Standards & Protocols
Facebook Twitter LinkedIn

Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform

Combined Session
Wednesday, May 06, 2015 14:30—15:30
Location: AMMERSEE II

For the most part, OAuth 2.0 and other REST-based protocols for identity transactions are ratified and ready to use.  But how can they be combined to solve the actual business problem of operating in an identity infrastructure?    This session will cover the top 20 patterns of interaction for SSO, mobile, API, and provisioning use cases, showing how a practical combination of clients and scopes can result in a tightly secured identity architecture that leverages combinations of OAuth 2, SCIM, OpenID Connect, JWT assertion flow, JOSE and other protocols, including SAML.  Pamela will discuss the pros and cons of solving different problems with different patterns, with the goal of naming and documenting the patterns so that they can be adopted in the industry at large.

Protocol meets Architecture:  Patterns for Construction of an OAuth Identity Platform
Presentation deck
Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Pamela Dingle
Pamela Dingle
Ping Identity
Pamela Dingle is a well-known contributor in the identity management world, with over 15 years of experience focusing on implementation and system architecture providing strategic direction in web...
Subscribe for updates
Please provide your email address