Generated by GPT-5-mini| OIDC | |
|---|---|
| Name | OIDC |
| Abbreviation | OIDC |
| Developer | OpenID Foundation |
| Introduced | 2014 |
| Based on | OAuth 2.0 |
OIDC is an identity layer built on top of OAuth 2.0 that enables clients to verify the identity of end users and to obtain basic profile information. It standardizes authentication across disparate services, allowing integration with platforms and providers such as Google, Microsoft, Amazon, Facebook, and Apple Inc. while interoperating with enterprise systems like Active Directory, Okta, Ping Identity, and Auth0. Major standards bodies and projects—IETF, OpenID Foundation, Kantara Initiative, and FIDO Alliance—influence its evolution and deployment.
OIDC specifies a JSON-based identity token called an ID token and defines RESTful endpoints and flows that complement OAuth 2.0 authorization. Implementations often integrate with identity providers including Google, Microsoft, Amazon, Facebook, Apple Inc., Salesforce, Oracle, and IBM. Platforms and frameworks such as Angular, React, Node.js, Spring Framework, .NET Framework, Django, and Ruby on Rails commonly include OIDC client libraries or middleware. OIDC interacts with cryptography standards like JSON Web Token, JSON Web Signature, JSON Web Encryption, and key-management practices from NIST and IETF.
The specification emerged from work by the OpenID Foundation and contributors from companies such as Google, Microsoft, PayPal, and Yahoo!. Early identity efforts included OpenID and the Liberty Alliance, whose concepts influenced later protocols like SAML 2.0 and OIDC. OIDC was published in 2014 as a layer on OAuth 2.0 to resolve usability and interoperability issues encountered in deployments by organizations including Google, Microsoft, Salesforce, and Amazon. Subsequent revisions and extensions have been coordinated through the IETF and the OpenID Foundation, with working groups drawing contributors from Okta, Ping Identity, Auth0, ForgeRock, and academic institutions such as MIT and Stanford University.
OIDC defines roles—Relying Party (RP), End-User, and Identity Provider (IdP)—and message artifacts like ID Tokens (JWTs), Access Tokens, and UserInfo responses. Core architectural components are the Authorization Endpoint, Token Endpoint, UserInfo Endpoint, and Discovery Endpoint (/.well-known), which complement OAuth 2.0 authorization servers used by vendors such as Auth0, Okta, Ping Identity, Keycloak, and ForgeRock. Cryptographic building blocks reference standards from IETF and implementers use libraries maintained by projects like OpenSSL, Bouncy Castle, libsodium, and platform SDKs from Google, Microsoft, Apple Inc., and Amazon Web Services. Claims in ID Tokens (iss, sub, aud, exp, nonce) map to identity data stores such as LDAP, Active Directory, and cloud directories operated by Azure Active Directory and Google Identity.
OIDC reuses OAuth 2.0 flows—Authorization Code, Implicit, Hybrid—and introduces the Authorization Code Flow with Proof Key for Code Exchange (PKCE) to mitigate interception risks. Major flows are used by consumer services like Google, Facebook, and Apple Inc. and enterprise platforms like Azure Active Directory, Okta, and Ping Identity. Endpoints include Authorization, Token, UserInfo, CheckSession, and Revocation; discovery and dynamic client registration are supported for scalability in federations such as eduGAIN and commercial federations used by Salesforce and Workday. Implementers also rely on transport security mandated by IETF TLS guidance and deployment patterns from cloud providers like Amazon Web Services, Google Cloud Platform, and Microsoft Azure.
Threat models for OIDC address token theft, replay, token binding, cross-site request forgery, and phishing. Recommended mitigations include PKCE, signed and encrypted ID Tokens (JWS/JWE), audience and nonce validation, short-lived access tokens, refresh token rotation, and mutual TLS in high-assurance scenarios. Security guidance references work by IETF, NIST, and research from OWASP and universities such as Carnegie Mellon University and University of Oxford. Breaches at large providers like Google and Facebook have driven improvements in account protection, multi-factor authentication adoption promoted by FIDO Alliance, and risk-based authentication used by Microsoft and Okta.
Commercial identity providers implementing OIDC include Auth0, Okta, Ping Identity, ForgeRock, Azure Active Directory, Google Identity, Amazon Cognito, and Keycloak. Libraries and SDKs exist for ecosystems such as Java, JavaScript, Python, Ruby, Go, C#, and Swift. Adoption spans consumer platforms Google, Facebook, Apple Inc., enterprise SaaS like Salesforce, Workday, and education/federation projects such as eduGAIN and InCommon. Standards-driven deployments are common in sectors regulated by frameworks like HIPAA, GDPR, and PCI DSS where identity and access controls interoperate with OIDC.
Critics cite complexity of specification documents and deployment pitfalls compared to earlier protocols like SAML 2.0; interoperability issues have required conformance testing by the OpenID Foundation. Privacy advocates point to centralized identity providers—Google, Facebook, Apple Inc.—creating concentration risks and surveillance concerns analyzed by researchers at Harvard University and Princeton University. Performance and latency in federated scenarios have been studied in case studies from Amazon Web Services, Google Cloud Platform, and Microsoft Azure. Operational gaps such as token revocation semantics, session management edge cases, and backward-compatibility issues have prompted extensions and profiles maintained by OpenID Foundation, IETF, and vendors like Okta and Ping Identity.
Category:Computer security