IAM

User accounts, authentication and authorization.

264 resources19 categoriesView Original

Authorization(35 items)

A

An AWS IAM Security Tooling Reference

A comprehensive list of (maintained) tools for AWS IAM.

Authorization
A

Athenz

Set of services and libraries supporting service authentication and role-based authorization for provisioning and configuration.

Authorization
A

Authorization Academy

An in-depth, vendor-agnostic treatment of authorization that emphasizes mental models. This guide shows the reader how to think about their authorization needs in order to make good decisions about their authorization architecture and model.

Authorization
A

AWS IAM Roles, a tale of unnecessary complexity

The history of fast-growing AWS explains how the current scheme came to be, and how it compares to GCP's resource hierarchy.

Authorization
B

Become an AWS IAM Policy Ninja

“In my nearly 5 years at Amazon, I carve out a little time each day, each week to look through the forums, customer tickets to try to find out where people are having trouble.”

Authorization
B

Biscuit

Biscuit merge concepts from cookies, JWTs, macaroons and Open Policy Agent. “It provide a logic language based on Datalog to write authorization policies. It can store data, like JWT, or small conditions like Macaroons, but it is also able to represent more complex rules like role-based access control, delegation, hierarchies.”

Authorization
C

Casbin

Open-source access control library for Golang projects.

Authorization
C

Cerbos

An authorization endpoint to write context-aware access control policies.

Authorization
C

ConsoleMe

A self-service tool for AWS that provides end-users and administrators credentials and console access to the onboarded accounts based on their authorization level of managing permissions across multiple accounts, while encouraging least-privilege permissions.

Authorization
G

GCP's IAM syntax is better than AWS's

The minutiae of permission design in GCP improves the developer's experience.

Authorization
G

Google paper's author compares Macaroons and JWTs

As a consumer/verifier of macaroons, they allow you (through third-party caveats) to defer some authorization decisions to someone else. JWTs don't.

Authorization
G

Google's Macaroons in Five Minutes or Less

If I'm given a Macaroon that authorizes me to perform some action(s) under certain restrictions, I can non-interactively build a second Macaroon with stricter restrictions that I can then give to you.

Authorization
G

Gubernator

High performance rate-limiting micro-service and library.

Authorization
I

IAM Floyd

AWS IAM policy statement generator with fluent interface. Helps with creating type safe IAM policies and writing more restrictive/secure statements by offering conditions and ARN generation via IntelliSense. Available for Node.js, Python, .Net and Java.

Authorization
I

IAMbic

GitOps for IAM. The Terraform of Cloud IAM. IAMbic is a multi-cloud identity and access management (IAM) control plane that centralizes and simplifies cloud access and permissions. It maintains an eventually consistent, human-readable, bi-directional representation of IAM in version control.

Authorization
I

In Search For a Perfect Access Control System

The historical origins of authorization schemes. Hints at the future of sharing, trust and delegation between different teams and organizations.

Authorization
K

Keto

Policy decision point. It uses a set of access control policies, similar to AWS policies, in order to determine whether a subject is authorized to perform a certain action on a resource.

Authorization
L

Ladon

Access control library, inspired by AWS.

Authorization
M

Macaroons: Cookies with Contextual Caveats for ...

Google's original paper.

Authorization
O

Open Policy Administration Layer

Open Source administration layer for OPA, detecting changes to both policy and policy data in realtime and pushing live updates to OPA agents. OPAL brings open-policy up to the speed needed by live applications.

Authorization
O

Open Policy Agent

An open-source general-purpose decision engine to create and enforce ABAC policies.

Authorization
O

Oso

A batteries-included library for building authorization in your application.

Authorization
P

Permify

Another open-source authorization as a service inspired by Google Zanzibar, and see how it compares to other Zanzibar-inspired tools.

Authorization
P

Policy Sentry

Writing security-conscious IAM Policies by hand can be very tedious and inefficient. Policy Sentry helps users to create least-privilege policies in a matter of seconds.

Authorization
P

PolicyUniverse

Parse and process AWS policies, statements, ARNs, and wildcards.

Authorization
R

RBAC like it was meant to be

How we got from DAC (unix permissions, secret URL), to MAC (DRM, MFA, 2FA, SELinux), to RBAC. Details how the latter allows for better modeling of policies, ACLs, users and groups.

Authorization
S

Semantic-based Automated Reasoning for AWS Acce...

Zelkova is how AWS does it. This system perform symbolic analysis of IAM policies, and solve the reachability of resources according user's rights and access constraints. Also see the higher-level introduction given at re:inforce 2019.

Authorization
S

Service-to-service authorization: A guide to no...

Discover how assigning identities to services (non-user principals) can simplify authentication, enhance security, and streamline authorization in complex distributed systems. A useful guide for IAM teams managing microservices and APIs.

Authorization
S

SpiceDB

An open source database system for managing security-critical application permissions inspired by Zanzibar.

Authorization
T

The Case for Granular Permissions

Discuss the limitations of RBAC and how ABAC (Attribute-Based Access Control) addresses them.

Authorization
T

The never-ending product requirements of user a...

How a simple authorization model based on roles is not enough and gets complicated fast due to product packaging, data locality, enterprise organizations and compliance.

Authorization
T

Topaz

An open-source project which combines the policy-as-code and decision logging of OPA with a Zanzibar-modeled directory.

Authorization
W

Warrant

A relationship based access control (ReBAC) engine (inspired by Google Zanzibar) also capable of enforcing any authorization paradigm, including RBAC and ABAC.

Authorization
W

Why Authorization is Hard

Because it needs multiple tradeoffs on Enforcement which is required in so many places, on Decision architecture to split business logic from authorization logic, and on Modeling to balance power and complexity.

Authorization
Z

Zanzibar: Google's Consistent, Global Authoriza...

Scales to trillions of access control lists and millions of authorization requests per second to support services used by billions of people. It has maintained 95th-percentile latency of less than 10 milliseconds and availability of greater than 99.999% over 3 years of production use. Other bits not in the paper. Zanzibar Academy is a site dedicated to explaining how Zanzibar works.

Authorization

Blocklists(25 items)

#

#1

Subdomain denylists: , , , .

Blocklists
#

#2

Subdomain denylists: , , , .

Blocklists
#

#3

Subdomain denylists: , , , .

Blocklists
#

#4

Subdomain denylists: , , , .

Blocklists
A

AMF site blocklist

Official French denylist of money-related fraud sites.

Blocklists
B

Bloom Filter

Perfect for this use-case, as bloom filters are designed to quickly check if an element is not in a (large) set. Variations of bloom filters exist for specific data types.

Blocklists
B

Burner email providers

A list of temporary email providers. And its derivative Python module.

Blocklists
C

Certificate Transparency Subdomains

An hourly updated list of subdomains gathered from certificate transparency logs.

Blocklists
C

Country IP Blocks

CIDR country-level IP data, straight from the Regional Internet Registries, updated hourly.

Blocklists
G

General List of Reserved Words

This is a general list of words you may want to consider reserving, in a system where users can pick any name.

Blocklists
H

Hostnames and usernames to reserve

List of all the names that should be restricted from registration in automated systems.

Blocklists
H

How Radix trees made blocking IPs 5000 times fa...

Radix trees might come handy to speed-up IP blocklists.

Blocklists
L

List of Dirty, Naughty, Obscene, and Otherwise ...

Profanity blocklist from Shutterstock.

Blocklists
M

MailChecker

Cross-language temporary (disposable/throwaway) email detection library.

Blocklists
T

Temporary Email Address Domains

A list of domains for disposable and temporary email addresses. Useful for filtering your email list to increase open rates (sending email to these domains likely will not be opened).

Blocklists
T

The Public Suffix List

Mozilla's registry of public suffixes, under which Internet users can (or historically could) directly register names.

Blocklists
`

`common-domain-prefix-suffix-list.tsv`

Top-5000 most common domain prefix/suffix list.

Blocklists
`

`gman`

“A ruby gem to check if the owner of a given email address or website is working for THE MAN (a.k.a verifies government domains).” Good resource to hunt for potential government customers in your user base.

Blocklists
`

`hosts-blocklists`

No more ads, tracking and other virtual garbage.

Blocklists
`

`hosts`

Consolidates reputable hosts files, and merges them into a unified hosts file with duplicates removed.

Blocklists
`

`nextdns/metadata`

Extensive collection of list for security, privacy and parental control.

Blocklists
`

`profanity-check`

Uses a linear SVM model trained on 200k human-labeled samples of clean and profane text strings.

Blocklists
`

`pyisp`

IP to ISP lookup library (includes ASN).

Blocklists
`

`Swot`

In the same spirit as above, but this time to flag academic users.

Blocklists
`

`xkeyscorerules100.txt`

NSA's XKeyscore matching rules for TOR and other anonymity preserving tools.

Blocklists

Cryptography(9 items)

A

An Overview of Cryptography

“This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today.”

Cryptography
A

Awesome GUID

Funny take on the global aspect of unique identifiers.

Cryptography
A

Awesome Identifiers

A benchmark of all identifier formats.

Cryptography
C

Cryptographic Right Answers

An up to date set of recommendations for developers who are not cryptography engineers. There's even a shorter summary available.

Cryptography
L

Lifetimes of cryptographic hash functions

“If you are using compare-by-hash to generate addresses for data that can be supplied by malicious users, you should have a plan to migrate to a new hash every few years”.

Cryptography
P

Papers we love: Cryptography

Foundational papers of cryptography.

Cryptography
R

Real World Crypto Symposium

Aims to bring together cryptography researchers with developers, focusing on uses in real-world environments such as the Internet, the cloud, and embedded devices.

Cryptography
R

RFC #4122: UUID - Security Considerations

“Do not assume that UUIDs are hard to guess; they should not be used as security capabilities (identifiers whose mere possession grants access)”. UUIDs are designed to be unique, not to be random or unpredictable: do not use UUIDs as a secret.

Cryptography
S

Security Recommendations for Any Device that De...

“The phrase ‘random number generator’ should be parsed as follows: It is a random generator of numbers. It is not a generator of random numbers.”

Cryptography

Multi-factor auth(21 items)

2

2FA is missing a key feature

“When my 2FA code is entered incorrectly I'd like to know about it”.

Multi-factor auth
A

A Comparative Long-Term Study of Fallback Authe...

Key take-away: “schemes based on email and SMS are more usable. Mechanisms based on designated trustees and personal knowledge questions, on the other hand, fall short, both in terms of convenience and efficiency.”

Multi-factor auth
A

AT&T rep handed control of his cellphone accoun...

Multi-factor auth
A

Attacking Google Authenticator

Probably on the verge of paranoia, but might be a reason to rate limit 2FA validation attempts.

Multi-factor auth
A

Authelia

Open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for your applications via a web portal.

Multi-factor auth
A

AWS is on its way to deprecate SMS-based 2FA

“We encourage you to use MFA through a U2F security key, hardware device, or virtual (software-based) MFA device. You can continue using this feature until January 31, 2019.”

Multi-factor auth
B

Beyond Passwords: 2FA, U2F and Google Advanced ...

An excellent walk-trough over all these technologies.

Multi-factor auth
B

Breaking Password Dependencies: Challenges in t...

The primary source of account hacks is password spraying (on legacy auth like SMTP, IMAP, POP, etc.), second is replay attack. Takeaway: password are insecure, use and enforce MFA.

Multi-factor auth
C

Compromising online accounts by cracking voicem...

Or why you should not rely on automated phone calls as a method to reach the user and reset passwords, 2FA or for any kind of verification. Not unlike SMS-based 2FA, it is currently insecure and can be compromised by the way of its weakest link: voicemail systems.

Multi-factor auth
G

Getting 2FA Right in 2019

On the UX aspects of 2FA.

Multi-factor auth
H

Hackers Hit Twitter C.E.O. Jack Dorsey in a 'SI...

Multi-factor auth
H

How effective is basic account hygiene at preve...

Google security team's data shows 2FA blocks 100% of automated bot hacks.

Multi-factor auth
I

Is SMS 2FA Secure? No.

Definitive research project demonstrating successful attempts at SIM swapping.

Multi-factor auth
K

Kanidm

Simple, secure and fast identity management platform.

Multi-factor auth
S

Secrets, Lies, and Account Recovery: Lessons fr...

“Our analysis confirms that secret questions generally offer a security level that is far lower than user-chosen passwords. (…) Surprisingly, we found that a significant cause of this insecurity is that users often don't answer truthfully. (…) On the usability side, we show that secret answers have surprisingly poor memorability”.

Multi-factor auth
S

SIM swap horror story

Multi-factor auth
S

SMS 2FA auth is deprecated by NIST

NIST has said that 2FA via SMS is bad and awful since 2016.

Multi-factor auth
S

SMS Multifactor Authentication in Antarctica

Doesn't work because there are no cellphone towers at stations in Antarctica.

Multi-factor auth
S

SMS: The most popular and least secure 2FA method

Multi-factor auth
T

The Most Expensive Lesson Of My Life: Details o...

Multi-factor auth
Y

Your Pa\$\$word doesn't matter

Same conclusion as above from Microsoft: “Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA.”

Multi-factor auth

OAuth2 & OpenID(21 items)

A

a12n-server

A simple authentication system which only implements the relevant parts of the OAuth2 standards.

OAuth2 & OpenID
A

An Illustrated Guide to OAuth and OpenID Connect

Explain how these standards work using simplified illustrations.

OAuth2 & OpenID
A

authentik

Open-source Identity Provider similar to Keycloak.

OAuth2 & OpenID
A

Authgear

Open-source authentication-as-a-service solution. It includes the code for the server, AuthUI, the Portal, and Admin API.

OAuth2 & OpenID
A

Awesome OpenID Connect

A curated list of providers, services, libraries, and resources for OpenID Connect.

OAuth2 & OpenID
A

Azure Entra ID

Microsoft's cloud-based identity and access management service for employees and external partners that supports OIDC, OAuth 2.0, and SAML.

OAuth2 & OpenID
C

Casdoor

A UI-first centralized authentication / Single-Sign-On (SSO) platform based. Supports OIDC and OAuth 2, social logins, user management, 2FA based on Email and SMS.

OAuth2 & OpenID
F

FusionAuth

Customer Identity and Access Management solution supporting OIDC.

OAuth2 & OpenID
H

Hidden OAuth attack vectors

How to identify and exploit some of the key vulnerabilities found in OAuth 2.0 authentication mechanisms.

OAuth2 & OpenID
H

How to Implement a Secure Central Authenticatio...

Got multiple legacy systems to merge with their own login methods and accounts? Here is how to merge all that mess by the way of OIDC.

OAuth2 & OpenID
H

Hydra

Open-source OIDC & OAuth2 Server Provider.

OAuth2 & OpenID
K

Keycloak

Open-source Identity and Access Management. Supports OIDC, OAuth 2 and SAML 2, LDAP and AD directories, password policies.

OAuth2 & OpenID
L

Logto

An IAM infrastructure for modern apps and SaaS products, supporting OIDC, OAuth 2.0 and SAML for authentication and authorization.

OAuth2 & OpenID
O

OAuth 2 Simplified

A reference article describing the protocol in simplified format to help developers and service providers implement it.

OAuth2 & OpenID
O

OAuth 2.0 and OpenID Connect (in plain English)

Starts with an historical context on how these standards came to be, clears up the innacuracies in the vocabulary, then details the protocols and its pitfalls to make it less intimidating.

OAuth2 & OpenID
O

OAuth 2.0 Security Best Current Practice

“Updates and extends the OAuth 2.0 Security Threat Model to incorporate practical experiences gathered since OAuth 2.0 was published and covers new threats relevant due to the broader application”.

OAuth2 & OpenID
O

OAuth in one picture

A nice summary card.

OAuth2 & OpenID
O

Open-Sourcing BuzzFeed's SSO Experience

OAuth2-friendly adaptation of the Central Authentication Service (CAS) protocol. You'll find there good OAuth user flow diagrams.

OAuth2 & OpenID
P

Ping Identity

Enterprise Identity and Access Management platform supporting OpenID Connect protocol.

OAuth2 & OpenID
P

PKCE Explained

“PKCE is used to provide one more security layer to the authorization code flow in OAuth and OpenID Connect.”

OAuth2 & OpenID
Z

ZITADEL

An Open-Source solution built with Go and Angular to manage all your systems, users and service accounts together with their roles and external identities. ZITADEL provides you with OIDC, OAuth 2.0, login & register flows, passwordless and MFA authentication. All this is built on top of eventsourcing in combination with CQRS to provide a great audit trail.

OAuth2 & OpenID

Password-based auth(10 items)

A

A Well-Known URL for Changing Passwords

Specification defining site resource for password updates.

Password-based auth
B

Banks, Arbitrary Password Restrictions and Why ...

“Arbitrary low limits on length and character composition are bad. They look bad, they lead to negative speculation about security posture and they break tools like password managers.”

Password-based auth
D

Dumb Password Rules

Shaming sites with dumb password rules.

Password-based auth
H

How to change the hashing scheme of already has...

Good news: you're not stuck with a legacy password saving scheme. Here is a trick to transparently upgrade to stronger hashing algorithm.

Password-based auth
P

Password expiration is dead

Recent scientific research calls into question the value of many long-standing password-security practices such as password expiration policies, and points instead to better alternatives such as enforcing banned-password lists and MFA.

Password-based auth
P

Password Manager Resources

A collection of password rules, change URLs and quirks by sites.

Password-based auth
P

Password Storage Cheat Sheet

The only way to slow down offline attacks is by carefully choosing hash algorithms that are as resource intensive as possible.

Password-based auth
P

Plain Text Offenders

Public shaming of websites storing passwords in plain text.

Password-based auth
P

Practical Recommendations for Stronger, More Us...

This study recommend the association of: blocklist checks against commonly leaked passwords, password policies without character-class requirements, minimum-strength policies.

Password-based auth
T

The new NIST password guidance

A summary of NIST Special Publication 800-63B covering new password complexity guidelines.

Password-based auth

Password-less auth(26 items)

A

Adding JSON Web Token API Keys to a DenyList

On token invalidation.

Password-less auth
A

An argument for passwordless

Passwords are not the be-all and end-all of user authentication. This article tries to tell you why.

Password-less auth
C

CFSSL

A swiss army knife for PKI/TLS by CloudFlare. Command line tool and an HTTP API server for signing, verifying, and bundling TLS certificates.

Password-less auth
C

Clearing up some misconceptions about Passkeys

Or why passkeys are not worse than passwords.

Password-less auth
E

Everything you should know about certificates a...

PKI lets you define a system cryptographically. It's universal and vendor neutral.

Password-less auth
G

Getting started with security keys

A practical guide to stay safe online and prevent phishing with FIDO2, WebAuthn and security keys.

Password-less auth
H

Hardcoded secrets, unverified tokens, and other...

A good recap of all JWT pitfalls.

Password-less auth
I

Introduction to JSON Web Tokens

Get up to speed on JWT with this article.

Password-less auth
J

JA3

Method for creating SSL/TLS client fingerprints that should be easy to produce on any platform and can be easily shared for threat intelligence.

Password-less auth
J

JOSE is a Bad Standard That Everyone Should Avoid

The standards are either completely broken or complex minefields hard to navigate.

Password-less auth
J

JWT, JWS and JWE for Not So Dummies!

A signed JWT is known as a JWS (JSON Web Signature). In fact a JWT does not exist itself — either it has to be a JWS or a JWE (JSON Web Encryption). Its like an abstract class — the JWS and JWE are the concrete implementations.

Password-less auth
J

JWT.io

Allows you to decode, verify and generate JWT.

Password-less auth
J

jwtXploiter

A tool to test security of json web token.

Password-less auth
L

Learn how to use JWT for Authentication

Learn how to use JWT to secure your web app.

Password-less auth
M

Magic Links – Are they Actually Outdated?

What are magic links, their origin, pros and cons.

Password-less auth
O

OpenSK

Open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.

Password-less auth
P

PKI for busy people

Quick overview of the important stuff.

Password-less auth
S

Solo

Open security key supporting FIDO2 & U2F over USB + NFC.

Password-less auth
S

Stop using JWT for sessions

And why your "solution" doesn't work, because stateless JWT tokens cannot be invalidated or updated. They will introduce either size issues or security issues depending on where you store them. Stateful JWT tokens are functionally the same as session cookies, but without the battle-tested and well-reviewed implementations or client support.

Password-less auth
U

Using JSON Web Tokens as API Keys

Compared to API keys, JWTs offers granular security, homogeneous auth architecture, decentralized issuance, OAuth2 compliance, debuggability, expiration control, device management.

Password-less auth
W

Webauthn and security keys

Describe how authentication works with security keys, details the protocols, and how they articulates with WebAuthn. Key takeaway: “There is no way to create a U2F key with webauthn however. (…) So complete the transition to webauthn of your login process first, then transition registration.”

Password-less auth
W

WebAuthn guide

Introduce WebAuthn as a standard supported by all major browsers, and allowing “servers to register and authenticate users using public key cryptography instead of a password”.

Password-less auth
Y

YubiKey at Datadog

Guide to setup Yubikey, U2F, GPG, git, SSH, Keybase, VMware Fusion and Docker Content Trust.

Password-less auth
Y

YubiKey Guide

Guide to using YubiKey as a SmartCard for storing GPG encryption, signing and authentication keys, which can also be used for SSH. Many of the principles in this document are applicable to other smart card devices.

Password-less auth
`

`lemur`

Acts as a broker between CAs and environments, providing a central portal for developers to issue TLS certificates with 'sane' defaults.

Password-less auth
`

`loginsrv`

Standalone minimalistic login server providing a JWT login for multiple login backends (htpasswd, OSIAM, user/password, HTTP basic authentication, OAuth2: GitHub, Google, Bitbucket, Facebook, GitLab).

Password-less auth

Privacy(18 items)

A

Automated security testing for Software Developers

Most privacy breaches were allowed by known vulnerabilities in third-party dependencies. Here is how to detect them by the way of CI/CD.

Privacy
D

Dark Patterns after the GDPR

This paper demonstrates that, because of the lack of GDPR law enforcements, dark patterns and implied consent are ubiquitous.

Privacy
D

Diffix: High-Utility Database Anonymization

Diffix try to provide anonymization, avoid pseudonymization and preserve data quality. Written in Elixir at Aircloak, it acts as an SQL proxy between the analyst and an unmodified live database.

Privacy
E

Email marketing regulations around the world

As the world becomes increasingly connected, the email marketing regulation landscape becomes more and more complex.

Privacy
F

Four cents to deanonymize: Companies reverse ha...

“Hashed email addresses can be easily reversed and linked to an individual”.

Privacy
G

GDPR Developer Guide

Best practices for developers.

Privacy
G

GDPR documents

Templates for personal use to have companies comply with "Data Access" requests.

Privacy
G

GDPR Enforcement Tracker

List of GDPR fines and penalties.

Privacy
G

GDPR Tracker

Europe's reference site.

Privacy
G

GDPR – A Practical guide for Developers

A one-page summary of the above.

Privacy
H

Have I been Pwned?

Data breach index.

Privacy
K

k-anonymity: an introduction

An alternative anonymity privacy model.

Privacy
P

Paper we love: Privacy

A collection of scientific studies of schemes providing privacy by design.

Privacy
P

Presidio

Context aware, pluggable and customizable data protection and PII data anonymization service for text and images.

Privacy
P

Privacy Enhancing Technologies Decision Tree

A flowchart to select the right tool depending on data type and context.

Privacy
T

The False Allure of Hashing for Anonymization

Hashing is not sufficient for anonymization no. But still it is good enough for pseudonymization (which is allowed by the GDPR).

Privacy
W

Why differential privacy is awesome

Explain the intuition behind differential privacy, a theoretical framework which allow sharing of aggregated data without compromising confidentiality. See follow-up articles with more details and practical aspects.

Privacy
W

World's Biggest Data Breaches & Hacks

Don't be the next company leaking your customer's data.

Privacy

SAML(9 items)

H

How SAML 2.0 Authentication Works

Overview of the how and why of SSO and SAML.

SAML
S

SAML is insecure by design

Not only weird, SAML is also insecure by design, as it relies on signatures based on XML canonicalization, not XML byte stream. Which means you can exploit XML parser/encoder differences.

SAML
S

SAML vs. OAuth

“OAuth is a protocol for authorization: it ensures Bob goes to the right parking lot. In contrast, SAML is a protocol for authentication, or allowing Bob to get past the guardhouse.”

SAML
T

The Beer Drinker's Guide to SAML

SAML is arcane at times. A another analogy might helps get more sense out of it.

SAML
T

The Difference Between SAML 2.0 and OAuth 2.0

“Even though SAML was actually designed to be widely applicable, its contemporary usage is typically shifted towards enterprise SSO scenarios. On the other hand, OAuth was designed for use with applications on the Internet, especially for delegated authorisation.”

SAML
T

The Difficulties of SAML Single Logout

On the technical and UX issues of single logout implementations.

SAML
T

The SSO Wall of Shame

A documented rant on the excessive pricing practiced by SaaS providers to activate SSO on their product. The author's point is, as a core security feature, SSO should be reasonably priced and not part of an exclusive tier.

SAML
W

Web Single Sign-On, the SAML 2.0 perspective

Another naive explanation of SAML workflow in the context of corporate SSO implementation.

SAML
W

What's the Difference Between OAuth, OpenID Con...

Identity is hard. Another take on the different protocol is always welcome to help makes sense of it all.

SAML

Secret Management(15 items)

C

CrypTech

An open hardware HSM.

Secret Management
E

Everybody be cool, this is a robbery!

A case study of vulnerability and exploitability of a HSM (in French, sorry).

Secret Management
H

HashiCorp Vault

Secure, store and tightly control access to tokens, passwords, certificates, encryption keys.

Secret Management
H

High Availability in Google's Internal KMS

Not GCP's KMS, but the one at the core of their infrastructure. See the slides.

Secret Management
H

HSM: What they are and why it's likely that you...

Really basic overview of HSM usages.

Secret Management
I

Infisical

An alternative to HashiCorp Vault.

Secret Management
K

Keystone

Open-source project for building trusted execution environments (TEE) with secure hardware enclaves, based on the RISC-V architecture.

Secret Management
K

Keywhiz

A system for managing and distributing secrets, which can fit well with a service oriented architecture (SOA).

Secret Management
P

Project Oak

A specification and a reference implementation for the secure transfer, storage and processing of data.

Secret Management
S

Secret at Scale at Netflix

Solution based on blind signatures. See the slides.

Secret Management
T

Tidbits on AWS Cloud HSM hardware

AWS CloudHSM Classic is backed by SafeNet's Luna HSM, current CloudHSM rely on Cavium's Nitrox, which allows for partitionable "virtual HSMs".

Secret Management
`

`gitleaks`

Audit git repos for secrets.

Secret Management
`

`roca`

Python module to check for weak RSA moduli in various key formats.

Secret Management
`

`sops`

Editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP.

Secret Management
`

`truffleHog`

Searches through git repositories for high entropy strings and secrets, digging deep into commit history.

Secret Management

Trust & Safety(32 items)

A

A Comparison of Personal Name Matching: Techniq...

Customer name matching has lots of application, from account deduplication to fraud monitoring.

Trust & Safety
A

After Car2Go eased its background checks, 75 of...

Why background check are sometimes necessary.

Trust & Safety
A

Anti-captcha

Captchas solving service.

Trust & Safety
A

Awesome Captcha

Reference all open-source captcha libraries, integration, alternatives and cracking tools.

Trust & Safety
A

Awesome List of Billing and Payments: Fraud links

Section dedicated to fraud management for billing and payment, from our sister repository.

Trust & Safety
A

Awesome Threat Intelligence

“A concise definition of Threat Intelligence: evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard.”

Trust & Safety
B

Ballerine

An open-source infrastructure for user identity and risk management.

Trust & Safety
B

Browser Fingerprinting: A survey

Fingerprints can be used as a source of signals to identify bots and fraudsters.

Trust & Safety
C

Confusable Homoglyphs

Homoglyphs is a common phishing trick.

Trust & Safety
F

Facebook Dangerous Individuals and Organization...

Some groups and content are illegal in some juridictions. This is an example of a blocklist.

Trust & Safety
G

Gephi

Open-source platform for visualizing and manipulating large graphs.

Trust & Safety
H

How Uber Got Lost

“To limit "friction" Uber allowed riders to sign up without requiring them to provide identity beyond an email — easily faked — or a phone number. (…) Vehicles were stolen and burned; drivers were assaulted, robbed and occasionally murdered. The company stuck with the low-friction sign-up system, even as violence increased.”

Trust & Safety
I

Investigation into the Unusual Signups

A really detailed analysis of suspicious contributor signups on OpenStreetMap. This beautiful and high-level report demonstrating an orchestrated and directed campaign might serve as a template for fraud reports.

Trust & Safety
M

MIDAS: Detecting Microcluster Anomalies in Edge...

A proposed method to “detects microcluster anomalies, or suddenly arriving groups of suspiciously similar edges, in edge streams, using constant time and memory.”

Trust & Safety
M

MISP taxonomies and classification

Tags to organize information on “threat intelligence including cyber security indicators, financial fraud or counter-terrorism information.”

Trust & Safety
P

PhishingKitTracker

CSV database of email addresses used by threat actor in phishing kits.

Trust & Safety
P

PhoneInfoga

Tools to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy. Then search for footprints on search engines to try to find the VoIP provider or identify the owner.

Trust & Safety
R

reCaptcha

reCaptcha is still an effective, economical and quick solution when your company can't afford to have a dedicated team to fight bots and spammers at internet scale.

Trust & Safety
S

SecLists

Collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

Trust & Safety
S

Sherlock

Hunt down social media accounts by username across social networks.

Trust & Safety
S

SpiderFoot

An open source intelligence (OSINT) automation tool. It integrates with just about every data source available and uses a range of methods for data analysis, making that data easy to navigate.

Trust & Safety
S

Standards related to Threat Intelligence

Open standards, tools and methodologies to support threat intelligence analysis.

Trust & Safety
S

Statistically Likely Usernames

Wordlists for creating statistically likely usernames for use in username-enumeration, simulated password-attacks and other security testing tasks.

Trust & Safety
S

Still Logged In: What AR and VR Can Learn from ...

“If you host an online community, where people can harm another person: you are on the hook. And if you can't afford to be on the hook, don't host an online community”.

Trust & Safety
T

The challenges of file formats

At one point you will let users upload files in your system. Here is a corpus of suspicious media files that can be leveraged by scammers =to bypass security or fool users.

Trust & Safety
T

The Cleaners

A documentary on these teams of underpaid people removing posts and deleting accounts.

Trust & Safety
T

The despair and darkness of people will get to you

Moderation of huge social networks is performed by an army of outsourced subcontractors. These people are exposed to the worst and generally ends up with PTSD.

Trust & Safety
T

The Laws of Identity

Is this paper aims at identity metasystem, its laws still provides great insights at smaller scale, especially the first law: to always allow user control and ask for consent to earn trust.

Trust & Safety
T

Trust and safety 101

A great introduction on the domain and its responsibilities.

Trust & Safety
W

What the Heck is Trust and Safety?

A couple of real use-case to demonstrate the role of a TnS team.

Trust & Safety
Y

You (probably) don't need ReCAPTCHA

Starts with a rant on how the service is a privacy nightmare and is tedious UI-wise, then list alternatives.

Trust & Safety
Y

You either die an MVP or live long enough to bu...

“You can think about the solution space for this problem by considering three dimensions: cost, accuracy and speed. And two approaches: human review and machine review. Humans are great in one of these dimensions: accuracy. The downside is that humans are expensive and slow. Machines, or robots, are great at the other two dimensions: cost and speed - they're much cheaper and faster. But the goal is to find a robot solution that is also sufficiently accurate for your needs.”

Trust & Safety