Member-only story
Ever wondered how your login works?
Let’s break it down. Whether you’re a tech enthusiast or just curious, this post has something for you. Stay tuned! 🚀
❌ In the pre-modern authentication era, users would present their credentials (like username, password, and IP address) to the server, which is weak, burdensome, and static. It cannot cope with the demands of the remote work economy, the digital transformation, and the cloud-based services and apps. It also exposes users and organizations to data breaches and cyberattacks.
✅ Modern Authentication
A multi-functional authentication & authorization method that ensures proper user identity and access controls in the cloud. It uses modern protocols such as SAML, OIDC, OAuth2 to establish trust, make risk assessments, and enforce policies.
- 🔽 SAML: https://learn.microsoft.com/en-us/entra/architecture/auth-saml?WT.mc_id=DT-MVP-5001664
- 🔽 OIDC: https://learn.microsoft.com/entra/identity-platform/v2-protocols-oidc?WT.mc_id=DT-MVP-5001664
- 🔽 OAuth2: https://learn.microsoft.com/entra/identity-platform/v2-oauth2-auth-code-flow?WT.mc_id=DT-MVP-5001664
✅ Identity Provider (IdP)
Modern authentication introduced the concept of an identity provider. It acts as a trusted…