Title: Using OX for Social Login
 1Using OX for Social Login 
  So you have a website or mobile application, 
and you want to support social login? Consider 
using the following imaginary website for Acme 
Incorporated. Instead of your local username and 
password, you decide to use the Login with 
Yahoo button.   OX enables a domain to define 
custom authentication scripts. When you click the 
Login with Yahoo button, the login page uses 
Acmes OpenID Connect API (served by OX), and 
includes the GET parameters auth_modeyahoo. 
This enable OX to select the correct 
authentication script for Yahoo. This script 
could use the Yahoo API to validate your current 
session or to re-direct you for 
authentication.   Once you are authenticated, you 
can see a portal with several panels. Each panel 
is served by a different back-end web server 
which needs to know your identity in order to 
display the right content.   Its a bad idea to 
instruct each backend web application to use the 
social API directly. If you did that, each 
application would have to implement business 
logic for every social login API. If Yahoo or 
Google updates their API, every application would 
have to update their code. Plus, introducing new 
authentication mechanisms would be difficult 
youd have to get every app to do so. 
 2Using the social login API directly could make it 
hard for the backend web applications to get all 
the needed information about you. For example, 
the billing application might need your Acme 
account number, which Yahoo does not know.   But 
how does Acme know which person corresponds to 
which social account? This is where you need to 
consider enrollment. Frequently, a person with a 
local account specifies that they want to 
associate a social account. Or if you first 
authenticate with a social login, you may need to 
provide additional informationfor example 
address, phone number, account numberto enable 
the organization to setup a local account.   In 
many ways using a social login API is no 
different from the considerations of using any 
external authentication provider, for example Duo 
or OneID. A custom authentication script could 
even support uber-authentication APIs, like 
Janrain or Gigya. These services would enable you 
to create one custom authentication script to 
support multiple consumer IDPs.   The key 
takeaway from this should be the following 
within your domain, stick to open standards like 
OpenID Connect and SAML. This gives you the most 
flexibility to change your business logic for 
authentication, without having to update your 
applications.   Article Resource 
http//thegluuserver.wordpress.com/2013/11/06/usin
g-ox-for-social-login-2/ 
 3Think about the front door   Businesses are 
advised to invest in the part of their facility 
that the customer sees. With access management 
systems, this is the login experience, and the 
authorization experience. Frequently I remind 
Gluu customers to consider the authentication 
triangle, the vertices are (1) security, (2) 
price and (3) usability. Each authentication 
mechanism has its own unique triangle. Much 
attention lately has been focused on security. 
But many of the advancements have been to enable 
stronger security, while at the same time 
improving usability. The best kind of 
authentication is the one you never see! Consumer 
IDPs are looking at many contextual indicators to 
figure out if an interactive authentication is 
needed. Organizations should follow suit.   Try 
your best, but be flexible.   If a certain 
application cant use OAuth2, its ok to fallback. 
There might be an old version of IIS you need to 
support. Or the SaaS provider just supports SAML 
its ok! Dont worry. You want to guide 
applications to use open standards. SAML or even 
SiteMinder is a lot better than for the website 
to store credentials for the person.   Is 
SiteMinder Dead   Granted SiteMinder is Dead 
is sensationalist. Old SSO protocols hang around 
until you disconnect the last site. That can be 
some time, which is why we want the standards to 
be well tested. Thats why the title of the 
previous blog said Decline, not Dead. If you 
have a sizable organization, and are looking at a 
green field, are you installing a commercial IAM 
Suite, an IDaaS, or open source? The last two 
didnt even exist until a few years ago. No 
matter how you slice it, monolithic IAM Suites 
like CA SiteMinder are going to get a smaller 
percentage of the market, and reducing prices to 
get a small number of new customers might not be 
offset by revenue loss from existing customers. 
In rapidly growing markets, the price goes down, 
the total size of the market increases, and the 
initial suppliers are challenged to make a very 
difficult pivot. 
 4In any case, at Gluu, we think there is a bigger 
opportunity to provide service to the market that 
doesnt yet have a SiteMinder, than disrupting 
current monolithic IAM customers. Most current 
solutions are hub and spoke usually a big IDP 
and lots of internal websites, some external SaaS 
services, and partner sites. How many inbound 
SAML connections does your average organization 
support? The answer is frequently not many. Big 
companies can afford commercial Access Management 
/ Federation software, but their partners usually 
cannot. Net-net, this means the cost of 
extranet user management is either too high or 
even worse, its insecure. Organizations want open 
source because there is a benefit if their 
partners can cost effectively upgrade their 
IAM. You can substitute SiteMinder with the IAM 
product of your choice, for example Oracle Access 
Manager (OAM), RSA Cleartrust, or IBM Tivoli 
Access Manager (TAM). Although some IAM products 
also use HTTP reverse proxies, the idea is 
generally the same align with the old until you 
migrate existing apps. Notice in this diagram, 
there are two OAuth2 Authorization Servers. 
OAuth2 enables federated authorization sometimes 
many parent organizations make different 
policies, and application developers need to 
ensure all the policies are considered. Article 
Source - http//www.gluu.org/blog/how-to-move-away
-from-ca-siteminder-to-open-source-authn-authz/