• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance

Active Directory

Manage identity in Active Directory

Azure (O365)

Manage identity in Office365

SAP

Manage identity in SAP S/4 Hana

SAP SuccessFactors

Manage identity in SAP SuccessFactors

Workday

Manage identity in Workday

Education

Manage identity for students, staff and alumni

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

What is OpenID Connect?

In the ever-evolving digital world, security stands as the pillar of any online interaction. OpenID Connect (OIDC) emerges within this sphere as a protocol, standardizing user authentication and ensuring secure operations for countless applications. Building upon OAuth 2.0 frameworks, OIDC provides a flexible solution catering to diverse application needs, particularly in the realms of Single Sign-On (SSO) and identity provision.

OpenID Connect is an authentication layer sitting atop the authorization protocol OAuth 2.0, facilitating clients in verifying the end-user identity based on the authentication performed by an authorization server. Additionally, it allows the secure retrieval of user profiles, ensuring the individual's identity remains central in the communication between the authorization server and the application. 

The process of OpenID Connect

  1. Client registration: Before anything else, the application (client) must register with the OpenID Provider (OP). This registration is crucial so the provider can authorize the application's authentication requests. During this phase, the application typically specifies the methods used for redirecting users and possibly the type of information it will request from users. 
  2. Authentication request: When a user attempts to log in or access protected resources, the application initiates an authentication request. The user is redirected to the OpenID Provider's authorization endpoint. This redirection includes the application's ID, the requested scopes (indicating the type of user information the application is asking for), and a redirection URI (where the provider will send the response).
  3. User authentication and consent: The OpenID Provider authenticates the user, often through a username and password form, though other methods can be employed. Post-authentication, the user may be asked to consent to share certain information (referred to as "claims") with the application. This step ensures the user maintains control over what information is shared. 
  4. ID token issuance: Upon successful authentication and user consent, the OpenID Provider creates an ID token. This token, a JWT (JSON Web Token), contains claims about the user's identity and an access token to reach other resources. The provider sends these tokens to the redirect URI specified by the client in the initial request.
  5. ID token validation: The application receives the ID token and must validate it to ensure its authenticity and that it hasn't been tampered with. This step typically involves checking the token's signature, verifying the issuing authority, and examining the claims within the token to authenticate the user's identity.
  6. User authentication: After the application has validated the ID token, it authenticates the user and establishes a session for them. If an access token was also provided, the application could use it to access resources hosted by the OpenID Provider on behalf of the user, such as the user's profile or email.

Benefits of OpenID Connect

  • Simplified authentication: OIDC takes the burden of user authentication off the services, allowing developers to focus on core functionality rather than security concerns.
  • Standardization and interoperability: As a standardized protocol, OIDC enhances interoperability between services and applications, simplifying the integration processes across different platforms and offering authentication. 
  • Enhanced security: By using tokens instead of credentials, OIDC minimizes the risk of data breaches, providing a secure mechanism to confirm user identity without exposing sensitive information.
  • Flexibility and adaptability: OIDC supports a range of applications, from web and mobile to TV and console applications, showing remarkable flexibility and adaptability to various use cases.

Challenges and considerations

While OpenID Connect enhances user authentication across various systems, it introduces several challenges. The initial setup can be complex, requiring detailed understanding and configuration of tokens and cryptographic keys. Managing user consent accurately is crucial to ensure users are aware of the data being shared, and handling session termination effectively is vital for maintaining user privacy and security. Integrating with existing legacy systems poses compatibility issues, and the protocol's scalability must be addressed to support an expanding user base without performance loss. Furthermore, organizations must navigate various privacy concerns and regulatory compliance requirements related to data protection, necessitating a secure, informed, and adaptive approach to OpenID Connect implementation. 

How OpenID Connect works

OpenID Connect streamlines a safe authorization procedure, permitting a user's account details to be employed by external services (known as relying parties or clients) while safeguarding the user's sensitive login information. This protocol builds upon OAuth 2.0, incorporating a new feature that allows clients to confirm the user's identity following the authorization server’s verification process and gather fundamental user profile data. Below is an easy-to-understand breakdown of its functionality: 

  1. Client registration: Before anything occurs, the client (usually a web service or app) must register with the authorization server. This registration typically involves providing details such as the application name, website, redirect URI (where to send tokens after successful authentication), and perhaps the type of data the application wants to access.
  2. Authentication request: When a user seeks to engage with resources or log in through a client, the client triggers a request for authentication. This call is directed toward the authorization server and specifies the nature of access and the data the client intends to access. Following this, the user is navigated to the authorization server for the subsequent steps of this process. 
  3. User authentication and consent: The authorization server authenticates the user’s identity, typically through a username and password form on a login page. This could also involve multi-factor authentication (MFA) for added security. Once authenticated, if the user is not already consenting, they are asked to consent to the specific data access scopes that the client has requested. 
  4. ID token issuance: After the user successfully authenticates and provides the necessary consent, the authorization server fulfills the client's request by issuing an ID token and, frequently, an access token. The ID token, structured as a JSON Web Token (JWT), includes specific assertions regarding the user's identity, including details like their name, email address, and more. Meanwhile, the access token serves as a digital key, permitting the client to retrieve resources on behalf of the user.
  5. Validation: The client validates the ID token and retrieves the end-user's identity. If the client requested access to the user's information, it could use the access token to make a request to the user info endpoint of the authorization server, which returns claims about the authenticated user.
  6. Secure user access: Once the validation is conclusively completed, the client facilitates user access, determined by the individual's identity and the permissions granted to the client. Consequently, the user gains the ability to operate within the client or application, accessing resources and information in a secure environment.

When it comes to addressing your precise security and compliance needs in the realm of identity governance, there is no better partner to assist you. Explore how our expertise can help you leverage OpenID Connect for secure user authentication and data protection, regardless of data location.

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy