Task #507
openTask #500: Docker learning phase 2.2 (authentication advanced tasks)
Docker learning phase 2.2 (authentication advanced tasks) [Minh]
Added by Minh Le about 2 years ago. Updated about 2 years ago.
100%
Description

Files
| clipboard-202310311604-dxxqs.png (214 KB) clipboard-202310311604-dxxqs.png | Minh Le, 10/31/2023 09:04 AM | ||
| clipboard-202310311617-0x0c4.png (224 KB) clipboard-202310311617-0x0c4.png | Minh Le, 10/31/2023 09:17 AM | ||
| clipboard-202310311618-cq0hk.png (95.7 KB) clipboard-202310311618-cq0hk.png | Minh Le, 10/31/2023 09:18 AM | ||
| clipboard-202310311620-a8wj6.png (165 KB) clipboard-202310311620-a8wj6.png | Minh Le, 10/31/2023 09:20 AM | ||
| clipboard-202310311620-ovg6w.png (151 KB) clipboard-202310311620-ovg6w.png | Minh Le, 10/31/2023 09:20 AM | ||
| 1.png (227 KB) 1.png | Minh Le, 11/01/2023 03:04 AM | ||
| 2.png (239 KB) 2.png | Minh Le, 11/01/2023 03:05 AM | ||
| 3.png (239 KB) 3.png | Minh Le, 11/01/2023 03:05 AM | ||
| 4.png (265 KB) 4.png | Minh Le, 11/01/2023 03:05 AM | ||
| 5.png (274 KB) 5.png | Minh Le, 11/01/2023 03:05 AM | ||
| 6.png (166 KB) 6.png | Minh Le, 11/01/2023 03:05 AM |
Updated by Minh Le about 2 years ago
- File clipboard-202310311617-0x0c4.png clipboard-202310311617-0x0c4.png added
- File clipboard-202310311618-cq0hk.png clipboard-202310311618-cq0hk.png added
- File clipboard-202310311618-chgph.png added
- File clipboard-202310311618-zdnii.png added
Thêm nút đăng xuất tài khoản google 



Updated by Minh Le about 2 years ago
- File deleted (
clipboard-202310311618-zdnii.png)
Updated by Minh Le about 2 years ago
- File deleted (
clipboard-202310311618-chgph.png)
Updated by Minh Le about 2 years ago
- File clipboard-202310311620-a8wj6.png clipboard-202310311620-a8wj6.png added
- File clipboard-202310311620-ovg6w.png clipboard-202310311620-ovg6w.png added


Updated by Minh Le about 2 years ago
- File 1.png 1.png added
- File 2.png 2.png added
- File 3.png 3.png added
- File 4.png 4.png added
- File 5.png 5.png added
- File 6.png 6.png added
What's OIDC/SAML?
SAML and OIDC are two identity protocols that authenticate users, transmit data, and provide access control information and a communication method for a user's ID. SAML is most commonly utilized by businesses to allow customers to access paid services, whereas OIDC is best suited for mobile and single-page web applications.
OIDC
OIDC is an open authentication protocol built on top of the OAuth 2.0 authorization framework. It delegates authentication to identity providers such as Google and FusionAuth to verify identities, while defining how an identity provider communicates with a relying party (or the platform providing services) to authenticate an entity (or end user).
OIDC uses tokens known as JSON Web Tokens (JWTs), with which applications can authenticate identities and access data from another application or service. It supports the single sign-on (SSO) mechanism, which is used by most engineers to authenticate a user across several platforms. This can be handled by services like FusionAuth, which provides out-of-the-box features such as SSO for quicker authentication. OIDC works with web-based, mobile, and JavaScript clients.
What Is SAML?
SAML, just like OIDC, is an authentication protocol that enables secure communication between service providers and identity providers. It uses Extensible Markup Language (XML) for sharing data. SAML also supports SSO authentication, but unlike OIDC, it only works with XML syntax.
OIDC by Google
OIDC, or OpenID Connect, is an identity layer built on top of the OAuth 2.0 protocol. It is designed to provide user authentication and authorization for web and mobile applications. While OIDC is a standardized protocol, Google, like many other identity providers, supports it for enabling secure authentication and single sign-on (SSO) in various applications and services.
When you refer to "OIDC by Google," you are likely talking about Google's implementation of OpenID Connect for authentication and identity verification. Google allows developers to integrate OIDC with their applications and services to enable users to sign in using their Google credentials or to use Google as an identity provider for SSO. This is commonly used in web and mobile applications to simplify user authentication and enhance security.
Using OIDC by Google, developers can leverage Google's authentication system to verify the identity of users and access their profile information, all while maintaining the security and privacy of user data. This can be particularly useful when building applications that require user authentication and want to give users the option to sign in with their Google accounts.
When to use OIDC and When to use SAML ?
Use OIDC if:
When you need to authenticate and manage users in a web or mobile application.
For cross-platform applications, including both web and mobile, as OIDC effectively supports both environments.
When you want to integrate with external authentication providers like Google, Facebook, and other identity providers.
To ensure the security of the authentication process, including access tokens and ID tokens.
Use SAML if you need to:
Integration with legacy systems that exclusively support SAML is required.
Complex authentication needs, like multi-factor authentication or role-based access control, must be accommodated.
Extensive data exchange between the identity provider (IdP) and the service provider (SP) is necessary.
Adherence to stringent security standards is mandatory.