Summary
In this chapter, we learned how identity protocols have evolved to answer the different needs in application development and to secure different systems. First, we covered two very basic elements – authentication and authorization. Then, we covered the different authentication techniques and protocols, such as password-based authentication, claims-based authentication, and more. We finished this chapter by providing a brief introduction to OAuth 2.0. This chapter gave you an overview of how authentication protocols have evolved and specified what the main drivers were, from an application perspective, for helping create the modern authentication protocols that we use nowadays.
In the next chapter, we are going to build on this and cover OAuth 2.0 in depth. We are also going to look at OpenID Connect and MSAL in more detail and learn how these protocols and techniques can help developers build robust and secure applications that can be hosted everywhere.