YoVDO

Adventures in Authentication and Authorization

Offered By: USENIX Enigma Conference via YouTube

Tags

USENIX Enigma Conference Courses OAuth Courses Authorization Courses JWT Courses Mutual TLS Courses

Course Description

Overview

Explore the challenges and solutions in implementing authentication and authorization for zero-trust architectures in microservice ecosystems. Dive into Netflix's journey of creating a robust security system, examining the requirements, technology choices, and hurdles encountered. Learn about the surprising decision to use multiple technologies instead of a single solution. Discover insights on forwardable bearer credentials, credential scopes, service-to-service access control, end-user context tickets, and the authorizable context abstraction. Gain valuable takeaways from this 21-minute USENIX Enigma Conference talk by Ian Haken, offering practical knowledge for enhancing security in complex distributed systems.

Syllabus

Intro
The Red Team Exercise
Authentication and Authorization
Fix #1: Forwardable Bearer Credentials
Potential Fix: Credential Scopes
Keeping up with scopes
Service-to-Service (S2S) Access Control
Service-to-Service Pitfalls
End-User Context (EUC) Tickets
The Authorizable Context Abstraction
Three Takeaways


Taught by

USENIX Enigma Conference

Related Courses

Authentication & Authorization: OAuth
Udacity
Rails with Active Record and Action Pack
Johns Hopkins University via Coursera
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Managing Identity
Microsoft via edX