Securing Everything: Mapping the Right Identity and Access Protocol (OIDC, OAuth2, and SAML) to the Right Identity

Overview

Identity and access security is built on two fundamental requirements:

  • Authentication (AuthN) — who you are, and
  • Authorization (AuthZ) — what you are allowed to do.

Every secure system must answer both questions clearly and consistently. In modern architecture, these questions are posed to two primary categories of actors trying to access applications:

This article has been indexed from DZone Security Zone

Read the original article: