-
Notifications
You must be signed in to change notification settings - Fork 3
Detailed Analysis of Supported Protocols
PinkieSwirl edited this page Jun 29, 2017
·
1 revision
In the following sections we give a detailed overview of the authentication and authorization protocols used in eID services, and their security properties. We analyze the following properties:
Metadata: Includes a link to the protocol metadata (if provided).
Bindings: Gives an overview of protocol bindings to the TLS channel.
Flows: OAuth and OpenID Connect include standardized specific protocol flows, which are suitable for different scenarios.
Additional features: Includes an overview of additional optional features. For example, a holder of key binding can be used.
Analysed protocols: