12 Matching Annotations
  1. Mar 2025
    1. OIDC refresher: OpenID Connect is an identity protocol built on top of the OAuth 2.0 framework. If a request scope of OIDC is defined when initiating an OAuth flow, identity providers present the application an ID token along with an access token on a successful sign-in. The ID token is a JWT that contains some user information like name, email, and avatar, in the form of “claims”.
    2. Clerk’s SSO uses the Open ID Connect protocol (OIDC), which provides an email_verified claim. Identity Providers are supposed to set this to true if they have verified the user’s email. Almost every SSO provider verifies emails, so if a user signs up with a social provider, a second email verification step is unnecessary.
  2. Dec 2023
  3. Nov 2023
  4. Feb 2020
  5. Mar 2019
    1. A locally unique and never reassigned identifier within the Issuer for the End-User, which is intended to be consumed by the Client

      I wonder why this ID must be "unique and never reassigned...within the Issuer". This effectively makes it a trackable ID if clients work together.

      What would break if this ID is unique within the (Issuer, client) combination.

  6. Mar 2015