Useful Links
Computer Science
Other Tools and Technologies
OAuth and OIDC
1. Introduction to Secure Delegated Access
2. OAuth 2.0 Framework Fundamentals
3. OAuth 2.0 Protocol Endpoints
4. OAuth 2.0 Tokens
5. Scopes and Permissions
6. OAuth 2.0 Authorization Grants
7. OpenID Connect Identity Layer
8. JSON Web Tokens in OAuth and OIDC
9. Security Considerations and Threats
10. Advanced OAuth and OIDC Topics
11. OAuth 2.1 Evolution
12. Implementation Guidance
Advanced OAuth and OIDC Topics
Token Management
Token Revocation
Revocation Endpoint
Revocation Request Format
Revocation Response Handling
Cascade Effects
Token Introspection
Introspection Endpoint
Token Status Checking
Metadata Retrieval
Privacy Considerations
Token Exchange
Use Cases
Security Token Service
Delegation Scenarios
Discovery and Metadata
OpenID Connect Discovery
Well-Known Configuration Endpoint
Metadata Contents
Dynamic Configuration
OAuth Authorization Server Metadata
Endpoint Discovery
Capability Advertisement
Security Policy Information
Dynamic Client Registration
Registration Endpoint
Client Metadata
Registration Responses
Update and Deletion
Federation and Single Sign-On
Identity Federation Concepts
Multi-Domain SSO
Identity Provider Discovery
Account Linking
Advanced OIDC Features
Session Management
Session State Monitoring
Logout Mechanisms
Front-Channel Logout
Back-Channel Logout
Claims Aggregation
Distributed Claims
Sector Identifiers
Previous
9. Security Considerations and Threats
Go to top
Next
11. OAuth 2.1 Evolution