OAuth 2.0 & OpenID Connect (OIDC): Technical Overview
ฝัง
- เผยแพร่เมื่อ 25 ก.ย. 2024
- This video explains the basics of the OAuth 2.0 & OpenID Connect (OIDC) protocol, focusing on what an IT administrator must know.
VMware End-User Computing (EUC) solutions empower the digital workspace by simplifying app & access management, unifying endpoint management & transforming Windows delivery. Learn more on the Digital Workspace Tech Zone: techzone.vmwar....
Oauth2 not handling authentication part in it's standard is most crucial which most of other tutorials fails to explain. Thanks!
The way it is explained is not only simple to understand , but also those diagrams are etched in memory and are easy to recall. Many thanks .
How easily and clearly you have explained the topic is commendable. This video clears many questions poping in my mind while I was reading about differences between OAuth2 and OIDC.
Have been using a central third party authorization server for a couple of years but I wasn't able to connect the dots clearly. This video helped me visualize the whole process. Thank you so much !
Genius explanation of OAuth and OIDC in no time. Thank you so much.
Absolutely amazing explanation, i saw many videos, none of them make it as clear as you did. You have a rare talent. Thank you
This is not an easy topic and all are modern apps use this flow. But once again kudos to Peter for explaining this so well. Keep them coming Peter.
Wow! Incredible explanation. I would like if you can make a separate video on some important OAuth Flows.
Thanks and glad you liked it. This video is a series of three, IAM overview, SAML and OAuth 2.0. Currently there are no plans on doing more videos in this series. I hope what is today available allows for a good introduction into the world of federation. At least that was my intention. Any deeper learnings will have to be made using other means.
There is always disconnect for my understanding and some tutorials , the best and very deep explanation I found thank you so much really appreciate it for making so much granular
This was awesome!! what you did in 16 mins, I think it will take hours to explain this much by others.
This is by far the best video I have watched about this topic! Thank you so much!
Glad it was helpful!
Great job explaining Auth2.0 and OIDC 👍. Thank you!
👍 Thank you so much...so clearly explained. Understandable, good voice. Saved me so much time.
Superb explanation. Thanks for your efforts. Much appreciated.
Wow, you have a talent explaning things 👍🏻
best video i found on this topic, very clear! Thank you much
so clear and well explained. answered all of my questions
the only video that explains this very well
Brilliant ! Best video on those protocols I have ever watched.
Very well explained and found the best content on the above topics. Thanks a lot ..!!
This is an amazing video. I can't say anyone can do it better than you.
Great explanation, I have seen other videos on this topic but this video give best explanation so far
Excellent content as always from Peter.
Fantastic explanation. Thank you Peter!
It was very helpful and explained clearly Thank you so much
Great work.. Thanks for explaining it at such detail.
mindblowing clarity!!!
thx for explaining the principles . it's very clear to me now.
Good work(job). Keep it up @PETER BJORK.
Clear crisp explanation!
This is such a great video. Thank you. You have managed to answer all my questions so clearly!!
that was a really good explanation!
Wow! Thank you for that explanation! Very useful and easy to understand! Too danm good! :)
You the man :) Thank you for these awesome and so useful tutorials.
Quality video for free. Thanks
Very well explained. Thanks!
Good overview and I life the whiteboarding style. I used to play with these "infiniboards" about 5-6 years ago, but found them clunky. What tool is it?
thanks Pete, super clear explanation
What happens if the access token expires? Do they use refresh tokens to handle this?
I haven't seen any mention of a refresh token in the diagram.
Correct. If there is a valid refresh token, the application will make use of it to request a new access token. When refresh token is no longer valid, user has to login again.
very helpful. thank you
Very clearly explained
Thank you, it was very useful !
Thanks, very clear and useful
Great explanation
Thank you !! :)
This is absolutely wonderful. Who says learning has to be complicated :) Is it possible to get the slides used by any chance? Thanks!
Glad you liked the video. Sorry but the slides cannot be shared.
Great explanation!
Was very usefull thank you very much!
Very informative
BEST EXPLAINATION
Excellent Thank You
Very helpful
Hi,
Your videos are really pretty good!
I just wonder about, why you are using different terms as in the last video about SAML.
Authentication server = identity service provider
Resource server = Service provider
Is there a specific reason (which I don't see), that the above mentioned terms cannot be used?
Many thx 🙂
The reason is what term is being used in the standards. I try to keep the videos as accurate, but still easy to understand, as possible. OAuth och OIDC uses different terms than SAML.
question, where id_token would be stored?
how the client know, which user the id_token belongs to?
I'm not a developer so I cannot really help with that level of knowledge..
Amazing content
👏🏽 awesome
❤❤
Good content 👌
Great
u have explained very thing properly but can uu simply mentin the basic diff between between o auth and oidc with one real example
OAuth is used for delegating access, i.e. allow an application to act on your behalf where OIDC is used to authenticate a user.
@@VMwareEndUserComputing thankyou so much
Kallie Wall
Clark Daniel Brown Gary Perez Thomas
Robinson Joseph Williams Frank Gonzalez William
Garcia Daniel Hall Melissa Hall Elizabeth
Davis George Lewis Patricia Thomas Christopher
Robinson Steven Moore William Allen Christopher
Thomas Deborah Miller Kimberly Jones Mary
that was a huge amount of information. I do no understand everything.
Well, OAuth 2.0 and OIDC is much, much broader than what I covered in the video.. I hoped it would be a good introduction to the topic for a typical IT admin. What was it you did not understand? Have you watched the other recommended videos? E.g. the one on Identity and Access Management? It might provided the needed background.
Smith Anthony Thomas Melissa Wilson Thomas
Lee Charles Lewis Timothy Lewis Shirley
Thompson Scott White Anna Allen Nancy
Young Jennifer Rodriguez Cynthia Williams Helen
Lewis Edward Thompson Mary Thompson Linda
Martin Betty Thompson Barbara Jackson Jennifer
refresh token have to be in backEnd
35735 Aidan Field
Fantastic explanation. Thank you Peter!
Williams Deborah Martinez Lisa Lee Laura
Martin Christopher White Jennifer Wilson Sharon
Davis Thomas Thompson Christopher Thomas Mary
Hall Thomas Smith Donald Taylor George
Smith Charles Garcia Betty Martinez Jessica
Thomas Donald White Carol Lopez Helen
Jones Charles Hall Anthony Lee Carol
Perez Kevin Rodriguez Lisa Young Mary
Walker Jeffrey Robinson Brian Thompson Robert