Page Archive

SSO Security Overview

  • Posted on: 12 October 2014
  • By: bluebird

The document gives a security overview of popular SSO protocols. The overview is focusing on end-to-end security and non-repudiation of SSO parties communication.
It goes through popular SSO (and not only) protocols and briefly explains which
and how tokens used, how they signed and encrypted.