惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

Google DeepMind News
Google DeepMind News
F
Fortinet All Blogs
阮一峰的网络日志
阮一峰的网络日志
Apple Machine Learning Research
Apple Machine Learning Research
爱范儿
爱范儿
WordPress大学
WordPress大学
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
J
Java Code Geeks
罗磊的独立博客
S
SegmentFault 最新的问题
V
V2EX
V
Visual Studio Blog
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
美团技术团队
博客园 - 三生石上(FineUI控件)
Stack Overflow Blog
Stack Overflow Blog
Y
Y Combinator Blog
MyScale Blog
MyScale Blog
D
Docker
Google DeepMind News
Google DeepMind News
Blog — PlanetScale
Blog — PlanetScale
M
Microsoft Research Blog - Microsoft Research
Martin Fowler
Martin Fowler
S
Secure Thoughts
B
Blog
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
C
Cisco Blogs
C
CERT Recently Published Vulnerability Notes
T
True Tiger Recordings
GbyAI
GbyAI
P
Proofpoint News Feed
P
Privacy International News Feed
Jina AI
Jina AI
The Cloudflare Blog
I
Intezer
AWS News Blog
AWS News Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
S
Security Archives - TechRepublic
NISL@THU
NISL@THU
The Register - Security
The Register - Security
Recent Commits to openclaw:main
Recent Commits to openclaw:main
P
Palo Alto Networks Blog
S
Schneier on Security
L
LINUX DO - 热门话题
C
CXSECURITY Database RSS Feed - CXSecurity.com
Security Latest
Security Latest
C
Cybersecurity and Infrastructure Security Agency CISA

DEV Community

Why AI Should Not Write SQL Against ERP Databases Vibe coding works until it doesn't. The debt is real. Shipping at the Edge: Migrating a Coffee Subscription Platform to Cloudflare Workers Stop Tab-Switching: A Developer's Guide to Color Tools That Actually Fit the Workflow DevOps vs MLOps vs AIOps: What Changes, What Stays, and a Simple Roadmap to Get Started Run Powerful AI Coding Locally on a Normal Laptop 5 n8n Automations Every WooCommerce Store Needs (Save 10+ Hours/Week) What I Learned Building My Own AI Harness Hytale Servers Will Fail Treasure Hunts Until We Fix Our Event Handling Redux in React: Managing Global State Like a Pro Unfreezing Your GitHub Actions: Troubleshooting Stuck Deployments and Protecting Your Git Repo Statistics Unlocking Project Discoverability on GHES: A Key to Software Engineering Productivity When the Cleanup Code Becomes the Project Rockpack 8.0 - A React Scaffolder Built for the Age of AI-Assisted Development Mismanaging the Treasure Hunt Engine in Hytale Servers Will Get You Killed Why Hardcoded Automations Fail AI Agents Stop Calling It an AI Assistant. It’s Already Managing Your Company Why I built a post-quantum signing API (and why JWT is on borrowed time) Weekend Thought: Frontend Build Tools Suffer From Work Amnesia A 10-Line Playwright Trick That Saved Me Hours on Every Sephora Run AI Is Changing Engineering Culture More Than We Realize Everyone Was Focused on Gemini, But Infinite Scaler Was the Real Twister "Gemma 4 Analyzed My Bank Statements – Apparently I 'Have a Problem' with Coffee and Late-Night Apps" #css #webdev #beginners #codenewbie The Hidden Layer Every AI Developer Must Learn AlphaEvolve: Google DeepMind's Gemini-Powered Evolutionary Coding Agent RDS Reserved Instance Pricing: Every Engine, Every Rule, Real Dollar Savings How To Build An AI-Powered MVP Without Burning Your Startup Budget In 2026 Reading a Psychrometric Chart Without Getting Lost LMR-BENCH: Can LLM Agents Reproduce NLP Research Code? (EMNLP 2025) How to turn text into colors (without AI) Building Real-Time Apps in Node.js with Rivalis: WebSockets, Rooms, Actors, and a Binary Wire This Week In React #282 : Security, Fate, TanStack, Redux, Jotai | Hermes-node, Expo, Rozenite, Harness | TC39, Bun, pnpm, npm, Yarn, Node AI Copilot vs AI Agent Architecture - What's Actually Different (And Why It Matters) Smart Contract Security: NEAR's Futures Surge and AI Token Risks Database Maintenance: Tracing Production Incidents to Their Root Cause Stop juggling AI SDKs in PHP — meet Prisma Google Quietly Changed What “Apps” Mean at I/O 2026 The Infrastructure Team Is the Real Single Point of Failure Building SQLite from Scratch: 740 Lines of C++23 to Understand Every Byte of a .db File The 4 Levels of Hermes Agent Scaling Framework: From One Hermes Agent to a Fully Automated Team Your AI Has a Memory. It Just Doesn’t Know What to Remember. Claprec: Engineering Tradeoffs - Limited time vs. Perfection (6/6) Building a Daily Google News API Monitor in Python Building RookDuel Avikal: From Chess Steganography to Post-Quantum Archival Security Google I/O e IA: o que realmente muda na vida do dev? Color Contrast Failures: The Number One Accessibility Issue and How to Fix It # I Watched 15 Hours of Hermes Agent Videos So You Don't Have To Cómo solucionar el bucle infinito en useEffect con objetos y arrays en React The First Agent-Centric Cloud Security Platform — And Why We Didn't Build It That Way On Purpose Most Treasure Hunts Engines on Hytale Servers Are Built to Fail - Lessons from a Burned Database GhostScan v3.0 — From Closed-Source EXE to Open-Source Pentest Framework De hojas de cálculo a IA: construyendo una plataforma SRM moderna When is AI fine in education? Python Tools for Managing API Rate Limits in Data Pipelines How to Implement Exponential Backoff for Rate-Limited APIs in Python "My Web Chat Wasn't a Real Channel. That Broke My Agent Pipeline" next-advanced-sitemap v1.0.7 — safer URL ingestion & automatic trimming for Next.js sitemap generation I keep seeing people build an AI lead processing agent when they really need a 6-step rules engine AI Powered Student Learning Assistant Using Gemma 4 How I Built a Drop-In Proxy to Slash My OpenAI Bills by 20%+ Automatically Building a Sarcastic AI English Tutor with Persona-as-Code and Gemini Audio Input for Pronunciation Correction Five Years Later, I Finally Have 96GB VRAM — What It Actually Unlocks for Agent Loops Turning a 1-Line Idea Into a 40-Second Short with a 10-Beat Local Video Pipeline Running LTX-2.3 Alongside TTS on a Single 96GB GPU with a Cold-Start Architecture Cutting LTX-2 22B Peak VRAM by 40% with fp8_cast — and Why optimum-quanto Was a Trap HiDream Skeleton Mode: Prompt Beats OpenPose Ref — 8 Patterns Benchmarked Replicating a Language-Learning Comedy Short with Claude Code — Gemini as a Multimodal Sub-Agent HiDream-O1-Image 3–8x Faster: Benchmarking Steps, CFG, and Resolution AWS Savings Plan Buying Strategy: How to Layer, Size, and Time Commitments application.properties I built a macro tracker powered by AI + attitude Solace: A Global Mental Health First Responder Built with Gemma 4 Why Blocking Prompt Injection Is Wrong — and What to Do Instead The AI code tools Dutch developers actually use in 2026 (field notes) Automatic Error Recovery in AI Agent Networks You Are Not Choosing Building a Cinematic Adaptive Learning Intelligence with Gemma 4, Gemini, and OpenAI(Powered by Gemma 4) CLAUDE.md for Angular: 13 Rules That Make AI Write Idiomatic, Production-Ready Components I tested 7 vector databases for my RAG stack in 2026, here's the one nobody is talking about (yet) Claude agreed with a false fact I gave it. Confidently. That broke my workflow Google's "Budget" Model Just Beat Its Own Flagship. Here's What That Actually Means for Developers. How I built a monitoring SaaS for Joomla, WordPress & PrestaShop agencies Shifting from Passive Dashboards to Automated Remediation: A Guide to Next-Generation FinOps and CloudZero Alternatives Automating CSV WooCommerce Imports Without Plugins Why Wobbly Plugs and Overheating Outlets Are More Dangerous Than You Think (UL 498 Explained) Building an AI Model Evaluation Pipeline on AWS for Audio Content Generation Your Side Project Is Not a Business Neurodiversity and the two layers of cognition GitHub Internal Repositories Breached: Source Code and Internal Data Allegedly Exfiltrated in 2026 Supply Chain Attack Stop drowning in files: auto-organize your Google Drive with n8n (free workflow JSON) Secure Firmware Updates with a Secure Element: Building Trust Into the Bootloader I Thought Domain-Driven Design Was a Waste of Time. I Was Wrong. AI Content Is Getting Tagged Like Livestock — And That's Actually Good ESP32 Into a Speech-to-Text Device Why Simple Audio Transcription Fails in Healthcare: The Need for Clinical Reasoning Engines The 114KB Span Attribute That Hid Our LCP Data How to Scale AI Development Beyond Prototype Speed Agent Execution Environments: Cloud Sandbox vs Local GUI vs Hybrid AI code review checklist that actually catches problems
SSO, SAML, OIDC, and SCIM: What Actually Happens When You Click "Sign in with Google"
M TOQEER ZIA · 2026-05-21 · via DEV Community

 You click "Sign in with Google" on GitHub. Seconds later, you are in. No new account. No new password.

That felt simple. The system behind it is not.

This article breaks down the four protocols that power modern identity management: SSO, SAML, OIDC, and SCIM. You will understand what each one does, where they differ, and how they work together in real companies like Netflix and Airbnb.


The Problem These Protocols Solve

Before SSO, every app had its own login database. A new employee joining a company needed separate accounts in Gmail, Slack, Jira, Salesforce, and every other tool. IT teams created each account by hand. When someone left, accounts often lingered for weeks, open to misuse.

Three problems emerged:

  • Users carried dozens of passwords, and reused them
  • IT spent hours on account creation and resets
  • Every separate login system was a separate attack surface

SSO solves this by centralizing authentication. You log in once to a trusted Identity Provider (IDP) and every other app trusts that login. One credential. One place to enforce MFA. One place to revoke access.

But SSO is not a single technology. It is a goal. SAML, OIDC, and SCIM are the tools that achieve it.


The Three Main Players in Any SSO Flow

Before going into protocols, know these three roles:

User: The person trying to access a service.

Identity Provider (IDP): The system that verifies the user's identity. Examples: Okta, Azure AD, Google Workspace.

Service Provider (SP): The application the user wants to access. Examples: Salesforce, GitHub, Slack.

The IDP and SP are separate systems. They trust each other through a formal agreement called federation. Federation lets your company's IDP issue a kind of digital passport, and every connected app checks that passport at the door.


SAML: The Enterprise Veteran

SAML stands for Security Assertion Markup Language. It is an open standard that has powered enterprise SSO since 2002.

SAML Flow Diagram

Here is the step-by-step SAML flow:

  1. You try to access Salesforce (the Service Provider)
  2. Salesforce redirects you to your IDP (say, Okta)
  3. Okta asks for your credentials and verifies them, including MFA
  4. Okta generates a SAML Assertion, an XML document containing your identity, roles, and group memberships
  5. Okta sends that assertion back to Salesforce
  6. Salesforce verifies the IDP's digital signature on the assertion and grants access

The assertion is the key artifact. It carries signed proof of who you are and what roles you hold. Salesforce does not store your password. It trusts Okta's signature.

Where SAML excels:

  • Legacy enterprise apps (Salesforce, Workday, ServiceNow)
  • Organizations with strict compliance requirements (healthcare, government)
  • Web browser-based SSO flows

Where SAML struggles:

  • Mobile apps, which do not handle XML-based browser redirects well
  • APIs and microservices that prefer JSON
  • Modern single-page applications

Real example: A hospital network uses SAML to give doctors access to patient record systems, billing tools, and scheduling software with one login. Auditors get a single log of every access event. SAML's verbose XML is worth the overhead when the data is sensitive and regulated.


OIDC: The Modern API-Friendly Option

OpenID Connect, or OIDC, is built on top of OAuth 2.0. OAuth handles authorization (what an app is allowed to do on your behalf). OIDC adds the missing authentication layer (who you actually are).

When you click "Sign in with Google" on GitHub, you are using OIDC.

Here is the flow:

  1. You click "Sign in with Google" on GitHub
  2. GitHub redirects you to Google's authorization server
  3. Google asks for your credentials
  4. Google sends back two tokens: an Access Token and an ID Token
  5. The ID Token is a JWT (JSON Web Token) signed by Google, containing your identity
  6. GitHub reads the JWT, verifies Google's signature, and logs you in

The JWT looks like this (decoded):

{
  "sub": "1234567890",
  "name": "Jane Doe",
  "email": "jane@example.com",
  "iss": "https://accounts.google.com",
  "exp": 1716560000
}

Enter fullscreen mode Exit fullscreen mode

This is lightweight, JSON-based, and works seamlessly in mobile apps, SPAs, and API calls.

SAML vs OIDC at a glance:

Feature SAML OIDC
Format XML JSON (JWT)
Age 2002 2014
Best for Enterprise web apps Mobile, APIs, SPAs
Complexity Higher Lower
Adoption Legacy enterprise Modern cloud apps

Real example: Spotify's mobile app uses OIDC when you log in with Facebook. The app receives a JWT, verifies it, and creates your session without ever touching Facebook's password system.


SCIM: The Account Lifecycle Manager

SAML and OIDC handle authentication. They answer: who is this user?

SCIM (System for Cross-domain Identity Management) answers a different question: does this user's account exist in the first place, and does it have the right attributes?

SCIM is a REST API specification. If your app implements SCIM endpoints, an IDP like Okta or Azure AD can automatically:

  • Create accounts when someone joins
  • Update attributes when someone changes teams
  • Deactivate accounts when someone leaves

Here is what SCIM looks like in practice:

Create a new user (IDP calls your app):

POST /scim/v2/Users
{
  "userName": "jane.doe@company.com",
  "name": { "givenName": "Jane", "familyName": "Doe" },
  "department": "Engineering",
  "active": true
}

Enter fullscreen mode Exit fullscreen mode

Deactivate a user on departure:

PATCH /scim/v2/Users/12345
{
  "Operations": [{ "op": "replace", "path": "active", "value": false }]
}

Enter fullscreen mode Exit fullscreen mode

When Jane joins the company, her IDP account triggers SCIM calls to Slack, Zoom, GitHub, and Jira. Her accounts appear before her first day. When Jane leaves, one deactivation in the IDP removes access everywhere within minutes.

Real example: Netflix built an internal "People Service" that ingests identity data from Workday and Azure AD, then distributes it to hundreds of internal tools via SCIM and internal APIs. Without this, onboarding a new engineer would require tickets to a dozen different teams.


How the Three Protocols Work Together

These are not competing standards. Each solves a different layer of the same problem.

HR System
    |
    | (triggers onboarding event)
    v
Identity Provider (Okta / Azure AD)
    |
    |-- SCIM --> Creates accounts in Slack, GitHub, Zoom, Salesforce
    |
    |-- SAML --> Authenticates users in legacy enterprise apps
    |
    |-- OIDC --> Authenticates users in modern apps and APIs

Enter fullscreen mode Exit fullscreen mode

A concrete scenario:

  1. A new engineer joins. HR updates their record.
  2. Azure AD receives the event and uses SCIM to create accounts in GitHub, Slack, and Jira with the correct team permissions overnight.
  3. The next morning, she logs into Azure AD once.
  4. Azure AD uses OIDC to authenticate her into the internal developer portal.
  5. Azure AD uses SAML to authenticate her into the legacy finance system.
  6. She accesses everything without logging in again.
  7. Six months later, she leaves. Azure AD deactivates her account. SCIM removes her access from every connected app within minutes. SAML and OIDC stop issuing tokens for her identity.

The Pros and Cons

SSO (the goal):

Pros:

  • One set of credentials for all apps
  • Centralized MFA enforcement
  • Single audit log for access events
  • Faster onboarding and offboarding

Cons:

  • If the IDP goes down, users lose access to everything
  • Requires careful configuration between IDP and each service provider
  • Single point of compromise if the IDP is breached without strong MFA

SAML:

Pros:

  • Mature, battle-tested in enterprises
  • Carries rich attributes (roles, groups, departments)
  • Strong support in legacy enterprise apps

Cons:

  • XML is verbose and complex to debug
  • Poor fit for mobile apps and APIs
  • Implementation errors (like signature validation mistakes) are a common source of vulnerabilities

OIDC:

Pros:

  • Lightweight JSON tokens
  • Works everywhere: web, mobile, APIs
  • Built on OAuth 2.0, which developers already know

Cons:

  • JWT misconfiguration (like skipping signature validation) creates security holes
  • Token expiry and refresh logic requires careful handling

SCIM:

Pros:

  • Eliminates manual account management
  • Reduces orphaned accounts (a major security risk)
  • Standardized, so IDPs support it out of the box

Cons:

  • Not every app supports SCIM endpoints
  • Centralizing SCIM in a sync service adds architectural complexity
  • Debugging sync failures across many apps is non-trivial

Where This Fits in the Bigger Picture: IAM

SSO, SAML, OIDC, and SCIM are components of a broader discipline called Identity and Access Management (IAM).

IAM covers:

  • Authentication (AuthN): Proving who you are. SAML, OIDC, MFA.
  • Authorization (AuthZ): Controlling what you can do. RBAC, ABAC, policy engines like OPA.
  • Provisioning: Managing account lifecycles. SCIM.
  • Federation: Trust between organizations. SAML, OIDC across org boundaries.

A practical distinction worth knowing: AWS IAM is Amazon's system for controlling access to AWS resources (S3, EC2, Lambda). It is not a general enterprise IDP. Most companies use Okta or Azure AD as their central IDP and connect to AWS through federation and role mappings.

When a developer logs into AWS through Okta SSO, Okta authenticates them (via SAML or OIDC) and passes their identity to AWS IAM, which then decides what resources they can access.


A Real Security Consideration: The SSO Risk Trade-Off

SSO reduces password sprawl and improves user experience. But it concentrates risk.

If an attacker compromises an employee's IDP credentials and MFA, they gain access to every federated application at once. This is why:

  • MFA on the IDP is not optional, it is the primary defense layer
  • Conditional access policies (blocking logins from unrecognized devices or locations) are critical
  • Session timeouts should be enforced at the IDP level
  • Privileged accounts should use hardware security keys (FIDO2), not TOTP codes

The 2023 MGM Resorts breach reportedly started with social engineering an IT help desk into resetting an Okta account. The attacker then moved laterally across MGM's systems using the SSO trust relationships. SSO amplified the blast radius of a single credential compromise.

The lesson: SSO is more secure than password sprawl when configured correctly. The IDP is the crown jewel. Protect it accordingly.


Summary

  • SAML handles authentication for enterprise web apps using XML assertions. Mature, verbose, and essential for legacy systems.
  • OIDC handles authentication for modern apps and APIs using lightweight JSON tokens. Built on OAuth 2.0.
  • SCIM handles account lifecycle management. It creates, updates, and removes user accounts automatically across all your apps.
  • SSO is the goal. SAML and OIDC are the protocols that deliver it. SCIM keeps the underlying accounts in sync.
  • IAM is the full framework. SSO is one piece of it.

If you are building a product today, start with OIDC for authentication and implement SCIM endpoints if you want enterprise customers (they will ask for it). If you are connecting to legacy enterprise systems, SAML support is non-negotiable.


Found this useful? Share it with your team. If you want a deeper breakdown of OAuth 2.0 flows, JWT security, or RBAC versus ABAC authorization models, drop a comment below.