{"componentChunkName":"component---src-pages-author-author-yaml-id-js","path":"/author/gurjyot-singh/","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"id":"0e076a11-58da-54c5-b3ed-03b249f8382a","html":"<h2 id=\"introduction\" style=\"position:relative;\"><a href=\"#introduction\" aria-label=\"introduction permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Introduction</h2>\n<p>Phishing attacks aren’t uncommon, and we’ve all witnessed fake emails and messages that demand urgent attention at least once. However, there’s much more in the cybersecurity landscape than just conventional email practices when it comes to phishing. </p>\n<p>A <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing attack</a> can be a death blow for enterprises that don't take the necessary precautions. The top line is affected, but the brand's image and trust can be obliterated if news of a data breach reaches the public.</p>\n<p>The browser in the browser attack (BITB) is the latest form of phishing scam that simulates a browser window within a web browser and steals sensitive user information. </p>\n<p>The user is catered with a fraudulent pop-up window that asks for their credentials for signing into the website in the previous web browser window and thus leads to identity theft. </p>\n<p>Let’s understand the aspects of Browser in-browser attacks and how businesses can ensure stringent security for their consumers and employees to protect against these attacks. </p>\n<h2 id=\"what-is-browser-in-the-browser-attacks-who-all-are-at-a-higher-risk\" style=\"position:relative;\"><a href=\"#what-is-browser-in-the-browser-attacks-who-all-are-at-a-higher-risk\" aria-label=\"what is browser in the browser attacks who all are at a higher risk permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Browser in the Browser Attacks? Who all are at a Higher Risk?</h2>\n<p>Whenever a user chooses a <a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">single sign-on (SSO)</a> option in a website or web application for signing in to their account for multiple interconnected applications, the fraudulent pop-up will be displayed to collect sensitive information about the user, including login credentials. </p>\n<p>Moreover, the significant difference between a phishing scam and a BIBT attack is that the pop-up window during the sign-in process would show any URL that matches the authentic one.</p>\n<p>In a nutshell, cybercriminals simulate a web browser window within a web browser for spoofing a legitimate domain. This attack majorly exploits the single sign-on (SSO) option, which users always prefer to stay logged in to different interconnected websites or applications.</p>\n<p>Users don’t wish to remember long credentials. They are hesitant to provide their credentials again and again, which gives an advantage to cybercriminals as they exploit the single sign-on login preference since users can’t differentiate between a fake domain or a legitimate one once a pop-up window appears. </p>\n<p>Various businesses offering single sign-on to their consumers for a seamless user experience across their multiple applications are always at a higher risk of compromising sensitive consumer information by falling prey to these browsers in the browser attacks. </p>\n<p>However, the businesses offering SSO capabilities must understand the risks associated with SSO and incorporate stringent security mechanisms to protect their consumer information. </p>\n<h2 id=\"how-businesses-can-avoid-browser-in-the-browser-attacks\" style=\"position:relative;\"><a href=\"#how-businesses-can-avoid-browser-in-the-browser-attacks\" aria-label=\"how businesses can avoid browser in the browser attacks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Businesses Can Avoid Browser in the Browser Attacks</h2>\n<p>Since SSO has provided endless opportunities to businesses and consumers, avoiding the use of SSO isn’t a great option at all. </p>\n<p>Adding multiple layers of security while implementing single sign-on (SSO) could help businesses prevent browser in the browser attacks and help mitigate other associated risks. </p>\n<p><a href=\"https://www.loginradius.com/resource/loginradius-single-sign-on/\"><img src=\"/970abf5b3c4e78379ad5bf97a519b62c/DS-SSO.webp\" alt=\"DS-SSO\"></a></p>\n<p>Let’s understand how businesses can reinforce security against BITB attacks. </p>\n<h3 id=\"incorporating-multi-factor-authentication-mfa\" style=\"position:relative;\"><a href=\"#incorporating-multi-factor-authentication-mfa\" aria-label=\"incorporating multi factor authentication mfa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Incorporating multi-factor authentication (MFA)</h3>\n<p><a href=\"https://www.loginradius.com/blog/identity/what-is-multi-factor-authentication/\">Multi-factor authentication</a> (or MFA)  is a multi-layered security system that verifies the identity of users for login or other transactions.</p>\n<p>By leveraging multiple authentication layers, the user account will remain secure even if one element is damaged or disabled. </p>\n<p>Codes generated by smartphone apps, answers to personal security questions, codes sent to an email address, fingerprints, etc., are a few examples of multi-factor authentication implemented in day-to-day scenarios.</p>\n<p>Adding MFA to your security policy could prevent your users from compromising their identities during a browser in the browser attack but also helps ensure robust safety for your sensitive business information. </p>\n<p>The use of software and even hardware tokens for dual identity verification is a highly-efficient way of reinforcing security against BITB attacks. </p>\n<h3 id=\"choosing-risk-based-authentication-rba\" style=\"position:relative;\"><a href=\"#choosing-risk-based-authentication-rba\" aria-label=\"choosing risk based authentication rba permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Choosing risk-based authentication (RBA)</h3>\n<p>Risk-based authentication or <a href=\"https://www.loginradius.com/blog/identity/adaptive-authentication/\">adaptive authentication</a> is the one-stop solution for preventing browser in the browser attacks. </p>\n<p>RBA is a method of applying various levels of stringency to authentication processes based on the likelihood that access to a given system could be compromised. As the level of risk increases, authentication becomes more restrictive.</p>\n<p>Hence, RBA automatically incorporates another layer of authentication in a high-risk situation like a BITB attack, and the user’s identity remains protected. </p>\n<p>Risk-based authentication can be incorporated through a cloud-based consumer identity and access management (CIAM) platform that restricts unauthorized access even if the users leverage single sign-on capabilities. </p>\n<h2 id=\"zero-trust-architecture\" style=\"position:relative;\"><a href=\"#zero-trust-architecture\" aria-label=\"zero trust architecture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Zero trust architecture</h2>\n<p>Zero trust is the security concept based on a belief that enterprises shouldn’t automatically trust any device or individual, whether inside or outside its perimeters and strictly verify everything before granting access.</p>\n<p>In a nutshell, <a href=\"https://www.loginradius.com/resource/zero-trust-security/\">zero trust</a> relies on the principle of “don’t trust anyone.” This architecture cuts all the access points until proper verification is done and trust is established.</p>\n<p>No access is provided until the system verifies the individual or device demanding access to the IP address, device, or storage. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Since global businesses face enormous challenges when it comes to ensuring robust security for their consumers, relying on MFA, RBA, and zero trust architecture can provide the highest level of security when it comes to preventing browser in the browser attacks. </p>\n<p>Businesses can choose a reliable <a href=\"https://www.loginradius.com/\">CIAM solution</a> like LoginRadius that helps brands secure their consumer identities by leveraging the true potential of multi-factor authentication, risk-based authentication, and zero trust architecture. </p>\n<p>If you wish to see the future of CIAM in action and understand how it works for your brand, reach us to schedule a personalized demo. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-browser-in-browser-attack\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"BITB Attacks: The New Destructive Phishing Technique","author":{"id":"Gurjyot Singh","github":null,"avatar":null},"date":"April 22, 2022","updated_date":null,"tags":["phishing","sso","identity-theft","mfa"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5267175572519085,"src":"/static/7f778f575cf9715afd3f6fb39f034320/58556/bib-attacks.webp","srcSet":"/static/7f778f575cf9715afd3f6fb39f034320/61e93/bib-attacks.webp 200w,\n/static/7f778f575cf9715afd3f6fb39f034320/1f5c5/bib-attacks.webp 400w,\n/static/7f778f575cf9715afd3f6fb39f034320/58556/bib-attacks.webp 800w,\n/static/7f778f575cf9715afd3f6fb39f034320/99238/bib-attacks.webp 1200w,\n/static/7f778f575cf9715afd3f6fb39f034320/587c8/bib-attacks.webp 1542w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Gurjyot Singh","slug":"/identity/what-is-browser-in-browser-attack/"}}},{"node":{"id":"0a1ffeeb-fdb0-5231-b0e8-489da1f01993","html":"<p>OpenID Connect has brought a revolution in the authentication process and ascended by leaps and bounds. It is primarily used in the <a href=\"https://www.loginradius.com/blog/identity/what-is-single-sign-on/\">single sign-on</a> (SSO) and identity provision on the web. The main reason behind its success is the JSON-based ID tokens (JWT) delivered via the OAuth 2.0 process flow.</p>\n<p>Firstly, let’s have a quick look at OAuth 2.0. </p>\n<p>Often referred to as authorization or delegation protocol, it is a security standard where you authorize an application to access your data, or use features in another application on your behalf, without giving them your password. </p>\n<p>In simple terms, it provides applications the ability to “secure designated access.” OAuth never shares password data but instead uses authorization tokens to prove an identity between consumers and service providers. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password.</p>\n<h2 id=\"what-is-openid-connect-oidc\" style=\"position:relative;\"><a href=\"#what-is-openid-connect-oidc\" aria-label=\"what is openid connect oidc permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is OpenID Connect (OIDC)</h2>\n<p>Now, let us learn about OpenID Connect. It is an OpenID Foundation (OIDF) standard that leverage OAuth 2.0 process flow to add an identity layer in order to obtain basic profile information about the End-User in an interoperable and REST-like manner or verify the identity of the End-User on the basis of the authentication done by an Authorization Server or Identity Provider (IDP). </p>\n<p>OpenID Connect supports clients of all types, including web-based, mobile, and JavaScript clients, to request and receive information about authenticated sessions and end-users. By implementing OpenID Connect, leveraging OAuth 2.0 fabricates a unified framework that promises mobile native applications, secure APIs, and browser applications in a single, cohesive architecture.</p>\n<h2 id=\"what-openid-connect-solves\" style=\"position:relative;\"><a href=\"#what-openid-connect-solves\" aria-label=\"what openid connect solves permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What OpenID Connect Solves</h2>\n<p>It is a very common practice to deploy the same password across multiple applications and websites. Since the traditional credentials are not centrally administered, if the security of any website that you use is compromised, a hacker could gain access to your password across multiple sites. </p>\n<p>Here comes OpenID connect in the picture as it never shares a password with any website. Even then, if a compromise does occur, you can immediately prevent any malicious access to your accounts at any website by simply changing the password for your OpenID Connect.</p>\n<p><strong>Also Read: <a href=\"https://www.loginradius.com/blog/engineering/guest-post/add-authentication-to-play-framework-with-oidc-and-loginradius/\">Add Authentication to Play Framework With OIDC and LoginRadius</a></strong></p>\n<h2 id=\"how-openid-connect-works\" style=\"position:relative;\"><a href=\"#how-openid-connect-works\" aria-label=\"how openid connect works permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How OpenID Connect Works</h2>\n<p>Before proceeding further, let’s have a look at some of the terminologies:</p>\n<ol>\n<li><strong>Client:</strong> The client is the application that’s trying to access the user’s account. It needs to get permission from the user before accessing the account. For example, a client application can present the user with the login page to get an access token for access to a particular resource.</li>\n<li><strong>Authorization Server:</strong> The authorization server validates the user credentials and redirects the user back to the client with an authorization code. The client communicates with the authorization server to confirm its identity and exchanges the code for an access token.</li>\n<li><strong>Scope:</strong> It specifies the level of access that the application is requesting from the client.</li>\n<li><strong>Claims:</strong> It constitutes the payload part of a JSON web token and represents a set of information exchanged between two parties.</li>\n</ol>\n<p>The application begins with an OAuth 2.0 flow that asks the user to authorize a request. As part of the flow, the client will include the OpenID Connect scope with scopes for any additional information it wants about the user. As the request is processed, the client receives an access token and an ID token issued by the authorization server. The ID token contains claims that have information about the user. </p>\n<p>The SSO is implemented by delivering ID tokens from the authorization server to the client. The client then contacts a dedicated endpoint on the authorization server known as the UserInfo endpoint to receive the remaining claims about the user using the access token. </p>\n<p>It is this ID token which is also known as the J<a href=\"https://www.loginradius.com/blog/engineering/jwt/\">SON Web Token (JWT)</a>, which contains claims, which are nothing but statements (like an email address or name) about an entity (the user) and some additional metadata. </p>\n<p>The OpenID Connect specification has a defined set of standard claims. The set of standard claims include name, email, gender, birth date, and so on. However, if you want to capture information about a user and there currently isn’t a standard claim that best reflects this piece of information, you can create custom claims and add them to your tokens.</p>\n<p><img src=\"/aeaf793dde8aee07613c77009a0c6833/what-is-openid-connect-1.webp\" alt=\"what-is-openid-connect-1\"></p>\n<p>For instance, let us say you want to use OpenID Connect to authenticate the user for your own application using Google’s OAuth URL.</p>\n<p><img src=\"/d8c8d3fac522b424074f9de671d44fab/what-is-openid-connect-2.webp\" alt=\"what-is-openid-connect-2\"></p>\n<p><strong>Step 1:</strong> On clicking the sign-in button, you are required to pass a few parameters like <strong>scope, **which is a space-delimited list of scopes, **response_type</strong> having the value code, <strong>client_id</strong> having the client identifier, <strong>redirect_uri</strong> having the client redirect URI, and <strong>state</strong> having a random string. </p>\n<p><strong>Step 2:</strong> The OpenID provider authenticates users for a particular application instance.</p>\n<p><strong>Step 3:</strong> A one-time-use code is passed back to the client using a predefined Redirect URI.</p>\n<p><strong>Step 4:</strong> The user interface can then share this temporary code with the server</p>\n<p><strong>Step 5:</strong> The server can exchange this code in order to get access to the user’s profile. </p>\n<p>Here, technically speaking, you are not only getting the user profile but an Access Token and an ID Token having all the details of the user’s profile.</p>\n<h2 id=\"openid-connect-vs-openid-20\" style=\"position:relative;\"><a href=\"#openid-connect-vs-openid-20\" aria-label=\"openid connect vs openid 20 permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>OpenID Connect vs OpenID 2.0</h2>\n<p>OpenID Connect performs various tasks similar to OpenID 2.0, but it does so in such a way that it is API-friendly and usable by mobile and native applications. OpenID Connect defines optional mechanisms for encryption and robust signing. In OpenID Connect, OAuth 2.0 capabilities are integrated with the protocol itself, whereas the integration of OAuth 1.0a and OpenID 2.0 requires an extension.</p>\n<p>OpenID Connect and OpenID 2.0 have many architectural similarities. Furthermore, a very similar set of problems are solved by the protocols. However, OpenID 2.0 uses XML and a custom message signature scheme. Their implementations would sometimes abnormally refrain from interoperating. OAuth 2.0, leveraged by OpenID Connect, outsources the required encryption to the web’s built-in TLS (also called SSL or HTTPS) infrastructure, which is implemented on both client and server platforms universally. When signatures are required, OpenID Connect uses standard JSON Web Token (JWT) data structures. For this reason, OpenID Connect is easier for developers to implement, and when implemented, it results in much better interoperability.</p>\n<p>The story of OpenID Connect interoperability has been proven in practice when an extended series of interoperability trials were conducted by members of the OpenID Connect Working Group and the developers behind numerous OpenID Connect implementations.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>OpenID Connect, its predecessors, and other <a href=\"https://www.loginradius.com/blog/engineering/encryption-and-hashing/\">public-key-encryption-based authentication</a> frameworks guarantee the security of the complete internet by having the responsibility for user identity verification in the hands of the most trusted and reliable service providers. If compared with the one which is available earlier, OpenID Connect is a way easier approach to implement and integrate and is expected to achieve a much-outspread acceptance.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=what-is-openid-connect\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"title":"Getting Started with OpenID Connect","author":{"id":"Gurjyot Singh","github":null,"avatar":null},"date":"September 21, 2021","updated_date":null,"tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.6260162601626016,"src":"/static/6de3dbe4d33771b7a95f8e811abcfedd/58556/what-is-openid-connect-cover.webp","srcSet":"/static/6de3dbe4d33771b7a95f8e811abcfedd/61e93/what-is-openid-connect-cover.webp 200w,\n/static/6de3dbe4d33771b7a95f8e811abcfedd/1f5c5/what-is-openid-connect-cover.webp 400w,\n/static/6de3dbe4d33771b7a95f8e811abcfedd/58556/what-is-openid-connect-cover.webp 800w,\n/static/6de3dbe4d33771b7a95f8e811abcfedd/cc834/what-is-openid-connect-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}}},"fields":{"authorId":"Gurjyot Singh","slug":"/identity/what-is-openid-connect/"}}}]},"authorYaml":{"id":"Gurjyot Singh","bio":"Gurjyot Singh is an Application Support Engineer at LoginRadius. Handles day-to-day customer technical queries regarding integration and implementation of various web technologies. He is an ardent, focused and exuberant person who has enhanced his knowledge in the web domain by working on various projects and learning on his own. He is a passionate learner and voracious coder with high ambition. In his leisure time he usually goes for photography.","github":null,"stackoverflow":null,"linkedin":"singhgurjyot","medium":null,"twitter":null,"avatar":null}},"pageContext":{"id":"Gurjyot Singh","__params":{"id":"gurjyot-singh"}}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}