OAuth: Getting Started – Part I : 俺約


Getting Started – Part I

Adapted from Beginner’s Guide to OAuth – Part I, published on October 4, 2007 by Eran Hammer-Lahav


This guide is intended for a technical audience with focus on implementation. I dedicate one section to the end-user perspective which is something I expect many others will address with mockups, user interface designs, best practices guides, and of course working services. To make the most out of this guide, keep the specification handy as I will be referencing it, walking you through the spec and adding color where needed. This guide does not replace the specification nor can it be used alone for implementation as it is incomplete.


End-User Benefits

OAuth allows you to share your private resources (photos, videos, contact list, bank accounts) stored on one site with another site without having to hand out your username and password. There are many reasons why one should not share their private credentials. Giving your email account password to a social network site so they can look up your friends is the same thing as going to dinner and giving your ATM card and PIN code to the waiter when it’s time to pay. Any restaurant asking for your PIN code will go out of business, but when it comes to the web, users put themselves at risk sharing the same private information. OAuth to the rescue.


Both the valet key and ATM cards are good metaphors for OAuth from a user perspective. Instead of giving your ATM card and PIN code, the card can double as a credit card with a signature authorization. Just like your username and password provide full access to your resources, your ATM card and PIN code provide you with great control over your bank accounts – much more than just charging goods. But when you replace the PIN code with your signature, the card becomes very limited and can only be used for limited access.


Users don’t care about protocols and standards – they care about better experience with enhanced privacy and security. This is exactly what OAuth sets to achieve. With web services on the rise, people expect their services to work together in order to accomplish something new. Instead of using a single site for all their online needs, users use one site for their photos, another for videos, another for email, and so on. No one site can do everything better. In order to enable this kind of integration, sites need to access the user resources from other sites, and those are many times protected (private family photos, work documents, bank records). They need a key to get in.


The key used by users is usually a combination of username and password. This can be an OpenID or any other login credential. But this key is too powerful and unrestrictive to share around. It also cannot be unshared once handed out except for changing it which will void access to every site, not just the one the user intends to block. OAuth addresses that by allowing users to hand out tokens instead. Each token grants access to a specific site (a video editing site) for specific resources (just videos from last weekend) and for a defined duration (the next 2 hours).


Unlike OpenID where users must do something first – get an OpenID identity they can use to sign-into sites – OAuth is completely transparent to the users. In many cases (if done right), the end-user will not know anything about OAuth, what it is or how it works. The user experience will be specific to the implementation of both the site requesting access and the one storing the resources, and adjusted to the device being used (web browser, mobile phone, PDA, set-top box).


A typical example offered by the spec (Appendix A) is when a user wants to print a photo stored on another site. The interaction goes something like this: the user signs into the printer website and place an order for prints. The printer website asks which photos to print and the user chooses the name of the site where her photos are stored (from the list of sites supported by the printer). The printer website sends the user to the photo site to grant access. At the photo site the user signs into her account and is asked if she really wants to share her photos with the printer. If she agrees, she is sent back to the printer site which can now access the photos. At no point did the user share her username and password with the printer site.

ユーザーが別のサイトに保存している写真を印刷したい、という典型的例スペック(Appendix A)で紹介しています。 ユーザーは印刷Webサイトにサインインして印刷を注文します。そのサイトはどの写真を印刷するかを聞いてくるので、ユーザーは写真が保存されているサイト名を選択します。プリンタWebサイトはユーザーを写真サイトに転送してアクセスを許可するように促します。写真サイトでユーザーがサインインして本当に自分の写真をプリンターサイトに共有させてもいいかを聞きます。もしも彼女が同意すれば、プリンターサイトの戻されてそこでそのサイトは写真にアクセスすることができるのです。ユーザー名とパスワードをプリンタサイトと共有することはどこにもありません。


What is publicly known as ‘OAuth’ is really the ‘OAuth Core 1.0’ specification. The Core designation is used to stress that this is the skeleton other extensions and protocols can build upon. OAuth Core 1.0 does NOT by itself provide many desired features such as automated discovery of endpoints, language support, support for XML-RPC and SOAP, standard definition of resource access, OpenID integration, a full range of signing algorithms, and many other great ideas posted to the OAuth group.

‘OAuth’と呼ばれているものは’OAuth Core 1.0‘ スペックです。他の拡張やプロトコルを追加するためのスケルトンであることがCoreの目的として強く掲げられています。自動ディスカバリとか言語サポート、XML-RPCやSOAPのサポート、リソースアクセスの標準デザイン、OpenID統合、署名アルゴリズムをフルレンジでサポートすることなどはCoreには入っていません。他の多くのグッドアイデアがOAuthグループに寄せられています。

This was intentional and is viewed by the authors as a benefit. As the name implies, Core deals with the most fundamental aspects of the protocol:

  • Establish a mechanism for exchanging a username and password for a token with defined rights (Section 6). (ユーザー名とパスワードを示された権限でトークンに変換するメカニズムの確立:Section 6)
  • Provide tools to protect these tokens (Section 9). (トークンを守るツール:Section 9)

It is important to understand that security and privacy are not guaranteed by the protocol. In fact, OAuth by itself provides no privacy at all and depends on other protocols to accomplish that (such as SSL). With that said, OAuth can be implemented in a very secure manner and the specification includes a good amount of security considerations to take include account when working with sensitive resources. Just like using passwords together with usernames to gain access, sites will use tokens together with secrets to access resources. And just like passwords, secrets must be protected.


Specification Overview

OAuth Core 1.0 includes 13 sections which are ordered in a way that allows a single pass through the spec without the need to go back and forth many times. If you want to dive right in, start with Appendix A, then read sections 3, 4.1, 6, 7, and 5.4. Read sections 5 and 9 when you are ready to implement.

  • Section 1 – list of authors.
  • Section 2 – general notations used by the spec.
  • Section 3 – definitions of important terms used throughout the spec. While most are simple to understand, it is important to read this section a couple of times as it sets the framework for the rest of the document.
  • Section 4 – protocol preparations. Before using OAuth, sites must follow a few steps to prepare for the protocol. The spec does not specify how this is done but does provide guidelines as to what information should be documented and established before the first OAuth request is made.
  • Section 5 – implementation details on formatting parameters and interaction with the HTTP protocol.
  • Section 6 – defines the mechanism for exchanging user credentials with a token. It is the heart of the specification and describes the entire flow including user interaction.
  • Section 7 – defines how tokens are actually used to access resources. This short section is where most of OAuth takes place.
  • Section 8 – technical details about creating nonce and timestamp values. Note that OAuth definition of timestamps does not necessarily means real time is used.
  • Section 9 – while section 6 covers the first goal of the protocol, to exchange user credentials for a token, this section defines tools to protect the token from abuse. The signature process provides a working prototype and support for future extensions.
  • Section 10 – suggested HTTP response codes. OAuth Core leaves much open for individual implementations.
  • Appendix A – a complete example for sections 4 to 9. This is a good place to start reading if you intend to implement OAuth. It lets you dig right into the actual requests and see how they work.
  • Appendix B – is an incomplete (as is true for most security papers) list of security considerations. It is absolutely critical that any OAuth implementer reads this thoroughly to understand the risks involved. Deciding on how to address this list is up to each implementation and depends on needs.
  • Section 11 – list of references and links to external documents.
1. 作者一覧 ,2. 表記 , 3. 語彙の定義 ,4. プロトコルの準備, 5. パラメータ書式とHTTPでの実装詳細, 6. トークン変換 ,7. トークンの使われ方, 8. ノンスとタイムスタンプ , 9. トークンを守るために , 10. HTTP応答コード , A. 4-9の例 B. セキュリティの考慮 , 11. リファレンス



Section 3 contains definitions to fundamental protocol concepts referenced throughout the spec. Because understanding OAuth depends on these terms, they deserve some explanation:

  • Service Provider – the Service Provider controls all aspects of the OAuth implementation. The Service Provider is the term used to describe the website or web-service where the restricted resources are located. It can be a photo sharing site where users keep albums, an online bank service, a microblogging site, or any other service where ‘user’s private stuff’ is kept. OAuth does not mandate that the Service Provider will also be the identity provider which means the Service Provider can use its own usernames and passwords to authenticate users, or use other systems such as OpenID. (サービスプロバイダ:OAuth実装のすべてをコントロール。リソースが存在する場所。写真共有サイトとか。)
  • User – the user is why OAuth exists and without users, there is no need for OAuth. The users have ‘stuff’ they don’t want to make public on the Service Provider, but they do want to share it with another site. In OAuth, the protocol stops without manual interaction with the user at least once to receive permission to grant access. (ユーザー:サービスプロバイダにあるプライベートな’stuff’を他のサイトに共有したい。)
  • Consumer – this is a fancy name for an application trying to access the User’s resources. This can be a website, a desktop program, a mobile device, a set-top box, or anything else connected to the web. The Consumer is the one getting permission to access resources and the Consumer is where the useful part of OAuth happens. OAuth defines ‘Consumer Developer’ as the entity writing code to interact with the Service Provider. ‘Consumer Key’ and ‘Consumer Secret’ will be explained later. (コンシューマ:サービスプロバイダからデータをもらう側。Comsumer Developer , Consumer Key , Consumer Secretとか)
  • Protected Resources: the ‘stuff’ OAuth protects and allow access to. This can be data (photos, documents, contacts), activities (posting blog item, transferring funds) or any URL with a need for access restrictions. (保護リソース: OAuthが守ったりアクセスを許可したりする’stuff’。 )
  • Tokens – are used instead of User credentials to access resources. A Token is generally a random string of letters and numbers (but not limited to) that is unique, hard to guess, and paired with a Secret to protect the Token from being abused. OAuth defines two different types of Tokens: Request and Access. This are explained later in greater details. (トークン:ユーザーに代わってリソースにアクセスするために使われるクレデンシャル。リクエストトークンとアクセストークンがある)


This article will be continued in Part 2.

  • OAuth: Getting Started – Part I

  • カテゴリー: 未分類 パーマリンク



    WordPress.com ロゴ

    WordPress.com アカウントを使ってコメントしています。 ログアウト / 変更 )

    Twitter 画像

    Twitter アカウントを使ってコメントしています。 ログアウト / 変更 )

    Facebook の写真

    Facebook アカウントを使ってコメントしています。 ログアウト / 変更 )

    Google+ フォト

    Google+ アカウントを使ってコメントしています。 ログアウト / 変更 )

    %s と連携中