What is SSO

Поделиться
HTML-код
  • Опубликовано: 10 фев 2025

Комментарии • 53

  • @BharCode09
    @BharCode09 5 лет назад +39

    Right people often get confused between terminologies.
    SSO is one of the security/access feature/application which uses OAuth/SAML for it's implementation.
    Also OAuth- is basically an AuthoriZATION protocol! The IDP simply shares a secret key called *token* for the 3rd party API to use it to get access to the requested resources. OAuth just like a proxy, like you give your house key to one of your friends and ask her to get something from your living room, but rest of all other bed rooms are locked and the keys are not shared. OAuth doesn't share user info to the API. Authorization is grated to the API which has the *token* but rest assured it's has signature verification to see it's not tampered with.
    SSO is much more serious w.r.t security and detailed access control. SSO- works as AuthoriZATION, Identity and ACCESS. IDP shares a kind of CLAIM/CERTIFICATE which has UserInfo, Services he/she has access to, things he/she can do according to the roles.
    This video explains things and it's differences in plain English for people to understand it easily.

  • @JosueGomez520
    @JosueGomez520 6 лет назад +17

    this video explains SAML and OAuth in a simple way, thank you.

  • @ruixue6955
    @ruixue6955 5 лет назад +19

    00:26 SSO is an agreement between 3 different entities
    00:32 people 0:34 the applications that they are trying to access 0:36 the governing body - identity provider, or the IDP
    00:56 the very minimum: you should be able to change your own password, and the password should work everywhere *1:03** the IDP is the place that takes the information, holds on really tightly and really securely **1:12** adds additional information about your identity **1:22** then then combination of user information and idp information is then securely passed on to aSERVICE PROVIDER*
    1:31 service provider is an application generally
    1:58 one of the places we get tripped up a lot of time 2:02 confusion on the concept of SSO and the different kinds of protocols we can use 2:10 to create a SSO experience
    2:12 3 main ways of logging into the system:
    2:16 Basic Auth
    2:23 OAuth
    2:31 SAML
    4:06 OAuth in the API world
    8:14 what is IDP

    • @suhasc9418
      @suhasc9418 3 года назад

      Wonderful! Thanks mate.

  • @mojmon
    @mojmon 4 года назад +2

    Great explanation. I've always had difficulties when it came to explaining to someone the differences.
    You made it simple and clear

  • @the-sunny-side-up
    @the-sunny-side-up 3 года назад

    Thanks a lot. These topics have never been so easy and simple before I watched this video.

  • @Wizardboz
    @Wizardboz 3 года назад

    I would be clueless without people like you! thank you!

  • @udaypatil8458
    @udaypatil8458 3 года назад

    Best! Best!! Best!!! Explanation!!!! Thanks a lot for this!!!

  • @eltonli8458
    @eltonli8458 2 года назад

    This is concise and easy to understand! Thank you!

  • @satwindersetia4367
    @satwindersetia4367 2 года назад

    With basics cleared by you, I can explore more...

  • @tholfikarmohammed887
    @tholfikarmohammed887 3 года назад +1

    That was very well explained, thank you.

  • @shiyasshafi5539
    @shiyasshafi5539 4 года назад +1

    Good Explanation. Keep go Mike.

  • @udyogjagat2651
    @udyogjagat2651 4 года назад +1

    Very nicely explained. Thank you !

  • @navjobanjosan8549
    @navjobanjosan8549 4 года назад +1

    Nicely explained !! Thank you

  • @lacvietanh
    @lacvietanh 2 года назад +1

    thank you so much!!!!!!

  • @steveelijah3758
    @steveelijah3758 4 года назад +1

    Amazing Video. Thank you so much

  • @abhishekpandey2272
    @abhishekpandey2272 2 года назад

    Thanks a lot very well explained

  • @gopireddy5131
    @gopireddy5131 3 года назад

    Hi Michael, like the way you simplify things. Could you bring in JWT too please.

  • @kimtofu
    @kimtofu 4 года назад +1

    Thank you from S.Korea

  • @phemystevens63
    @phemystevens63 2 года назад

    Got it!! Thanks

  • @alexpol114
    @alexpol114 3 года назад

    Thanks! that cleared out some basic stuff so I can go to deeper stufff

  • @bjaMoke
    @bjaMoke 5 лет назад

    It made things more clear bro. good video

  • @UlyssesAlexandreAlves
    @UlyssesAlexandreAlves 3 года назад

    Great tutorial. Thanks.

  • @mikexue5104
    @mikexue5104 4 года назад

    02:25 OAuth is API based, not intended only for web application.
    so OAuth can be used for other non-web client/applications for SSO purpose?

  • @aishwaryadharmadhikari7165
    @aishwaryadharmadhikari7165 4 года назад

    thank you sir.. it was very beneficial to a beginner like me..

  • @eldetective_ing
    @eldetective_ing 3 года назад

    Whats the meaning of NWA?
    Does it mean Network wide area????

  • @atp145
    @atp145 5 лет назад

    Thank you, this is what I was searching for 👍

  • @dmytro_glory_ukraine
    @dmytro_glory_ukraine 2 года назад

    About a purpose of IdP: as I understand in a minimal schema it should only verify the entity identity (authentication) and authorization can be on the service provider side. But in the video IdP does both: authentication and authorization, which looks strange: imagine that we have 10 applications and they have different roles, in such case IdP needs to manage that all, then more, what if I decide to add a new role to one of my applications? Please comment, thanks in advance!

    • @bissellator
      @bissellator  2 года назад

      Actually the IDP does not do authorization. I know the video makes it look like it does but what happens is the Gateway or the application itself asks the IDP for the information that it needs to make that assertion. You can't do authorization without Authentication, and authentication provides the information, the actual details required for authorization

  • @yuanyuanliu7439
    @yuanyuanliu7439 3 года назад

    very clear. Thanks!

  • @ericflores4728
    @ericflores4728 5 лет назад

    Thanks for the great explanation!

  • @vishwanthkandibanda4711
    @vishwanthkandibanda4711 2 года назад

    short and simple

  • @logicawe
    @logicawe 5 лет назад

    Thank you for sharing, great content!

  • @AliTwaij
    @AliTwaij 3 года назад

    Nice thankyou

  • @igobivo
    @igobivo 2 года назад

    05:33 and every single time that web application makes a call to that API the API will verify that key
    against the IDP against the keystore and see if it's still valid and it should get scopes back with that...
    the whole point of a token is that you don't have to communicate with 3rd party each time API call is made.

    • @bissellator
      @bissellator  2 года назад

      In OIDC you can validate the JWT locally, but in traditional OAuth the bearer token is just a key that needs to be verified by the API gateway.

  • @alexsandromartins
    @alexsandromartins 2 года назад +1

    MUITO BOM!

  • @mdtowhidul
    @mdtowhidul 5 лет назад

    Great Explanation! Thank you!

  • @JohnSmith-wz7he
    @JohnSmith-wz7he 3 года назад

    Nice clear into. Thanks for putting this together. Do you have a play list on each of these?

  • @ather1304
    @ather1304 5 лет назад

    very easy and well explained , Thank u :)

  • @waynechang7596
    @waynechang7596 5 лет назад +1

    Thanks! Good video!

  • @rolang4662
    @rolang4662 4 года назад

    Thank you for sharing. Just curious where does MFA fall in? Oauth or SAML

    • @bissellator
      @bissellator  4 года назад +1

      MFA is part of the identity authentication layer. It's not part of OAuth or SAML but rather part of identity access management challenges that prove you are you before a SAML assertion or OAuth token is issued.
      IAM systems may be queried over an API by the service providers to find out when you proved you were you and with what method (password, OTP, or a combination for MFA) but that's outside of the spec. Regardless, MFA is always just a way to double-check identity, but really has nothing to do with enforcement

  • @pjanipour6446
    @pjanipour6446 6 лет назад

    Perfect, thank you

  • @pi20sf32
    @pi20sf32 5 лет назад

    Good explanation!

  • @DallasCowboyFan95
    @DallasCowboyFan95 2 года назад

    gold mind here

  • @testo4970
    @testo4970 5 лет назад

    well explained

  • @LeeHongYee99
    @LeeHongYee99 4 года назад

    The typical Oauth flow you describe on 4:52 seems to be of public client, then later when u introduced API, then you kinda switched to confidential client. You should not mix these 2 use cases together.

    • @bissellator
      @bissellator  4 года назад +1

      That' a good callout -- the presentation is, of course, more of a high-level about SSO, not OAuth spec, but if I were to redo it today, I would also want to talk about informing JWTs and how confidential clients (trusted entities) might have elevated interactions with the Identity flow.

  • @tandaumesh2282
    @tandaumesh2282 3 года назад +1

    java code for SSO setup

  • @eldetective_ing
    @eldetective_ing 3 года назад

    are you sure that the user know the terms of service? lol

  • @MBSH-ol4vy
    @MBSH-ol4vy 3 года назад

    ok

  • @johnoderso
    @johnoderso 4 года назад

    ssio, nutööö