
Sign up to save your podcasts
Or


The discussion in this podcast is an expert-level analysis of four critical Single Sign-On (SSO) protocols: Kerberos, SAML, OAuth, and OpenID Connect (OIDC), detailing their architectures, security features, and ideal use cases within a modern enterprise. It explains that while Kerberos is best for internal networks and SAML for enterprise federation, OAuth is for delegated API authorization, which OIDC then extends to cover user authentication for consumer applications. A significant portion of the discussion examines major security incidents—including the Golden Ticket attack against Kerberos and Consent Phishing in OAuth—to demonstrate that protocol security relies entirely on meticulous implementation and rigorous validation. Ultimately, it recommends a hybrid identity architecture that strategically integrates all four protocols, emphasising strict governance over both human and non-human identities to achieve a robust security posture.
 By HelloInfoSec
By HelloInfoSecThe discussion in this podcast is an expert-level analysis of four critical Single Sign-On (SSO) protocols: Kerberos, SAML, OAuth, and OpenID Connect (OIDC), detailing their architectures, security features, and ideal use cases within a modern enterprise. It explains that while Kerberos is best for internal networks and SAML for enterprise federation, OAuth is for delegated API authorization, which OIDC then extends to cover user authentication for consumer applications. A significant portion of the discussion examines major security incidents—including the Golden Ticket attack against Kerberos and Consent Phishing in OAuth—to demonstrate that protocol security relies entirely on meticulous implementation and rigorous validation. Ultimately, it recommends a hybrid identity architecture that strategically integrates all four protocols, emphasising strict governance over both human and non-human identities to achieve a robust security posture.