You Shall Not Pass: Logging in to Input Constrained Devices

Have you tried to log in to an internet service using a TV remote control? Down, down, right, select. Right, right, right, up, select. Eventually, you get to the end, and you got a typo somewhere.

This is the plight of the "Input Constrained Device", and your job is to make your user not hate you.

In this presentation, we'll take a look at current authentication flows, and discover one that's designed to side-step the need for clumsy input devices altogether. We'll also put theory to the test with a live coding demo, with one lucky audience member unlocking the proverbial fridge!

Vorkenntnisse

  • No prior knowledge is required

Lernziele

  • To understand the various OpenID Connect authentication flows, how they differ, how they work, and which is right for which situation, with a focus on IoT devices that don't have keyboards
  • It also includes a live demo for the audience to log into from their own seat

Speaker

 

Ben Dechrai
Ben Dechrai is a technologist with a staunch focus on security and privacy. This started at the age of 11, when he wrote software to stop his parents from breaking the family PC, and resulted in his working as a developer advocate for Auth0. He enjoys helping developers find the joy of experimentation.

Gold-Sponsoren

codecentric
Com2m
HiveMQ
Novatec

Silber-Sponsoren

Akenza
Goldbeck
MaibornWolff

building-IoT-Newsletter

Sie möchten über die building IoT
auf dem Laufenden gehalten werden?

 

Anmelden