Authorization and access control mechanisms and protocols

mahesh
2 min readJan 3, 2023
www.logsign.com
  1. OAuth (Open Authorization): This is an authorization framework that enables a client to obtain limited access to a resource by directing the resource owner to an authorization server. The authorization server then asks the resource owner to grant the client access to the resources, and if the resource owner approves, the authorization server issues an access token to the client.
  2. JWT (JSON Web Token): This is a compact and self-contained way of transmitting information between parties. A JWT consists of a header, a payload, and a signature, and is usually sent as an HTTP authorization header. The header and payload are JSON objects that are base64-encoded and the signature is used to verify that the sender of the JWT is who it says it is.
  3. SAML (Security Assertion Markup Language): This is an XML-based standard for exchanging authentication and authorization data between parties. It is often used in enterprise environments to enable single sign-on (SSO) and facilitate secure communication between different systems.
  4. OpenID Connect: This is a simple identity layer built on top of OAuth 2.0, which enables clients to verify the identity of an end user based on the authentication performed by an authorization server. It provides a secure way to obtain user information, such as the user’s name and email…

--

--