No video

OpenID Connect vs OAuth | OpenID Connect explained

  Рет қаралды 38,321

Jan Goebel

Jan Goebel

Күн бұрын

Пікірлер: 32
@NadimAJ
@NadimAJ Жыл бұрын
I've been in the game 23 years and find these concepts truly difficult to understand but you do a great job. Thanks
@jgoebel
@jgoebel Жыл бұрын
Glad to help!
@amit2197kumar
@amit2197kumar 13 күн бұрын
Great explanation. Thanks
@shashankvivek4812
@shashankvivek4812 Жыл бұрын
outstanding playlist ! I struggled to understand this OAuth flows and OpenId during 2017. I wish this video was there at that time. The original website has too many technical terms to understand easily.
@jgoebel
@jgoebel Жыл бұрын
thx, I'm glad you found it useful
@6s6
@6s6 2 жыл бұрын
Fantastic video. I never understood the difference between the two and now it makes more sense... OIDC is just OAuth with additional scopes. A video request: How does SAML differ from this? Why don't companies and applications using SSO just use OIDC instead of SAML?
@jgoebel
@jgoebel 2 жыл бұрын
in principle yes. SAML is similar, but it is XML based. I haven't really used it before. SAML is supported for SSO for example in Azure Active Directory. It is supported because it came before OIDC
@SomosExperiencia
@SomosExperiencia Жыл бұрын
Great explanation and very useful for no.coders PMs and POs. Thank you for sharing!
@cbest3678
@cbest3678 8 ай бұрын
Thank you very much for this video. Very precise. Have doubt when we ask for ID token what is the next work flow looks like ?.. I know for access token client application send it with each request to resource sevrer in order to get the resource of a usser. But with ID token how client application react? Is it going to ask the client information from resource sevrer or it will directly use the iD token for storing users info . Thanks
@jgoebel
@jgoebel 8 ай бұрын
The id token contains identity information of the end user for example email etc. It is a JWT, so base64 url encoded. I.e. you would decode the base64 url encoded token and get the identity information for your app
@deepakdonde9199
@deepakdonde9199 Жыл бұрын
Thanks for the simple explanation.
@jgoebel
@jgoebel Жыл бұрын
Glad it was helpful!
@AliRaza-zy1zk
@AliRaza-zy1zk Жыл бұрын
Brilliant and very simple explanation ☺️
@jgoebel
@jgoebel Жыл бұрын
Glad it helped!
@saravanasai2391
@saravanasai2391 4 ай бұрын
Great explanation.
@jgoebel
@jgoebel 4 ай бұрын
Glad you liked it
@manideepkumar959
@manideepkumar959 5 ай бұрын
i got basic idea, but not so clear, i need the example of open id authorization
@vk2875
@vk2875 2 жыл бұрын
Excellent video and amazing content details explanation, it really helped a lot in clarifying the concepts.
@jgoebel
@jgoebel 2 жыл бұрын
Glad you enjoyed it!
@MrVitalirapalis
@MrVitalirapalis Жыл бұрын
Very good explained!!!
@jgoebel
@jgoebel Жыл бұрын
Glad you liked it
@ruocaled
@ruocaled 3 ай бұрын
So you're saying it's just for displaying something immediately on the callback UI to reduce API calls? seems pretty pointless unless it's does something else.
@jgoebel
@jgoebel 2 ай бұрын
It tells you who the end user is. OAuth only tells you what the end user can do
@abdelrhmansaeed4104
@abdelrhmansaeed4104 2 жыл бұрын
great video, but a question: what if my app uses stateless authentication with jwt, and has single sign on feature that uses gmail to authenticate, i just don't know, does the app use the gmail's generated jwt instead of its own jwt ? and how do i keep the user signed in, do i store the access token in a cookie ? or is that even safe ?
@jgoebel
@jgoebel 2 жыл бұрын
it depends how you use the Login with Google functionality and whether you have a backend. If you don't have a backend, well then you need to store the JWT somewhere in the FE, even though that's less secure. Most of the time you will probably have a backend. Theoretically you could put the ID token in an in an HTTPOnly, Secure cookie and pass it to the FE and then validate the signature when the cookie comes to the backend. Putting it in a cookie is certainly more secure than just returning it as a response. However, validating the signature with the Google public key on your backend would not be enough, you would also need to validate the aud claim for example. Otherwise anyone who would have a valid ID token for a user (e.g. a third party app) could impersonate the user. There are also a couple of other issues: 1. JWTs do not make good session tokens and you would need server side state on your app or you would need to hit the token introspection endpoint for every request to make sure that you can log someone out from the server side. I made a dedicated video why JWTs do not make good session tokens. 2. you do not have control over how long the ID token is valid 3. If you use the ID token as session token, you would not be able to add any session data in the token because only Google has the private key. If you want to add your own data, then you would need to sign your own JWT. But again, JWT are actually not well suited for session tokens. If you have your own session storage or issues JWTs from your server, you can make the session as long as you want. If you actually need to access a specific Google API, then you need a refresh token, but if you use Google to only get the email address of the user (thereby avoiding that you need to store a password), then you probably don't need a refresh token
@ernestbrant
@ernestbrant 2 жыл бұрын
Great Video 🙂
@jgoebel
@jgoebel 2 жыл бұрын
Thanks! 🙂
@ryans5476
@ryans5476 9 ай бұрын
I'm a little confused with your explanation. Typically, authentication precedes authorization. I cannot authorize someone unless I know who they are, i.e. authenticated.
@jgoebel
@jgoebel 9 ай бұрын
You can authorize actions without knowing who the person is. E.g. if you have a hotel card that gives you access to the gym or the spa, then the door you hold the card against does not know who you are, it just knows that you have access to this room. Now ideally the door would also log who you are, but strictly speaking not required. I.e. you can enforce authorization without authentication and this is what OAuth does (OAuth = Open Authorization)
@avengerendgame9809
@avengerendgame9809 2 жыл бұрын
Help me
@avengerendgame9809
@avengerendgame9809 2 жыл бұрын
Open id
OAuth 2.0 & OpenID Connect (OIDC): Technical Overview
16:19
VMware End-User Computing
Рет қаралды 157 М.
OAuth Authorization code flow
11:49
Jan Goebel
Рет қаралды 51 М.
Kids' Guide to Fire Safety: Essential Lessons #shorts
00:34
Fabiosa Animated
Рет қаралды 16 МЛН
Kind Waiter's Gesture to Homeless Boy #shorts
00:32
I migliori trucchetti di Fabiosa
Рет қаралды 15 МЛН
An Illustrated Guide to OAuth and OpenID Connect
16:36
OktaDev
Рет қаралды 580 М.
oAuth and OpenID connect | Most confusing topic in plain english
31:11
OAuth 2.0 - a dead simple explanation
9:16
Jan Goebel
Рет қаралды 18 М.
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,7 МЛН
OAuth 2 Token Introspection
8:07
Jan Goebel
Рет қаралды 7 М.
SAML vs OAuth vs OIDC (explained simply!)
20:32
Ubisecure
Рет қаралды 55 М.
Everything You Ever Wanted to Know About OAuth and OIDC
33:21
OpenID Connect - Basics
13:29
Sascha Preibisch
Рет қаралды 26 М.
OAuth 2.0 explained with examples
10:03
ByteMonk
Рет қаралды 124 М.