Опубликовано вс, 10/12/2014 - 13:18 пользователем bluebird
The document gives a security overview of popular SSO protocols. The overview
is focusing on end-to-end security and non-repudiation of SSO parties communication.
It goes through popular SSO (and not only) protocols and briefly explains which
and how tokens used, how they signed and encrypted.