12 Matching Annotations
- Mar 2025
-
clerk.com clerk.com
-
OIDC refresher: OpenID Connect is an identity protocol built on top of the OAuth 2.0 framework. If a request scope of OIDC is defined when initiating an OAuth flow, identity providers present the application an ID token along with an access token on a successful sign-in. The ID token is a JWT that contains some user information like name, email, and avatar, in the form of “claims”.
-
Clerk’s SSO uses the Open ID Connect protocol (OIDC), which provides an email_verified claim. Identity Providers are supposed to set this to true if they have verified the user’s email. Almost every SSO provider verifies emails, so if a user signs up with a social provider, a second email verification step is unnecessary.
-
- Dec 2023
-
developers.google.com developers.google.com
- Nov 2023
-
developers.cloudflare.com developers.cloudflare.com
-
Cloudflare Access has a generic OpenID Connect (OIDC) connector to help you integrate IdPs not already set in Access.
-
- Feb 2020
-
en.wikipedia.org en.wikipedia.org
Tags
Annotators
URL
-
-
openid.net openid.net
-
-
wordpress.org wordpress.org
-
OpenID Connect
-
-
openid.net openid.net
Tags
Annotators
URL
-
- Mar 2019
-
-
A locally unique and never reassigned identifier within the Issuer for the End-User, which is intended to be consumed by the Client
I wonder why this ID must be "unique and never reassigned...within the Issuer". This effectively makes it a trackable ID if clients work together.
What would break if this ID is unique within the (Issuer, client) combination.
-
- Mar 2015
-
openid.net openid.net
-
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol.
lol @ "simple"
-