Skip to Main Content
Cloud Identity Patterns and Strategies
book

Cloud Identity Patterns and Strategies

by Giuseppe Di Federico, Fabrizio Barcaroli
December 2022
Intermediate to advanced content levelIntermediate to advanced
258 pages
7h 17m
English
Packt Publishing
Content preview from Cloud Identity Patterns and Strategies

4

Authentication Flows

We know that OpenID Connect (OIDC) extends the OAuth 2.0 protocol by introducing new flows, reusing some of the existing ones, and by placing the user, not the application, at the center of such flows. In this chapter, we will go through OAuth 2.0 and OIDC basics, learn about their flows, similarities, and differences, and where they can be used and why.

The chapter covers the following main topics:

  • The authorization code grant flow
  • The authorization code grant flow with Proof Key for Code Exchange
  • The implicit grant flow
  • The client credentials grant flow
  • The Resource Owner Password Credentials (ROPC) grant flow
  • The On-Behalf-Of (OBO) flow
  • Hybrid flows

Here’s a list of the flows and their support:

Figure 4.1 – ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cloud Native Security Cookbook

Cloud Native Security Cookbook

Josh Armitage
Cloud Native Infrastructure with Azure

Cloud Native Infrastructure with Azure

Nishant Singh, Michael Kehoe

Publisher Resources

ISBN: 9781801810845