TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How Open ID Connect Works

107 pointsby iacguyover 1 year ago

10 comments

munchbunnyover 1 year ago
OIDC (and the rest of the OAuth umbrella of stuff) is one category where every time I have to work with the protocols I think "there must be a less confusing way" and then have a failure of imagination for a simpler way to accomplish the same thing. I think it's because the protocols are conceptually simple, but the cryptographic parts, especially the PKI parts, make them intricate to understand exactly who is attesting or validating exactly what.
评论 #38870480 未加载
评论 #38869808 未加载
评论 #38870515 未加载
评论 #38870245 未加载
评论 #38871411 未加载
评论 #38872858 未加载
spapas82over 1 year ago
Great work! If you wanna understand how Open ID Connect works using <i>only</i> HTTP requests&#x2F;responses based on the specification (<a href="https:&#x2F;&#x2F;openid.net&#x2F;specs&#x2F;openid-connect-core-1_0.html" rel="nofollow">https:&#x2F;&#x2F;openid.net&#x2F;specs&#x2F;openid-connect-core-1_0.html</a>) I&#x27;ve written an article here: <a href="https:&#x2F;&#x2F;spapas.github.io&#x2F;2023&#x2F;11&#x2F;29&#x2F;openid-connect-tutorial&#x2F;" rel="nofollow">https:&#x2F;&#x2F;spapas.github.io&#x2F;2023&#x2F;11&#x2F;29&#x2F;openid-connect-tutorial&#x2F;</a>
评论 #38870536 未加载
评论 #38874670 未加载
bob1029over 1 year ago
I stopped spending mental cycles trying to parse these standards after taking myself on a ride with a completely DIY SAML service provider implementation.<p>Today, we use OIDC &amp; SAML to authenticate all of the things. But, I cannot explain how any of it works in terms of detailed protocol, certificate chains, etc.<p>We actually have no in-house configuration along this axis because we only use products, such as web function runners, that live inside the IdP&#x27;s platform. These can be trivially opted-in for MFA authentication with a single dropdown election if you are using Azure.<p>If your mission is to build your own IdP platform and&#x2F;or SP client libraries, then it totally makes sense to dive into this rabbit hole. Otherwise, make it someone else&#x27;s problem. An occasional headline in the news about a token not expiring in time, etc, is not worth chasing unless you intend to compete directly with these providers and build your own identity platform. If Microsoft can get it wrong sometimes, so will you.
评论 #38869664 未加载
smaluover 1 year ago
I do not known why OIDC has so many bad comments here. At my $company we are using Keycloak for multi-realm (multi-tenant) authentication of users and clients (applications). Yes, the learning curve is long for OIDC and even longer for Keycloak. The FreeMaker Template Engine is awful compared to Twig. Updates of Keycloak can break something, so better have proper test&#x2F;stagging environment. But this is the tax for not implement something, that is not in core domain of organization.<p>OIDC solves problems for OAuth2 like &quot;every Identity Provider has different endpoints&quot; with OpenID Connect Discovery (&#x2F;.well-known&#x2F;openid-configuration).
评论 #38872438 未加载
评论 #38872560 未加载
xvinciover 1 year ago
Maybe I am really missing something seeing how other comments didnt mention it, but is this REALLY explaining how OIDC works? I don&#x27;t see it.
评论 #38870812 未加载
评论 #38870793 未加载
starttoasterover 1 year ago
This doesn&#x27;t really explain how OIDC works, it just explains the flow of requests a user would see if they&#x27;re setting up OIDC for authentication between two systems for the first time.<p>But beyond that, I&#x27;d say in future blog posts it would look a bit more professional to use some kind of architecture diagram making software, rather than somebody&#x27;s napkin drawings. It&#x27;s a little more difficult than it needs to be deciphering these graphics. To be entirely honest, I&#x27;d settle for mspaint-level quality if none of the free diagram making tools out there catch your eye.
uxp8u61qover 1 year ago
Since OP seems to be the website author... You should remove or alter the ::selection style in your CSS. In dark mode, selecting text makes it illegible (white on white).
mooredsover 1 year ago
This was a nice overview of why you&#x27;d use OIDC to get short lived access tokens (in the pure sense, not in the OAuth sense) with a heavy emphasis on AWS. Not really an overview of OIDC, though.
simonwover 1 year ago
This is a really useful guide, but it&#x27;s still not enough... every time I read something like this I get to a bit like this:<p>&quot;Create a role on AWS, add trust policy specifying which github org+repo are allowed to access this AWS role. Create an identity provider for github actions.&quot;<p>I think need a full video of clicking around in the AWS console here, because the idea of having to figure out how to do that myself is horrifying to me.
评论 #38868964 未加载
评论 #38871423 未加载
评论 #38871486 未加载
评论 #38870385 未加载
评论 #38868910 未加载
cod1rover 1 year ago
I&#x27;ve recently been looking into passkeys and it seems much simpler than this.
评论 #38872653 未加载
评论 #38871263 未加载
评论 #38872275 未加载