Skip to content

Detailed Analysis of Supported Protocols

PinkieSwirl edited this page Jun 29, 2017 · 1 revision

In the following sections we give a detailed overview of the authentication and authorization protocols used in eID services, and their security properties. We analyze the following properties:

Metadata: Includes a link to the protocol metadata (if provided).

Bindings: Gives an overview of protocol bindings to the TLS channel.

Flows: OAuth and OpenID Connect include standardized specific protocol flows, which are suitable for different scenarios.

Additional features: Includes an overview of additional optional features. For example, a holder of key binding can be used.

Analysed protocols:

Clone this wiki locally