This article explores the concepts of digital identity, encryption, and the differences between OAuth 2.0 and OpenID Connect. It also discusses the various types of tokens used for access and identity.

10m read timeFrom betterprogramming.pub
Post cover image
Table of contents
Understanding Digital Identity, Encryption, and OAuth 2.0 vs OIDCIntroductionDigital Identity: Navigating the Digital RealmEncryption vs Hashing: TechniqueAuthentication vs Authorization: Drawing the LineToken: Gateway to AccessOAuth 2.0 and OIDC: Deciphering Their RolesWhat is OAuth 2.0?OAuth 2.0 RolesOAuth1.0 vs OAuth2.0OAuth FlowsAuth Code FlowImplicit FlowClient Credential FlowAuth Code With PKCEResource Owner Password Grant FlowOIDC (OpenID Connect)When Should I Use OIDC, and When Should I Use OAuth2.0?Recommended Flow Types for Use CaseRecommended Flow Types for Use CaseConclusionReference

Sort: