Logo Ricky
  • 首頁
  • 關於
  • 更多的
    技能 經歷 學歷 專案
  • 文章
  • 筆記
  • 活動
  • Transform
  • Chinese
    English Chinese
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • 標籤
  • ACME
  • AI
  • Ansible
  • APP
  • Arceus
  • ASCII
  • Authentication
  • Authorization
  • BASH
  • Bayonet
  • Browser
  • Byte
  • Channel
  • Chart
  • Checklist
  • Chrome OS
  • CI
  • Cloudflare
  • Command Line
  • Config
  • Container
  • CPU
  • CURL
  • Data
  • Debug
  • Design
  • Dmg
  • DNS
  • Docker
  • EFF
  • ElasticSearch
  • ELK
  • Emoji
  • EMQX
  • Extension
  • Game
  • GIN
  • Git
  • Github
  • Gitlab
  • Gluetun
  • Go
  • Golang
  • Google
  • GraphQL
  • HA
  • HTTP
  • Infra
  • Infrastructure
  • Introduction
  • Iso
  • ITerm2
  • Jsoniter
  • Kibana
  • Kubernetes
  • Leetcode
  • Lightweight
  • Linux
  • Llm
  • Lua
  • Lullaby
  • LVM
  • Machinelearning
  • MacOS
  • Markdown
  • Module
  • MQTT
  • MSS
  • MTU
  • Music
  • NAS
  • Network
  • Nftables
  • NGINX
  • OAuth
  • OIDC
  • Ollama
  • Parquet
  • Pinyin
  • Pokemon
  • Pprof
  • Principle
  • Prometheus
  • Protobuf
  • Proxy
  • Push
  • Python
  • QRCode
  • R
  • RAID
  • Redis
  • Regex
  • Rust
  • Security
  • Selenium
  • SFTP
  • SHELL
  • Slides
  • Snow
  • Software
  • Ssh
  • String
  • Switch
  • Sync
  • Synology
  • System
  • Terminal
  • Terraform
  • Test
  • Testing
  • Time
  • Timeout
  • Tor
  • Trace
  • Travel
  • Tunnel
  • URL
  • Video
  • Vim
  • Visualization
  • VPN
  • VScode
  • Web
  • Windows
  • YAML
  • Youtube
  • Zero Trust
  • ZSH
  • 台語
Hero Image
OIDC(OpenID Connect) 简介

OIDC(OpenID Connect) 简介 Authentication vs. authorization Authentication 通常是指校验是否是用户本人的这个过程,而 Authorization 则更多的是指用户是否有权限。通常我们都是先校验 是否是用户本人,然后再校验用户是否有权限。也就是先开始 Authentication,再开始 Authorization。 Authentication Authorization Determines whether users are who they claim to be Determines what users can and cannot access Challenges the user to validate credentials (for example, through passwords, answers to security questions, or facial recognition) Verifies whether access is allowed through policies and rules Usually done before authorization Usually done after successful authentication Generally, transmits info through an ID Token Generally, transmits info through an Access Token Generally governed by the OpenID Connect (OIDC) protocol Generally governed by the OAuth 2.0 framework Example: Employees in a company are required to authenticate through the network before accessing their company email Example: After an employee successfully authenticates, the system determines what information the employees are allowed to access OAuth 2 Client Credentials Grant 这种模式是最简单的,其实就是客户端告诉服务端自己是哪个客户端,服务器就将 access_token 下发

Wednesday, July 6, 2022 閱讀
導覽列
  • 關於
  • 技能
  • 經歷
  • 學歷
  • 專案
聯絡方式:
  • zeyanlin@outlook.com
  • linzeyan
  • Ricky
  • Ricky