Federated Identity Primer by Derrick Rountree
Author:Derrick Rountree
Language: eng
Format: epub, pdf
ISBN: 9780124072077
Publisher: Elsevier Inc.
Published: 2012-11-22T16:00:00+00:00
3.2.1. Using OpenID
The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, and Yahoo. As part of the registration process, the user will enter their identity information. This may include first name, last name, age, address, and other personal information. Not all of this information, however, is transmitted from the IdP to the service provider. The user will have the option to specify which information they would like a particular service provider to be able to access.
What happens at the completion of the registration process depends on the version of OpenID supported by the IdP. With OpenID 1.0, a unique OpenID URL is generated for the user. This URL is used to identify the user. With OpenID 1.0, authentication to service provider can take place in one of two ways. The first is where the user enters their OpenID into the web site and the web redirects the user to the OpenID provider for authentication. Here is how it happens:
1. The user navigates to the destination web site that supports OpenID.
2. The user submits their OpenID to the web site.
3. The web site resolves the OpenID to obtain the address of the appropriate IdP.
4. The web redirects the user to the OpenID provider site.
5. The user authenticates to the OpenID provider site.
6. The IdP sends confirmation of the user’s OpenID URL, along with any additional information selected by the user, back to the service provider.
Download
Federated Identity Primer by Derrick Rountree.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7435)
Grails in Action by Glen Smith Peter Ledbrook(7327)
Kotlin in Action by Dmitry Jemerov(4681)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4155)
The Age of Surveillance Capitalism by Shoshana Zuboff(3463)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3274)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3049)
Mastering Python for Networking and Security by José Manuel Ortega(2999)
Blockchain Basics by Daniel Drescher(2923)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2847)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2796)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2683)
TCP IP by Todd Lammle(2666)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2506)
Hands-On Azure for Developers by Kamil Mrzyglod(2461)
Combating Crime on the Dark Web by Nearchos Nearchou(2417)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2357)
The Social Psychology of Inequality by Unknown(2342)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2329)