信息网络安全 ›› 2017, Vol. 17 ›› Issue (6): 35-42.doi: 10.3969/j.issn.1671-1122.2017.06.006

• Contents • Previous Articles     Next Articles

The Scheme of Open Authorization Based on FIDO UAF

LI Lianglei1, 2, SHAO Lisong3, WANG Chuanyong4, LIU Yong5   

  1. 1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;
    2.Data Assurance and Communication Security Research Center of Chinese Academy of Sciences, Beijing 100093, China;
    3. Nari Group Corporation, Nanjing Jiangsu 211000, China;
    4.STATE GRID Zaozhuang Power Supply Company, Zaozhuang Shandong 277100, China;
    5. STATE GRID Shandong Power Supply Company, Jinan Shandong 250001, China
  • Received:2017-01-15 Online:2017-06-20

Abstract: OAuth2.0 as open authorization standard,is one of the most popular API access control. While using the traditional authentication has some limitations: authorization server is responsible for issuing the access token as well as managing user’s information; traditional authentication such as username/password is vulnerable to many attacks. This scheme will be based on FIDO UAF architectural identity authentication combined with OAuth2.0 agreement, when a user logs in using biometric identification technology to identity himself, meeting the demand of security, user experience, etc. This paper studies OAuth2.0 and FIDO UAF, then designs authentication scheme and authorization scheme and mix them. We describe the framework and detail process of authentication and authorization.Finally, we give an example of system design to fulfill the new scheme.

Key words: OAuth2.0, FIDO, authorization, biometrics identification

CLC Number: