Summary
In this chapter, we have gone through the authorization and authentication flows provided by OAuth 2.0 and OIDC protocols. We described their usage and their main objectives in terms of the best scenarios where they can be used.
In the next chapter, we will get a broader view of how these flows can be used to solve specific problems by providing a set of recipes, or patterns, that can be used in particular scenarios that are usually encountered when working in an enterprise.