Authentication and Authorization for Mobile Devices

Nowadays market demand forces companies to adapt to mobile technology. For an enterprise company, this change will bring up security challenges. In this article, we investigate authentication and authorization aspects of security. We conduct a case study in Volvo IT in order to extract their requirements regarding to authentication and authorization of their current and future mobile applications. Also we investigate three security protocols: OAuth, OpenID and SAML to find out to what extent they can satisfy the challenges and requirements. Keywords-component; Authentication; Authorization; Mobility; Mobile Devices; OAuth; OpenID; SAML.