Big step forward in security for Azure DevOps! Skip the service principle and make it a just-in-time connection using OIDC!
Public preview of Workload identity federation for Azure Pipelines - Azure DevOps Blog https://devblogs.microsoft.com/devops/public-preview-of-workload-identity-federation-for-azure-pipelines/
Great news for Azure Pipelines ๐https://devblogs.microsoft.com/devops/public-preview-of-workload-identity-federation-for-azure-pipelines/
It should not be very different to configure from what I did for provisioning an Azure Ready GitHub Repository ๐ https://www.techwatching.dev/posts/azure-ready-github-repository
#oidc #cicd #azuredevops #azure
@deadsuperhero @dansup I could be mistaken, but it really seems like #OAuth2 and #OIDC are very similar... insomuch that when creating a single SSO plugin for one, I also created one for the latter.
Lastly the apps of the #HomeLab
* #HomeAssistant (which is doing quite a bit, worthy of its own topic)
* Nextcloud (did some custom stuff with the deploy)
* Matrix/Element
* Guacamole
* Tandoor (recipe app)
* Jellyfin/Emby + supporting apps
* Adguard-DNS (because the pi-hole container is a mess)
* Unifi Controller
* Cluster Monitoring via Grafana/Prometheus
* Keycloak for #OIDC for the above apps with #passkey support
* Esphome dashboard
Adding cameras soon via frigate
#homelab #homeassistant #oidc #Passkey
With @wildflyas 29, itโs now possible to secure the WildFly Management Console with #OIDC using the #Elytron OIDC Client subsystem. Want to learn more? Check out this blog post:
https://wildfly-security.github.io/wildfly-elytron/blog/securing-management-console-oidc/
KEYCLOAK "2+1" Starterpaket:
https://www.linkedin.com/feed/update/urn:li:share:7088129182034993152/
#keycloak #authentifzierung #oidc
๐ In this post, you will learn ๐ก๐จ๐ฐ ๐ญ๐จ ๐๐๐ ๐๐ฎ๐ญ๐ก๐๐ง๐ญ๐ข๐๐๐ญ๐ข๐จ๐ง ๐ญ๐จ ๐ฒ๐จ๐ฎ๐ซ ๐๐๐ฏ๐ ๐๐ฉ๐ซ๐ข๐ง๐ ๐๐จ๐จ๐ญ using OAuth2 with Authgear as the Identity Provider (IdP).
https://www.authgear.com/post/authentication-for-spring-boot-app-with-authgear-and-oauth2
#authentication #java #springboot #oauth2 #openid #oidc
So, there are formal security considerations on how to implement "OAuth 2.0 for Browser-Based Apps" using Service Workers.
But if you actually decide to go down this rabbit hole, you definitely would want to functional test your solution THOROUGHLY for ALL browsers. ๐ซ
#OAuth #OIDC #SSO #AppSec #webdevelopment
(4/4)
#oauth #oidc #sso #appsec #webdevelopment
[Blog Post] Unauthenticated #XSS to ATO using #SSO Gadget Chain
Just blogged about a vulnerability chain I recently discovered in a private bug bounty program:
https://security.lauritz-holtmann.de/post/csti-xss-sso-gadget-chain/
TL;DR: If you encounter an SSO implementation, make sure to test the /callback endpoint for XSS within the OAuth/OIDC "error_description" parameter.
Always try to escalate "non-exploitable" XSS-vulns (Self-XSS, only possible when user has no active session, โฆ) using SSO gadgets.
#xss #sso #bugbounty #vuejs #oidc #oauth
Suddenly having issues authenticating your GitHub Workflows to AWS using OIDC? This might be why...
https://github.blog/changelog/2023-06-27-github-actions-update-on-oidc-integration-with-aws/
In Agile n00b world: we need azure devops to develop the AAD #OIDC sso connection
๐ตโ๐ซ
https://docs.rs/axum-util/0.1.0/axum_util/oidc/struct.OidcConfig.html
i found this in `axum-util` and now i'm wondering how hard it is to use this to secure endpoints with a set of expected claims from a token. are there maybe any examples using axum-util? so far i found https://crates.io/crates/jwt-authorizer which looks good but not sure if it is the right thing.
#rust #oidc
Resharing from Nov 2022: I put together a basic proof of concept for using existing #Mastodon installations as SSO for #Matrix, using #Synapse. Here's what the authentication and authorization flow for that looks like!
While Mastodon doesn't support #OpenlDConnect, #OIDC is just #OpenlD on top of #OAuth2.0. If your app allows configuring all URLS for your ldP you can use nearly any OAuth2.0 provider.
Avatars currently aren't supported via this (| added one) but can be!
#mastodon #matrix #synapse #openldconnect #oidc #OpenlD #oauth2
#TIL that you donโt need an #auth library like #Laravelโs fortify. Just host an AuthN provider and implement #oidc or #ldap.
If you ship a desktop app, you donโt need #AuthN because the user is authenticated through their login into their computer.
If you ship to a business, they will have an LDAP or OIDC server or will host one when needed.
If you ship an app with online account, you can just host #Keycloak or #Authentic or pay #auth0.
More below:
#TIL #auth #laravel #oidc #ldap #authn #keycloak #authentic #auth0
next up, tailscale login.
Use Google, Microsoft, Github, Apple, Okta, Onelogin, custom #OIDC
new: passkeys, tied to device or keychain, based on #WebAuthN in browser
use "second factor" as primary factor.
demo ensues. "Sign in with passkey". Demo 1 fails. Demo 2 succeeds. Demo 3 uses hardware security key, works the first time.
"If you have enough demos, one of them has to work."
Replace passwords!
#oidc #webauthn #tailscaleup #Tailscale
Dead SaaS providers:
Please stop making SSO part of your enterprise plans! We're a small group and would love to get started with your free or low cost options but not being able to use our auth system is a _problem_. Security is not an optional extra!
New #Video on my YouTube channel: #KEYCLOAK Update #Email Feature | Niko Kรถbler (@dasniko)
#video #keycloak #email #oidc #authentication
New #Video on my YouTube channel: #KEYCLOAK Update #Email Feature | Niko Kรถbler (@dasniko)
https://www.youtube.com/watch?v=KmwgQiL6kMc
#oidc #authentication
#video #keycloak #email #oidc #authentication
"From GitHub to Account Takeover: Misconfigured Actions Place GCP & AWS Accounts at Risk "
https://www.rezonate.io/blog/github-misconfigurations-put-gcp-aws-in-account-takeover-risk/
#github #oidc #cloud #security