Federated Identity Primer by Derrick Rountree
Author:Derrick Rountree
Language: eng
Format: epub, pdf
ISBN: 9780124072077
Publisher: Elsevier Inc.
Published: 2012-11-22T16:00:00+00:00
3.2.1. Using OpenID
The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, and Yahoo. As part of the registration process, the user will enter their identity information. This may include first name, last name, age, address, and other personal information. Not all of this information, however, is transmitted from the IdP to the service provider. The user will have the option to specify which information they would like a particular service provider to be able to access.
What happens at the completion of the registration process depends on the version of OpenID supported by the IdP. With OpenID 1.0, a unique OpenID URL is generated for the user. This URL is used to identify the user. With OpenID 1.0, authentication to service provider can take place in one of two ways. The first is where the user enters their OpenID into the web site and the web redirects the user to the OpenID provider for authentication. Here is how it happens:
1. The user navigates to the destination web site that supports OpenID.
2. The user submits their OpenID to the web site.
3. The web site resolves the OpenID to obtain the address of the appropriate IdP.
4. The web redirects the user to the OpenID provider site.
5. The user authenticates to the OpenID provider site.
6. The IdP sends confirmation of the user’s OpenID URL, along with any additional information selected by the user, back to the service provider.
Download
Federated Identity Primer by Derrick Rountree.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7784)
Grails in Action by Glen Smith Peter Ledbrook(7699)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6583)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6570)
Running Windows Containers on AWS by Marcio Morales(6101)
Kotlin in Action by Dmitry Jemerov(5068)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4923)
Combating Crime on the Dark Web by Nearchos Nearchou(4506)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4416)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4353)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4180)
The Age of Surveillance Capitalism by Shoshana Zuboff(3959)
Python for Security and Networking - Third Edition by José Manuel Ortega(3749)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3510)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3414)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3301)
Learn Wireshark by Lisa Bock(3276)
