  • Confidential – applications that can securely authenticate with the authorization server, for example being able to keep their registered client secret safe.

Grant Types

The OAuth specification allows for several ways to obtain and validate tokens, which are named – grant types or commonly flows. Not all grant types are intended for all types of clients.

The basic steps to configure an app and obtain an access token are following:

  • Register your app in authorization server with following data:
    • Client ID
    • Client Secret
    • Redirect URI
  • Select scope of your access
  • Make a request using the grant type that suits your app

The most popular and commonly used grant types are:

  • Authorization code grant with PKCE – for public clients like native apps – JavaScript, mobile apps.
  • Client credentials – for confidential clients, and therefore for machine-machine communication and always when you can store your secret safely.

Authorization code grant with PKCE

This grant type is the most common OAuth flow. To obtain a token using this flow, the client sends an authorization request to the OAuth server. The server makes sure that the user is authenticated and asks the user to approve this request. Once the user approves the request, an authorization code is issued, which the client passes back to the authorization server and a temporary access token is issued to the client. The client can now access the resource from the resource server by providing this access token.

Together with the access token, a refresh token is also issued to the client, which can be used to generate a new access token without user interaction.

PKCE is an extension to the Authorization Code Grant that improves security and is a recommended solution for all types of applications. The client app creates a unique string value – code_verifier, which hashes a code_challenge. When the client initiates the flow, the code_challenge is sent in the request. Then in the normal flow the authorization code is issued, and the client passes it back to the authorization server but now together with code_verifier. If the codes match, then the access token is issued to the client.

Looak at the picture no. 3.

Client Credentials

In this grant type the client can request an access token using only its client credentials. The flow begins with an authentication request which contains the client ID and client secret. Then the Authorization Server validates the client credentials and responds with an access token, which the client can use to access the resource from the resource server.

Client Credentials grant type is used by applications in isolated environments like backend where the user context is not needed. It is mainly used in machine-to-machine communication and must only be used by confidential clients due to the need to store client secret.

Looak at the picture no. 4.

OpenID Connect

OpenID Connect is a simple identity layer located on top of the OAuth. It extends the OAuth authorization framework for use as an authentication protocol as well.

The process flow is the same as OAuth 2.0. The only difference in the authorization request is a specific scope – openid. In the final response, in addition to access and refresh token, the ID token is also provided to the client. The ID Token contains information about the user – ID, name, email, etc. One important thing is that the ID Token should never be used to obtain access to API.

An ID token is a specifically formatted string in form of a JSON Web Token – in short JWT. The identity information about the user is encoded right into the token and the token can be definitively verified to prove that it has not been tampered with. It is worth mentioning that the information in ID token can become obsolete, for example if the client wants to read data from a token which they received some time ago. For this purpose, OpenID provides an endpoint in its standard called UserInfo endpoint. This endpoint is used to obtain fresh user information and must be called with an access token.

OpenID Connect supports scenarios in which a single login can be used across multiple applications, also known as single sign-on (SSO). For example, an application can support SSO with social networks, allowing users to use a login they already have and are comfortable using.

Conclusion

OAuth 2.0 is a widely used framework based on HTTP protocol, which makes it compatible with almost any platform. OAuth is also constantly being developed and have very good documentation. Together with OpenID Connect on top, it is a highly recommended solution for implementing both authentication and authorization processes. For more detailed information, I refer you to the official site along with the RFC documents: https://oauth.net/2/

Author: Adam Herman, Senior Android Developer | Senior Technical Consultant

Follow us!
www.linkedin.com/company/convistapoland
Blog | Convista

Über ConVista Consulting Sp. z o.o.

Convista is one of the leading consultancies for business transformation. It offers comprehensive and reliable support to its clients in developing and implementing new business processes and crafting end-to-end solutions for SAP as well as IT projects.

In collaboration with its clients, Convista manages complex challenges by combining many years of industry and technology experience and profound expertise. With over two decades of experience, Convista has established itself as a trusted partner for customers operating in the insurance, industry, healthcare, and energy sectors, enabling them to adapt to the demands of an ever-evolving digital world.

IT blog. For IT people. Powered by Convista Poland.

Convista Poland’s blog is the ultimate hub for IT enthusiasts packed with cutting-edge IT articles crafted by Convista´s skilled and experienced employees specializing in Java, iOS, Android, and ABAP, making sure you get top-notch content on these subjects. What makes it truly priceless? It’s the hands-on experience of creators, who actively work on corporate projects every day. They are always pushing the boundaries of their skills, eager to share knowledge, and constantly motivated to explore new frontiers.

Concerning the blog topics and valuable content, one is able to stay up-to-date with the latest IT trends and advancements as well as the opportunity to join a community of like-minded individuals passionate about technology.

Firmenkontakt und Herausgeber der Meldung:

ConVista Consulting Sp. z o.o.
Ul. Powstańców Śląskich 7A
PL53-332 Wrocław
Telefon: +49 (221) 88826-0
Telefax: +49 (221) 88826-199
https://www.convista.pl

Ansprechpartner:
Wioleta Patkowska
HR Manager
E-Mail: wioleta.patkowska@convista.com
Für die oben stehende Pressemitteilung ist allein der jeweils angegebene Herausgeber (siehe Firmenkontakt oben) verantwortlich. Dieser ist in der Regel auch Urheber des Pressetextes, sowie der angehängten Bild-, Ton-, Video-, Medien- und Informationsmaterialien. Die United News Network GmbH übernimmt keine Haftung für die Korrektheit oder Vollständigkeit der dargestellten Meldung. Auch bei Übertragungsfehlern oder anderen Störungen haftet sie nur im Fall von Vorsatz oder grober Fahrlässigkeit. Die Nutzung von hier archivierten Informationen zur Eigeninformation und redaktionellen Weiterverarbeitung ist in der Regel kostenfrei. Bitte klären Sie vor einer Weiterverwendung urheberrechtliche Fragen mit dem angegebenen Herausgeber. Eine systematische Speicherung dieser Daten sowie die Verwendung auch von Teilen dieses Datenbankwerks sind nur mit schriftlicher Genehmigung durch die United News Network GmbH gestattet.

counterpixel