Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: Add "What is IDP Authentication: How Identity Providers Secure … #363

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

lukiccd
Copy link
Contributor

@lukiccd lukiccd commented Jan 27, 2025

…Your Apps"

Related Issue

Link to the Github Issue created for this blog post

Link to Google Doc

TODO

Checklist

  • Has cover image been added
  • Have all content images been added. Do they render correctly? (aspect ratio etc)
  • The code inside code blocks gives no errors
  • Check for SEO keyword?
  • Added call to action to link to supertokens and to link to other blogs.
  • Add reference to how SuperTokens solves this blog's problem (if relevant).

Remaining TODOs

  • ...

Copy link

netlify bot commented Jan 27, 2025

Deploy Preview for gracious-clarke-e6b312 ready!

Name Link
🔨 Latest commit 75f4c5c
🔍 Latest deploy log https://app.netlify.com/sites/gracious-clarke-e6b312/deploys/679813f8fa604a000842a755
😎 Deploy Preview https://deploy-preview-363--gracious-clarke-e6b312.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

@@ -0,0 +1,3 @@
{
"typewriterScrollMode.enable": false
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is this for?

author: "Dejan Lukic"
---

In the ever-evolving digital landscape, securing access to applications is no longer optional. Identity Provider (IDP) authentication stands at the forefront of modern access management, ensuring users can log in safely and efficiently. This article explores how IDP authentication works, its benefits, and how tools like SuperTokens make integration less of a headahce.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you start with a general definition here? In the ever-evolving digital landscape, securing access to applications is no longer optional. Identity Provider (IDP) authentication stands at the forefront of modern access management, ensuring users can log in safely and efficiently. doesn't give me any information about what IDP auth is. Maybe a brief description and then you can start with this line

## What Is IDP Authentication?

Identity Provider (IDP) authentication is a process where an external service, called an IDP, verifies the identity of users and grants them access to applications. By acting as a trusted intermediary, IDPs handle authentication securely, allowing applications to offload the complexity of managing user credentials. In simple terms, the IDP ensures that the person trying to log in is who they claim to be.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add an example even a lay person can understand. For example in cloudflares post they use a guest list as an analogy https://www.cloudflare.com/learning/access-management/what-is-an-identity-provider/


IDP authentication operates through a sequence of steps designed to securely validate user identity and grant access to resources. Here’s a breakdown of how the process typically works, coupled with real-world examples to illustrate its application:

1. **User Initiates Login**: When a user attempts to log in to an application, they are redirected to the IDP’s login page. For instance, when accessing a third-party app like Slack using Google SSO, the user is seamlessly redirected to Google’s login portal to authenticate.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Co-ordinate with Nevil to get a diagram to illustrate this example

### Common Protocols for IDP Authentication
Several protocols underpin this process, ensuring compatibility and security between IDPs and applications:

- **SAML (Security Assertion Markup Language)**:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

- **SAML (Security Assertion Markup Language)**:
[SAML](https://en.wikipedia.org/wiki/Security_Assertion_Markup_Language) is widely used in enterprise environments to facilitate single sign-on (SSO). A classic example is employees accessing corporate tools like Salesforce or Workday through their company’s identity portal.

- **OAuth 2.0 and OpenID Connect**
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.


## Best Practices for IDP Authentication

### Use Secure Connections (HTTPS) for All Authentication Flows
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We can remove this, it's the baseline for security just generally


## How to Implement IDP Authentication

<!-- need approval -->
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, you could give a short walkthrough of setting up an application with SuperTokens CLI. It's quick and flexible and the user can get started with a demo application in just 5-10 mins

@jscyo
Copy link
Contributor

jscyo commented Jan 28, 2025

@lukiccd Additionally please co-ordinate with Nevil to start on the blog diagrams

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants