by iacguy on 1/4/24, 4:03 PM with 92 comments
by munchbunny on 1/4/24, 5:00 PM
by spapas82 on 1/4/24, 4:59 PM
by bob1029 on 1/4/24, 5:05 PM
Today, we use OIDC & SAML to authenticate all of the things. But, I cannot explain how any of it works in terms of detailed protocol, certificate chains, etc.
We actually have no in-house configuration along this axis because we only use products, such as web function runners, that live inside the IdP's platform. These can be trivially opted-in for MFA authentication with a single dropdown election if you are using Azure.
If your mission is to build your own IdP platform and/or SP client libraries, then it totally makes sense to dive into this rabbit hole. Otherwise, make it someone else's problem. An occasional headline in the news about a token not expiring in time, etc, is not worth chasing unless you intend to compete directly with these providers and build your own identity platform. If Microsoft can get it wrong sometimes, so will you.
by smalu on 1/4/24, 8:30 PM
OIDC solves problems for OAuth2 like "every Identity Provider has different endpoints" with OpenID Connect Discovery (/.well-known/openid-configuration).
by xvinci on 1/4/24, 6:52 PM
by starttoaster on 1/4/24, 9:22 PM
But beyond that, I'd say in future blog posts it would look a bit more professional to use some kind of architecture diagram making software, rather than somebody's napkin drawings. It's a little more difficult than it needs to be deciphering these graphics. To be entirely honest, I'd settle for mspaint-level quality if none of the free diagram making tools out there catch your eye.
by uxp8u61q on 1/4/24, 5:15 PM
by mooreds on 1/4/24, 9:33 PM
by simonw on 1/4/24, 4:25 PM
"Create a role on AWS, add trust policy specifying which github org+repo are allowed to access this AWS role. Create an identity provider for github actions."
I think need a full video of clicking around in the AWS console here, because the idea of having to figure out how to do that myself is horrifying to me.
by cod1r on 1/4/24, 6:46 PM