-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: Add "What is IDP Authentication: How Identity Providers Secure … #363
base: master
Are you sure you want to change the base?
Conversation
✅ Deploy Preview for gracious-clarke-e6b312 ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
@@ -0,0 +1,3 @@ | |||
{ | |||
"typewriterScrollMode.enable": false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is this for?
author: "Dejan Lukic" | ||
--- | ||
|
||
In the ever-evolving digital landscape, securing access to applications is no longer optional. Identity Provider (IDP) authentication stands at the forefront of modern access management, ensuring users can log in safely and efficiently. This article explores how IDP authentication works, its benefits, and how tools like SuperTokens make integration less of a headahce. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you start with a general definition here? In the ever-evolving digital landscape, securing access to applications is no longer optional. Identity Provider (IDP) authentication stands at the forefront of modern access management, ensuring users can log in safely and efficiently.
doesn't give me any information about what IDP auth is. Maybe a brief description and then you can start with this line
## What Is IDP Authentication? | ||
|
||
Identity Provider (IDP) authentication is a process where an external service, called an IDP, verifies the identity of users and grants them access to applications. By acting as a trusted intermediary, IDPs handle authentication securely, allowing applications to offload the complexity of managing user credentials. In simple terms, the IDP ensures that the person trying to log in is who they claim to be. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add an example even a lay person can understand. For example in cloudflares post they use a guest list as an analogy https://www.cloudflare.com/learning/access-management/what-is-an-identity-provider/
|
||
IDP authentication operates through a sequence of steps designed to securely validate user identity and grant access to resources. Here’s a breakdown of how the process typically works, coupled with real-world examples to illustrate its application: | ||
|
||
1. **User Initiates Login**: When a user attempts to log in to an application, they are redirected to the IDP’s login page. For instance, when accessing a third-party app like Slack using Google SSO, the user is seamlessly redirected to Google’s login portal to authenticate. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Co-ordinate with Nevil to get a diagram to illustrate this example
### Common Protocols for IDP Authentication | ||
Several protocols underpin this process, ensuring compatibility and security between IDPs and applications: | ||
|
||
- **SAML (Security Assertion Markup Language)**: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- **SAML (Security Assertion Markup Language)**: | ||
[SAML](https://en.wikipedia.org/wiki/Security_Assertion_Markup_Language) is widely used in enterprise environments to facilitate single sign-on (SSO). A classic example is employees accessing corporate tools like Salesforce or Workday through their company’s identity portal. | ||
|
||
- **OAuth 2.0 and OpenID Connect** |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
add links https://supertokens.com/blog/oauth
|
||
## Best Practices for IDP Authentication | ||
|
||
### Use Secure Connections (HTTPS) for All Authentication Flows |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can remove this, it's the baseline for security just generally
|
||
## How to Implement IDP Authentication | ||
|
||
<!-- need approval --> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm, you could give a short walkthrough of setting up an application with SuperTokens CLI. It's quick and flexible and the user can get started with a demo application in just 5-10 mins
@lukiccd Additionally please co-ordinate with Nevil to start on the blog diagrams |
…Your Apps"
Related Issue
Link to the Github Issue created for this blog post
Link to Google Doc
TODO
Checklist
Remaining TODOs