OpenID Connect - id_token, what they are, how they work

  Рет қаралды 10,796

Sascha Preibisch

Sascha Preibisch

Күн бұрын

Пікірлер: 29
@riddhishchakraborty8529
@riddhishchakraborty8529 6 ай бұрын
This video and the first one, was immensely helpful in understanding the concepts. Thanks for making it very informative.
@michaellong3534
@michaellong3534 3 жыл бұрын
This was a very informative presentation... specifically the breakdown of the id-token structure. Thank you for sharing this.
@saschazegerman
@saschazegerman 4 жыл бұрын
Sorry for the poor sound quality, my notebook is dying, slowly but surely. Where the video says: 'recreate signature' it refers to 'validate signature'. I hope the video is still useful! Oh, and it's 'Rule of thumb' not 'Thumb of rule' ...
@magnuspayton3059
@magnuspayton3059 3 жыл бұрын
I know im asking randomly but does anybody know of a method to log back into an Instagram account? I somehow lost the password. I love any tricks you can give me.
@griffinapollo7717
@griffinapollo7717 3 жыл бұрын
@Magnus Payton instablaster :)
@magnuspayton3059
@magnuspayton3059 3 жыл бұрын
@Griffin Apollo Thanks so much for your reply. I found the site thru google and Im waiting for the hacking stuff now. Takes quite some time so I will get back to you later with my results.
@magnuspayton3059
@magnuspayton3059 3 жыл бұрын
@Griffin Apollo it worked and I finally got access to my account again. Im so happy! Thanks so much, you really help me out!
@griffinapollo7717
@griffinapollo7717 3 жыл бұрын
@Magnus Payton You are welcome xD
@rodneydias9586
@rodneydias9586 4 жыл бұрын
Excellent content
@saschazegerman
@saschazegerman 4 жыл бұрын
Thank you, glad to hear that!
@benrouynesaad251
@benrouynesaad251 2 жыл бұрын
Great content ! Thank you. If I may ask, where is it mentionned in the openid specification that we can skip idtoken validation when calling an idp throught ssl ? Thanks again.
@saschazegerman
@saschazegerman 2 жыл бұрын
Hello Benrouyne, thank you for you comment! Please check this section of the OpenID Connect Core spec: openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation, 3.1.3.7. ID Token Validation, bullet 6. I hope that answers your question.
@manideepkumar959
@manideepkumar959 8 ай бұрын
Header Payload Signature must be equal to sha-256(Base64(header)+Base 64(payload)) {abcd} {name:”Mani”} Now I will generate signature as above {efgh} {name:”Suresh”} Now I will generate signature as above, they will verify whether my signature is sha-256(Base64(header)+Base 64(payload)) or not, it will be correct , how can they assure my payload is not tampered
@saschazegerman
@saschazegerman 8 ай бұрын
Hi! SHA256 is only true for algorithms that use sha256. And base46url encoding is done on the output of generated hash. Do you think you identified something that should have been explained differently?
@manideepkumar959
@manideepkumar959 8 ай бұрын
I didn't understand at all, sh-256 itself cant be reversed why to do base 64 on hash
@saschazegerman
@saschazegerman 8 ай бұрын
@@manideepkumar959 Base64url encoding transforms the hash value into a regular string which can be transferred in an http message
@sonyolcu23
@sonyolcu23 7 ай бұрын
Good catch. Actually the OP explained that part but it is missing. comparing the calculated hash value with signature hash in the token is not enough. There is an encryption and decryption process to verify the signature. It works like this: you have a data and a public/private pair. Data is hashed end encrypted with Private key and the result is a Signature. To verify that if signature is correct: Signature is decrypted with Public key and the result should be the hash value of the data. This is the validation. In the ID token scenario, Issuer creates the signature using its Private key. To validate the signature you have to use the Public key which you can get from the jwks_url. Creating the signature works like Encryption, validating the signature works like Decryption. This detail is missing in the video. (i.stack.imgur.com/B93DO.png)
@saschazegerman
@saschazegerman 7 ай бұрын
@@sonyolcu23 Thank you for your comment. But please note that your comment contains a few wrong messages. Private keys are not used for encryption, public keys are not used for decryption as you mentioned it above. The id_token is not encrypted, only signed in this video. Private key -> create signature, public key -> verify signature. No encryption is used in this context. In this video only JWT, JWS (signature) are referenced, not JWE (encryption).
@balaji3229
@balaji3229 2 жыл бұрын
Thank you very much for the clear explanation. I have a case where i need to support multiple client apps(who are indeed multiple tenants) accessing a resource server using oauth2. I do have the OIDC (using PingFed) on top of oauth2. Can i leverage ID_Token's aud grant to identify the tenant_id in the resourceserver backend ?
@saschazegerman
@saschazegerman 2 жыл бұрын
Thank you for watching! id_token are not send to resource servers and therefore that would not work. However, if your access_token is JWT based it may have claims inside of it that work for you. 'aud' could have multiple values but 'azp' may work for you. Have a look here and check of some of these claims are found in your access_token: openid.net/specs/openid-connect-core-1_0.html#IDToken I hope this helps!
@balaji3229
@balaji3229 2 жыл бұрын
@@saschazegerman The huge challenge for the resource server is, how to trust the Client/TenantId by accepting the notion, who they say they are
@saschazegerman
@saschazegerman 2 жыл бұрын
@@balaji3229 If your resource server does not trust the issuer of the access_token (which I assume includes the info about the client_id/tenant) then you may ignore any token received by that issuer. If is all a question of "which issuers do I accept, which ones do I not". A similar example: If you implement Sign In with Google and the google issued userinfo response says: email_verified=true. Do you believe that google verified the email or not? If you don't, you may not want to implement that feature.
@arijitnandi911
@arijitnandi911 2 жыл бұрын
amazing content
@saschazegerman
@saschazegerman 2 жыл бұрын
Thank you!
@mohammedsahil7618
@mohammedsahil7618 2 жыл бұрын
What's the point of having 'exp' in id token? Why shouldn't I use expired id token?
@saschazegerman
@saschazegerman 2 жыл бұрын
Hi Mohammed! It is the same reason as for an expiration of a passport or personal ID card or driver license. The issuer either is uncomfortable saying "these values are valid forever" or the issuers verify that users are still "under its control". There are probably more reasons, too. I hope this helps.
@vagishyagnik
@vagishyagnik 2 жыл бұрын
Life saver
@david-tracy
@david-tracy 3 жыл бұрын
excellent
@saschazegerman
@saschazegerman 2 жыл бұрын
Thank you!
An Illustrated Guide to OAuth and OpenID Connect
16:36
OktaDev
Рет қаралды 615 М.
OpenID Connect - Basics
13:29
Sascha Preibisch
Рет қаралды 27 М.
Симбу закрыли дома?! 🔒 #симба #симбочка #арти
00:41
Симбочка Пимпочка
Рет қаралды 5 МЛН
Do you love Blackpink?🖤🩷
00:23
Karina
Рет қаралды 21 МЛН
Twin Telepathy Challenge!
00:23
Stokes Twins
Рет қаралды 121 МЛН
OAuth and OpenID Connect for Microservices
18:33
Nordic APIs
Рет қаралды 183 М.
OAuth 2.0 - Token Exchange
14:34
Sascha Preibisch
Рет қаралды 11 М.
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,8 МЛН
What makes JSON Web Tokens (JWT) secure?
34:04
Hasgeek TV
Рет қаралды 41 М.
OAuth 2.0 - Refresh Token
13:25
Sascha Preibisch
Рет қаралды 53 М.
Difference between cookies, session and tokens
11:53
Valentin Despa
Рет қаралды 657 М.
oAuth and OpenID connect | Most confusing topic in plain english
31:11
Симбу закрыли дома?! 🔒 #симба #симбочка #арти
00:41
Симбочка Пимпочка
Рет қаралды 5 МЛН