Get to know OpenID

OpenID is an easy and safe way for people to reuse an existing account and user profile from an identity provider, for example Apple, Google, or Microsoft to sign-in to any OpenID-enabled applications and websites without creating a new registration and password. You choose the provider, such as Google and enter your Gmail address and password to sign-in.

With OpenID, you control how much of your user profile information is shared and you will be asked for your consent to share that profile with the application or website during sign-in.

Using OpenID, your password is authenticated with your identity provider, and that provider then confirms your identity to the application or website. Applications and websites do not collect, store, or manage your password.

Furthermore, OpenID is an open-source community, it is decentralized and not owned by any entity. Anyone can choose to use an OpenID and/or become an OpenID Provider for free without having to register or be approved by any organization.

Learn about OpenID Connect

OpenID Connect is an interoperable authentication protocol based on the OAuth 2.0 framework of specifications (IETF RFC 6749 and 6750). It simplifies the way to verify the identity of users based on the authentication performed by an Authorization Server and to obtain user profile information in an interoperable and REST-like manner.

OpenID Connect enables application and website developers to launch sign-in flows and receive verifiable assertions about users across Web-based, mobile, and JavaScript clients. And the specification suite is extensible to support a range of optional features such as encryption of identity data, discovery of OpenID Providers, and session logout.

For developers, it provides a secure and verifiable answer to the question “What is the identity of the person currently using the browser or mobile app that is connected?” Best of all, it removes the responsibility of setting, storing, and managing passwords which is frequently associated with credential-based data breaches.

Play Video