%0 Conference Proceedings %T Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments %+ Fondazione Bruno Kessler [Trento, Italy] (FBK) %+ Dipartimento di Informatica, Bioingegneria, Robotica e Ingegneria dei Sistemi [Genova] (DIBRIS) %+ Department of mathematics/Dipartimento di Matematica [Univ. Trento] %A Dashti, Salimeh %A Sharif, Amir %A Carbone, Roberto %A Ranise, Silvio %Z Part 6: Potpourri II %< avec comité de lecture %( Lecture Notes in Computer Science %B 35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) %C Calgary, AB, Canada %Y Ken Barker %Y Kambiz Ghazinour %I Springer International Publishing %3 Data and Applications Security and Privacy XXXV %V LNCS-12840 %P 325-337 %8 2021-07-19 %D 2021 %R 10.1007/978-3-030-81242-3_19 %K Digital identity %K PSD2 %K OAuth 2.0 %K OIDC %K GDPR %K DPIA %Z Computer Science [cs]Conference papers %X The introduction of the Payment Service Directive (PSD2) has accelerated financial services and open banking growth. Deploying appropriate identity management solutions is crucial. This implies the adoption of secure protocols for authentication and authorization, such as OpenID Connect and OAuth 2.0. The PSD2 also requires the application of the General Data Protection Regulation (GDPR) when transactions involve personal data. In turn, the GDPR mandates a Data Protection Impact Assessment (DPIA) for assessing risks posed to data subjects’ rights and freedom. This is a time-consuming and challenging task requiring heterogeneous skills that include the knowledge of best practices for deploying protocols, security mechanisms adopted by available identity management providers, and the capability to perform careful what-if analysis of the possible alternatives. To assist users in this task, we propose a methodology based on the formalization of the what-if analysis as an optimization problem that available tools can solve. The formalization is derived from the OAuth 2.0 and OpenID connects standards, security best practices to mitigate threats, and thorough the evaluation of 19 identity management providers to check their supported features concerning the identified set of features for OAuth/OIDC solutions. We apply the methodology to assist controllers and identify the most appropriate security setup to drive the process of making financial services compliant with the PSD2. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-03677036/document %2 https://inria.hal.science/hal-03677036/file/513274_1_En_19_Chapter.pdf %L hal-03677036 %U https://inria.hal.science/hal-03677036 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-12840