Giter Site home page Giter Site logo

paulveillard / cybersecurity-oauth Goto Github PK

View Code? Open in Web Editor NEW
3.0 2.0 0.0 1.41 MB

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about OAuth 2.0 and OpenID Connect in Cybersecurity.

License: Apache License 2.0

idp oauth-client oauth2 oauth2-authentication oauth2-client oauth2-provider oauth2-proxy oauth2-server saml2 sdp-migration

cybersecurity-oauth's Introduction

OAuth 2.0

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about OAuth 2.0 and OpenID Connect in Cybersecurity.

Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.

Introduction

  • As an application developer, you may have heard the term OAuth 2.0 thrown around a lot. OAuth 2.0 has gained wide adoption by web service and software companies around the world, and is integral to the way these companies interact and share information.

concepts

But what exactly is it? In a nutshell…

OAuth 2.0 is a protocol that allows distinct parties to share information and resources in a secure and reliable manner.

Intro

  • Developers and architects simply can’t build modern applications without running into issues of authorization and authentication.

OAuth 2.0 is an industry standard for “delegated authorization” which is the ability to provide an application or client access to data or features offered by another app or service. OAuth 2.0 focuses on authorization and is not prescriptive about authentication. OpenID Connect (OIDC) adds a standards-based authentication layer on top of OAuth 2.0.

oauth-openid

Tables of Contents

Cloud solutions

Amazon Web Services (AWS)

  • AWS IAM - Identity and Access Management for AWS
  • AWS SSO - Centrally manage single sign-on (SSO) access to multiple AWS accounts
  • Amazon Cognito - SSO for business applications
  • AWS Directory Service - AD in the AWS Cloud
  • AWS STS - AWS Security Token Service for temporary IAM tokens

Google Cloud Platform (GCP)

Microsoft Azure

Authentication

SSO

  • Single sign-on - wiki page about SSO
  • Central Authentication Service (CAS) - Open Source Enterprise Single Sign On
  • Okta - Identity and Access Management as a service; provides broad integrations
  • Auth0 - Identity and Access Management as a service
  • Cloud-IAM - Keycloak IAM as a Service
  • LoginRadius - Identity and Access Management as a service
  • FusionAuth - Identity and Access Management, either a service or self-hosted
  • PAC4J - The security library for Java
  • buzzfeed/sso - A single sign-on solution for securing internal services (Go based)
  • cidaas - Cloud Identity & Access Management (Identity and Access Management as a service)

SAML

Two-factor authentication

Passwordless authentication

  • MojoAuth - Email and WebAuthN Authentication
  • Sawolabs - Authentication without OTPs and Passwords

Authorization

OAuth

Site

Specification

Formal
Draft

Article

Book

Playground

Access management

  • Keycloak - Open Source Identity and Access Management
  • IdentityServer - .NET based IAM server
  • ORY - Open Source Identity Infrastructure and Services (Go based)
  • casbin - Go authorization library
  • OpenAM - (discontinued), successor of OpenSSO
  • WSO2 Identity Server - also has SSO, authZ, ...

Tools

  • Step CLI - A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
  • JWT DEBUGGER - A simple JWT decoder tool, that can help to verify the JWT and with the help of signature.

Other aggregators

License

MIT License & cc license

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

To the extent possible under law, Paul Veillard has waived all copyright and related or neighboring rights to this work.

cybersecurity-oauth's People

Contributors

paulveillard avatar

Stargazers

 avatar  avatar  avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.