weareliferuiner

  • Home
  • TECH
    • APP
    • APP REVIEW
    • GADGETS
    • IOS
    • MAC
    • SMARTPHONE
  • COMMUNICATION
  • LIFESTYLE
    • BEAUTY
    • FAMILY
    • FESTIVAL
    • FITNESS
    • FOOD & DRINK
    • HEALTH
  • MONEY
  • Chocolate
  • PRODUCTIVITY
  • NEWS
  • Contact Us !
Reading: Google will review web apps that want access to its users’ data
Share
Aa
Aa
weareliferuinerweareliferuiner
Search
  • Home
  • TECH
    • APP
    • APP REVIEW
    • GADGETS
    • IOS
    • MAC
    • SMARTPHONE
  • COMMUNICATION
  • LIFESTYLE
    • BEAUTY
    • FAMILY
    • FESTIVAL
    • FITNESS
    • FOOD & DRINK
    • HEALTH
  • MONEY
  • Chocolate
  • PRODUCTIVITY
  • NEWS
  • Contact Us !
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
weareliferuiner > TECH > APP REVIEW > Google will review web apps that want access to its users’ data
APP REVIEW

Google will review web apps that want access to its users’ data

Loknath Das
Last updated: 2017/05/28 at 5:44 PM
By Loknath Das 3 Min Read
Share
SHARE

img 20170425 105827 01

In response to recent attacks where hackers abused Google’s OAuth services to gain access to Gmail accounts, the company will review new web applications that request Google users’ data.

To better enforce its policy regarding access to user data through its APIs (application programming interfaces), which states that apps should not mislead users when presenting themselves and their intentions, Google is making changes to the third-party app publishing process, its risk assessment systems and the consent page it displays to users.

Google is an identity provider, which means other web apps can use Google as the authentication mechanism for users accessing the app. Apps use the OAuth protocol to do this. These apps can also use Google’s APIs to send users requests for information stored in Google’s services.

[ Also on ITworld: Low and no-cost ways to learn about IT security. ]

Last week, a large number of users received a well-crafted phishing email that asked them to view a document in Google Docs. Clicking on the link redirected them to a Google OAuth consent page that said an application called Google Docs wanted access to their contacts and Gmail accounts.

The reason this spoofing attack worked is that there was no mechanism to prevent a third-party app registered to Google’s OAuth service from using the same name as one of Google’s own apps — or the name of another legitimate third-party app.

Since the attack, Google has strengthened its risk assessment for new apps and made other changes to better detect such abuse. So app developers might see error messages when registering new applications or modifying existing ones in the Google API Console, Firebase Console, or Apps Script editor, the Google Identity Team said in a blog post.

On top of this, based on the results of the enhanced risk assessment, some web applications will need to undergo a manual review and approval process that could take from three to seven business days.

“Until the review is complete, users will not be able to approve the data permissions, and we will display an error message instead of the permissions consent page,” the Google identity team said.

For now, developers will only be able to request a review during the application testing phase, but in the future, Google will also allow review requests during the registration phase.

Until the app is reviewed, developers will be able to continue testing their app using their own account, as well as to add additional testers.

[“Source-ndtv”]

TAGGED: Access, Apps, Data, Google, its, Review, that, to, Users, Want, Web, will)
Loknath Das May 28, 2017
Previous Article China unveils flagship nuclear tech to be used in Karachi atomic plants
Next Article Three apps to get that photo just right

Latest News

What to Do After a Binge: A Therapist and Dietitian’s Perspectives
Chocolate
A Woman’s Guide to Gaining Muscle with Weight Training
LIFESTYLE
Differences Between Secondary and Primary Memory Difference between Primary and
TECH
Explore Asian & Pacific Islander Heritage with Google
PRODUCTIVITY
How to Surprise Mom on Mother’s Day: 12 Unique Ideas
Chocolate
Educating Your Children About the Value of Family
FAMILY
Essential Steps for Prime Contractors to Enforce CMMC Compliance Requirements Across Their Supply Chain
NEWS
The Top 20 Fitness Blogs
FITNESS

Removed from reading list

Undo

Lost your password?