OpenID Connect vs OAuth | OpenID Connect explained

  Рет қаралды 41,593

Jan Goebel

Jan Goebel

Күн бұрын

Пікірлер: 37
@NadimAJ
@NadimAJ Жыл бұрын
I've been in the game 23 years and find these concepts truly difficult to understand but you do a great job. Thanks
@jgoebel
@jgoebel Жыл бұрын
Glad to help!
@cbest3678
@cbest3678 Жыл бұрын
Thank you very much for this video. Very precise. Have doubt when we ask for ID token what is the next work flow looks like ?.. I know for access token client application send it with each request to resource sevrer in order to get the resource of a usser. But with ID token how client application react? Is it going to ask the client information from resource sevrer or it will directly use the iD token for storing users info . Thanks
@jgoebel
@jgoebel Жыл бұрын
The id token contains identity information of the end user for example email etc. It is a JWT, so base64 url encoded. I.e. you would decode the base64 url encoded token and get the identity information for your app
@SomosExperiencia
@SomosExperiencia Жыл бұрын
Great explanation and very useful for no.coders PMs and POs. Thank you for sharing!
@shashankvivek4812
@shashankvivek4812 Жыл бұрын
outstanding playlist ! I struggled to understand this OAuth flows and OpenId during 2017. I wish this video was there at that time. The original website has too many technical terms to understand easily.
@jgoebel
@jgoebel Жыл бұрын
thx, I'm glad you found it useful
@55BLOCKS
@55BLOCKS 3 ай бұрын
I have an interview that requires this implementation Thank you
@deepakdonde9199
@deepakdonde9199 Жыл бұрын
Thanks for the simple explanation.
@jgoebel
@jgoebel Жыл бұрын
Glad it was helpful!
@amit2197kumar
@amit2197kumar 4 ай бұрын
Great explanation. Thanks
@AliRaza-zy1zk
@AliRaza-zy1zk Жыл бұрын
Brilliant and very simple explanation ☺️
@jgoebel
@jgoebel Жыл бұрын
Glad it helped!
@manideepkumar959
@manideepkumar959 9 ай бұрын
i got basic idea, but not so clear, i need the example of open id authorization
@ruocaled
@ruocaled 7 ай бұрын
So you're saying it's just for displaying something immediately on the callback UI to reduce API calls? seems pretty pointless unless it's does something else.
@jgoebel
@jgoebel 6 ай бұрын
It tells you who the end user is. OAuth only tells you what the end user can do
@6s6
@6s6 3 жыл бұрын
Fantastic video. I never understood the difference between the two and now it makes more sense... OIDC is just OAuth with additional scopes. A video request: How does SAML differ from this? Why don't companies and applications using SSO just use OIDC instead of SAML?
@jgoebel
@jgoebel 3 жыл бұрын
in principle yes. SAML is similar, but it is XML based. I haven't really used it before. SAML is supported for SSO for example in Azure Active Directory. It is supported because it came before OIDC
@saravanasai2391
@saravanasai2391 8 ай бұрын
Great explanation.
@jgoebel
@jgoebel 8 ай бұрын
Glad you liked it
@MrVitalirapalis
@MrVitalirapalis Жыл бұрын
Very good explained!!!
@jgoebel
@jgoebel Жыл бұрын
Glad you liked it
@abdelrhmansaeed4104
@abdelrhmansaeed4104 3 жыл бұрын
great video, but a question: what if my app uses stateless authentication with jwt, and has single sign on feature that uses gmail to authenticate, i just don't know, does the app use the gmail's generated jwt instead of its own jwt ? and how do i keep the user signed in, do i store the access token in a cookie ? or is that even safe ?
@jgoebel
@jgoebel 2 жыл бұрын
it depends how you use the Login with Google functionality and whether you have a backend. If you don't have a backend, well then you need to store the JWT somewhere in the FE, even though that's less secure. Most of the time you will probably have a backend. Theoretically you could put the ID token in an in an HTTPOnly, Secure cookie and pass it to the FE and then validate the signature when the cookie comes to the backend. Putting it in a cookie is certainly more secure than just returning it as a response. However, validating the signature with the Google public key on your backend would not be enough, you would also need to validate the aud claim for example. Otherwise anyone who would have a valid ID token for a user (e.g. a third party app) could impersonate the user. There are also a couple of other issues: 1. JWTs do not make good session tokens and you would need server side state on your app or you would need to hit the token introspection endpoint for every request to make sure that you can log someone out from the server side. I made a dedicated video why JWTs do not make good session tokens. 2. you do not have control over how long the ID token is valid 3. If you use the ID token as session token, you would not be able to add any session data in the token because only Google has the private key. If you want to add your own data, then you would need to sign your own JWT. But again, JWT are actually not well suited for session tokens. If you have your own session storage or issues JWTs from your server, you can make the session as long as you want. If you actually need to access a specific Google API, then you need a refresh token, but if you use Google to only get the email address of the user (thereby avoiding that you need to store a password), then you probably don't need a refresh token
@carlotadias9335
@carlotadias9335 29 күн бұрын
thank you what would be a good fit for session token, if JWT is not? thank you in advance,
@vk2875
@vk2875 2 жыл бұрын
Excellent video and amazing content details explanation, it really helped a lot in clarifying the concepts.
@jgoebel
@jgoebel 2 жыл бұрын
Glad you enjoyed it!
@ryans5476
@ryans5476 Жыл бұрын
I'm a little confused with your explanation. Typically, authentication precedes authorization. I cannot authorize someone unless I know who they are, i.e. authenticated.
@jgoebel
@jgoebel Жыл бұрын
You can authorize actions without knowing who the person is. E.g. if you have a hotel card that gives you access to the gym or the spa, then the door you hold the card against does not know who you are, it just knows that you have access to this room. Now ideally the door would also log who you are, but strictly speaking not required. I.e. you can enforce authorization without authentication and this is what OAuth does (OAuth = Open Authorization)
@carlotadias9335
@carlotadias9335 29 күн бұрын
if I well understood the video access_token = authorization token comes last and the code is like the authentication token, but in this case it is not returning any user info, just an authorization, that's why Auth 2.0 is just an authorization process which results in a access_token delivered to the app/site, no Authentication process occurs (if there is no OpenID involved).
@ernestbrant
@ernestbrant 2 жыл бұрын
Great Video 🙂
@jgoebel
@jgoebel 2 жыл бұрын
Thanks! 🙂
@avengerendgame9809
@avengerendgame9809 2 жыл бұрын
Help me
@avengerendgame9809
@avengerendgame9809 2 жыл бұрын
Open id
@carlotadias9335
@carlotadias9335 29 күн бұрын
👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌👌🧙‍♂🌐🛰🎣👑 you nailed it thank you so much
An Illustrated Guide to OAuth and OpenID Connect
16:36
OktaDev
Рет қаралды 624 М.
OAuth Authorization code flow
11:49
Jan Goebel
Рет қаралды 54 М.
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.
SAML vs OAuth vs OIDC (explained simply!)
20:32
Ubisecure
Рет қаралды 58 М.
OAuth 2 Token Introspection
8:07
Jan Goebel
Рет қаралды 8 М.
Session Vs JWT: The Differences You May Not Know!
7:00
ByteByteGo
Рет қаралды 300 М.
OAuth 2.0 - a dead simple explanation
9:16
Jan Goebel
Рет қаралды 26 М.
OAuth and OpenID Connect - Know the Difference
10:18
Viraj Shetty
Рет қаралды 13 М.
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,8 МЛН
OAuth PKCE | OAuth Proof Key for Code Exchange explained
9:39
Jan Goebel
Рет қаралды 48 М.
Difference between cookies, session and tokens
11:53
Valentin Despa
Рет қаралды 668 М.
OpenID Connect - Basics
13:29
Sascha Preibisch
Рет қаралды 27 М.
OAuth 2.0 Simplified | Authorization Code & Implicit Flow Explained
10:04
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.