How does claim authentication differs from conventional way of authentication. RRS feed

  • Question

  • Hi Team,

    How does claim authentication differ from the conventional way of authentication.?


    Wednesday, December 19, 2018 4:29 PM

All replies

  • There's an excellent free book on the subject:

    A Guide to Claims-Based Identity and Access Control

    Basically instead of authenticating and then calling API to get attributes it's all bundled into one signed (and possibly encrypted) token built by the IDP.

    Any security audit just has to look at the IDP configuration to see what claims are sent where instead of having to look thorough the code of each application.

    Wednesday, December 19, 2018 5:41 PM