|By Francois Lascelles||
|February 6, 2013 03:55 PM EST||
Are you a token distributor? If you provide an API, you probably are.
One thing I like about tokens is that when they are compromised, your credentials are unaffected. Unfortunately, it doesn’t work so well the other way around. When your password is compromised, you should assume the attacker could get access tokens to act on your behalf too.
In his post The dilemma of the oauth token collector, and in this twitter conversation, Nishant and friends comment on the recent twitter hack and discuss the pros and cons of instantly revoking all access tokens when a password is compromised.
I hear the word of caution around automatically revoking all tokens at the first sign of a credential being compromised but in a mobile world where UX is sacred and where each tapping of password can be a painful process, partial token revocation shouldn’t automatically be ruled out.
Although, as Nishant suggests, “it is usually hard to pinpoint the exact time at which an account got compromised”, you may know that it happened within a range and use the worse case scenario. I’m not saying that was necessarily the right thing to do in reaction to twitter’s latest incident but only revoking tokens that were issued after the earliest time the hack could have taken place is a valid approach that needs to be considered. The possibility of doing this allows the api provider to mitigate the UX impact and helps avoid service interruptions (yes I know UX would be best served by preventing credentials being compromised in the first place).
Of course, acting at that level requires token governance. The ability to revoke tokens is essential to the api proviver. Any token management solution being developed today should pay great attention it. Providing a GUI to enable token revocation is a start but a token management solution should expose an API through which tokens can be revoked too. This lets existing portals and ops tooling programmatically act on token revocation. Tokens need to be easily revoked per user, per application, per creation date, per scope, etc, and per combination of any of these.
Are you a token distributor? You should think hard about token governance. You also think hard about scaling, security, integration to exiting identity assets and interop among other things. We’re covering these and more in this new eBook : 5 OAuth Essentials For APi Access Control. Check it out.
Jun. 28, 2016 12:45 PM EDT Reads: 922
Jun. 28, 2016 12:00 PM EDT Reads: 1,101
Jun. 28, 2016 10:30 AM EDT Reads: 429
Jun. 28, 2016 10:00 AM EDT Reads: 293
Jun. 28, 2016 10:00 AM EDT Reads: 420
Jun. 28, 2016 09:45 AM EDT Reads: 413
Jun. 28, 2016 09:30 AM EDT Reads: 1,277
Jun. 28, 2016 08:30 AM EDT Reads: 1,206
Jun. 28, 2016 08:00 AM EDT Reads: 1,305
Jun. 28, 2016 08:00 AM EDT Reads: 445
Jun. 27, 2016 03:00 PM EDT Reads: 789
Jun. 27, 2016 12:00 PM EDT Reads: 877
Jun. 27, 2016 07:30 AM EDT Reads: 1,104
Jun. 26, 2016 05:00 PM EDT Reads: 1,345
Jun. 26, 2016 05:00 PM EDT Reads: 1,253
Jun. 26, 2016 04:00 PM EDT Reads: 1,307
Jun. 26, 2016 04:00 PM EDT Reads: 1,387
Jun. 26, 2016 12:00 PM EDT Reads: 1,330
Jun. 26, 2016 12:00 PM EDT Reads: 1,164
Jun. 26, 2016 12:00 PM EDT Reads: 1,386