Skip to main content

Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments

  • Conference paper
  • First Online:
Data and Applications Security and Privacy XXXV (DBSec 2021)

Abstract

The introduction of the Payment Service Directive (PSD2) has accelerated financial services and open banking growth. Deploying appropriate identity management solutions is crucial. This implies the adoption of secure protocols for authentication and authorization, such as OpenID Connect and OAuth 2.0. The PSD2 also requires the application of the General Data Protection Regulation (GDPR) when transactions involve personal data. In turn, the GDPR mandates a Data Protection Impact Assessment (DPIA) for assessing risks posed to data subjects’ rights and freedom. This is a time-consuming and challenging task requiring heterogeneous skills that include the knowledge of best practices for deploying protocols, security mechanisms adopted by available identity management providers, and the capability to perform careful what-if analysis of the possible alternatives. To assist users in this task, we propose a methodology based on the formalization of the what-if analysis as an optimization problem that available tools can solve. The formalization is derived from the OAuth 2.0 and OpenID connects standards, security best practices to mitigate threats, and thorough the evaluation of 19 identity management providers to check their supported features concerning the identified set of features for OAuth/OIDC solutions. We apply the methodology to assist controllers and identify the most appropriate security setup to drive the process of making financial services compliant with the PSD2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://sites.google.com/fbk.eu/oidc-dpia.

  2. 2.

    A locally unique and never reassigned identifier within the Issuer for the user, which is intended to be consumed by the Client.

References

  1. Danezis, G., et al.: Privacy and data protection by design-from policy to engineering. arXiv preprint arXiv:1501.03726 (2015)

  2. Dashti, S., Ranise, S.: A tool-assisted methodology for the data protection impact assessment. In: Proceedings of the International Conference on Security and Cryptography (2019)

    Google Scholar 

  3. Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: IEEE SPW (2015)

    Google Scholar 

  4. Hardt, D.: The OAuth 2.0 authorization framework. IETF (2012)

    Google Scholar 

  5. Internet-Draft: International Government Assurance Profile (iGov) for OpenID Connect 1.0 (2018)

    Google Scholar 

  6. Jones, M., Bradley, J., Sakimura, N.: Json web token (JWT). IETF (2015)

    Google Scholar 

  7. Krebs, B.: Internet bank account takeover of +1m users without user interaction. https://mrbriankrebs.medium.com/internet-bank-account-takeover-of-1m-users-without-user-interaction-4fc9141740a3. Accessed 25 Mar 2021

  8. Li, W., Mitchell, C.J.: User access privacy in OAuth 2.0 and OpenID connect. In: EuroS&PW. IEEE (2020)

    Google Scholar 

  9. Lodderstedt, T., Bradley, J., Labunets, A., Fett, D.: OAuth 2.0 Security Best Current Practice (draft-ietf-oauth-security-topics-16). IETF (2020)

    Google Scholar 

  10. Lodderstedt, T., McGloin, M., Hunt, P.: RFC 6819: OAuth 2.0 threat model and security considerations. IETF (2013)

    Google Scholar 

  11. OpenID Foundation: Financial-grade API - part 1: Baseline security profile. https://openid.net/certification/. Accessed 23 Nov 2020

  12. Richer, J., Johansson, L.: Vector of trust (RFC 8485). IETF (2018)

    Google Scholar 

  13. Rost, M., Bock, K.: Privacy by design and the new protection goals. In: DuD, vol. 2009 (2011)

    Google Scholar 

  14. Rost, M., Pfitzmann, A.: Datenschutz-schutzziele–revisited. Datenschutz und Datensicherheit-DuD 33(6), 353–358 (2009)

    Article  Google Scholar 

  15. Sakimura, N.: Authorization delegation: a financial accounts aggregation use case. https://nat.sakimura.org/2016/01/29/authorization-delegation-a-financial-accounts-aggregation-use-case/. Accessed 25 Mar 2021

  16. Sakimura, N., Bradley, J., Jay, E.: Financial-grade API - part 1: Baseline security profile. Accessed 23 Nov 2020

    Google Scholar 

  17. Sakimura, N., Bradley, J., Jones, M., De Medeiros, B., Mortimore, C.: OpenID connect core 1.0 incorporating errata set 1. The OpenID Foundation 335 (2014)

    Google Scholar 

  18. Siena, A., Morandini, M., Susi, A.: Modelling risks in open source software component selection. In: Yu, E., Dobbie, G., Jarke, M., Purao, S. (eds.) ER 2014. LNCS, vol. 8824, pp. 335–348. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12206-9_28

    Chapter  Google Scholar 

  19. Similartech.com: Login providers. https://www.similartech.com/categories/login-provider. Accessed 29 Dec 2020

  20. Sun, S.T., Beznosov, K.: The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems. In: Proceedings of ACM ASIACCS (2012)

    Google Scholar 

  21. Torsten, L., Daniel, F.: OpenID connect for identity assurance 1.0. https://openid.net/specs/openid-connect-4-identity-assurance-1_0.html. Accessed 19 June 2019

  22. Wuyts, K., Scandariato, R., Joosen, W., Deng, M., Preneel, B.: LINDDUN: a privacy threat analysis framework (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Salimeh Dashti , Amir Sharif , Roberto Carbone or Silvio Ranise .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dashti, S., Sharif, A., Carbone, R., Ranise, S. (2021). Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments. In: Barker, K., Ghazinour, K. (eds) Data and Applications Security and Privacy XXXV. DBSec 2021. Lecture Notes in Computer Science(), vol 12840. Springer, Cham. https://doi.org/10.1007/978-3-030-81242-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-81242-3_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-81241-6

  • Online ISBN: 978-3-030-81242-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics