SlideShare a Scribd company logo
The Ultimate Deal On OPEN ID Uses
Open ID connect allows the user to use an already existing account to login into various other
websites without creating new passwords. The client might choose to share their information with
the identity provider which can be further shared with the website where the account is being made
like name and email address. By having open ID the password is not shared with anyone, only the
user has control over his or her data whether they want to share their information or not. Customers
do not need to worry about their account as everything is maintained by them. This method is
gaining popularity as every website is moving towards it due to the high level of security and
control over other sites. Sites like Google, Microsoft, and Facebook have already started using this
technique.
The Openid uniquely identifies the user on the internet so whenever open ID account is seen it will
automatically detect the owner. There are two types of information one is private, and the other is
public. The data which is made public is only shown on the web other than that private data is not
accessible besides user. It simplifies the sign in process, one needs to remember only the name and
password of open ID, and from there they can log in into multiple applications. It very much secure
as the information is not shared with any web sites and people can enjoy it without any fuss
Identifiers:
To obtain an open id enabled URL that can be used to login into open ID-enabled web sites, a user
registers an id identifier with an identity provider. Identity providers offer the ability to register a
URL (third domain) that will automatically be configured with MFA Authentication service. Once
they are recorded the user can use an existing URL under their control as an alias or “delegated
identity.” They directly insert the appropriate open ID tags in the HTML.
OAuth 2.0:
OAuth is an open standard for token-based authentication, commonly used as a way for internet
users to grant web sites or applications access to their information but without giving them the
password. This mechanism is used by several companies like Microsoft, Google, and Facebook, etc.
to permit the users to share information about their accounts with third-party applications. Open ID
is an extension of OAuth 2.0 which adds and strictly defines an ID token for returning user
information. A system called identity provider handles the authentication process and returns an
access token representing success.
Many people create different accounts for various purposes which mean as many passwords. It is
very difficult to remember all those passwords, due to which people choose simple passcodes like
date of birth or anniversary. These types of the password can be hacked easily so it is better to have
Open ID Connect account as it is a safer option and one can sign in using one set of name and
code. People don’t need to remember those long lengthy passcodes.

More Related Content

What's hot

Openid Presentation - A Quick Introduction
Openid Presentation - A Quick IntroductionOpenid Presentation - A Quick Introduction
Openid Presentation - A Quick IntroductionCorsin Camichel
 
B2 access user training 22_12_2016| www.eudat.eu |
B2 access user training 22_12_2016| www.eudat.eu | B2 access user training 22_12_2016| www.eudat.eu |
B2 access user training 22_12_2016| www.eudat.eu | EUDAT
 
How CBSE Students can get their Digital Marksheets from DigiLocker
How CBSE Students can get their Digital Marksheets from DigiLocker How CBSE Students can get their Digital Marksheets from DigiLocker
How CBSE Students can get their Digital Marksheets from DigiLocker DigiLocker
 
How ICSE or ISC Students can get their Digital Marksheets from DigiLocker
How ICSE or ISC Students can get their Digital Marksheets from DigiLocker How ICSE or ISC Students can get their Digital Marksheets from DigiLocker
How ICSE or ISC Students can get their Digital Marksheets from DigiLocker DigiLocker
 
Mobile workflow3.0120513v4
Mobile workflow3.0120513v4Mobile workflow3.0120513v4
Mobile workflow3.0120513v4Jon Winsor
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5DigiLocker
 
Ce order rma_wireframes111913v7
Ce order rma_wireframes111913v7Ce order rma_wireframes111913v7
Ce order rma_wireframes111913v7Jon Winsor
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 

What's hot (11)

Openid Presentation - A Quick Introduction
Openid Presentation - A Quick IntroductionOpenid Presentation - A Quick Introduction
Openid Presentation - A Quick Introduction
 
B2 access user training 22_12_2016| www.eudat.eu |
B2 access user training 22_12_2016| www.eudat.eu | B2 access user training 22_12_2016| www.eudat.eu |
B2 access user training 22_12_2016| www.eudat.eu |
 
Www and http
Www and httpWww and http
Www and http
 
How CBSE Students can get their Digital Marksheets from DigiLocker
How CBSE Students can get their Digital Marksheets from DigiLocker How CBSE Students can get their Digital Marksheets from DigiLocker
How CBSE Students can get their Digital Marksheets from DigiLocker
 
How ICSE or ISC Students can get their Digital Marksheets from DigiLocker
How ICSE or ISC Students can get their Digital Marksheets from DigiLocker How ICSE or ISC Students can get their Digital Marksheets from DigiLocker
How ICSE or ISC Students can get their Digital Marksheets from DigiLocker
 
Mobile workflow3.0120513v4
Mobile workflow3.0120513v4Mobile workflow3.0120513v4
Mobile workflow3.0120513v4
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5
 
Transport
TransportTransport
Transport
 
Ce order rma_wireframes111913v7
Ce order rma_wireframes111913v7Ce order rma_wireframes111913v7
Ce order rma_wireframes111913v7
 
Digilocker in education
 Digilocker in education  Digilocker in education
Digilocker in education
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 

Similar to The ultimate deal on open id uses

SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers IBM Security
 
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security ServerFlaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security Serverijtsrd
 
Review on OpenID Authentication Framework
Review on OpenID Authentication FrameworkReview on OpenID Authentication Framework
Review on OpenID Authentication Frameworkijsrd.com
 
Street conf overview
Street conf overviewStreet conf overview
Street conf overviewericsachs
 
How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)Jack Forbes
 
Universal login
Universal loginUniversal login
Universal loginZx MYS
 
Implementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteImplementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteDavid Keener
 
Open id & OAuth
Open id & OAuthOpen id & OAuth
Open id & OAuthPaul Fryer
 
OAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID ConnectOAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID ConnectJacob Combs
 
Decentralized Social Networking
Decentralized Social NetworkingDecentralized Social Networking
Decentralized Social NetworkingPascal Van Hecke
 
Presentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandHarini Anandakumar
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSJournal For Research
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCloudIDSummit
 
Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network IntergrationDinesh Kumar
 
Ntia 0900
Ntia 0900Ntia 0900
Ntia 0900gsgiles
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor AuthenticationPing Identity
 
Implementing open authentication_in_your_app
Implementing open authentication_in_your_appImplementing open authentication_in_your_app
Implementing open authentication_in_your_appNuhil Mehdy
 

Similar to The ultimate deal on open id uses (20)

SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers SpoofedMe - Intruding Accounts using Social Login Providers
SpoofedMe - Intruding Accounts using Social Login Providers
 
A07010105
A07010105A07010105
A07010105
 
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security ServerFlaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
 
Review on OpenID Authentication Framework
Review on OpenID Authentication FrameworkReview on OpenID Authentication Framework
Review on OpenID Authentication Framework
 
Street conf overview
Street conf overviewStreet conf overview
Street conf overview
 
Allneo
AllneoAllneo
Allneo
 
How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)
 
Universal login
Universal loginUniversal login
Universal login
 
Implementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteImplementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking Site
 
Open id & OAuth
Open id & OAuthOpen id & OAuth
Open id & OAuth
 
OAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID ConnectOAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID Connect
 
Decentralized Social Networking
Decentralized Social NetworkingDecentralized Social Networking
Decentralized Social Networking
 
Presentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini Anand
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
 
Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network Intergration
 
Ntia 0900
Ntia 0900Ntia 0900
Ntia 0900
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
OAuth Android Göteborg
OAuth Android GöteborgOAuth Android Göteborg
OAuth Android Göteborg
 
Implementing open authentication_in_your_app
Implementing open authentication_in_your_appImplementing open authentication_in_your_app
Implementing open authentication_in_your_app
 

More from Ping Identity

Ping Identity Resources
Ping Identity ResourcesPing Identity Resources
Ping Identity ResourcesPing Identity
 
Improve identity management with open id
Improve identity management with open idImprove identity management with open id
Improve identity management with open idPing Identity
 
Ping Identity Company
Ping Identity CompanyPing Identity Company
Ping Identity CompanyPing Identity
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor AuthenticationPing Identity
 

More from Ping Identity (6)

Ping Identity Resources
Ping Identity ResourcesPing Identity Resources
Ping Identity Resources
 
Improve identity management with open id
Improve identity management with open idImprove identity management with open id
Improve identity management with open id
 
Ping Identity Company
Ping Identity CompanyPing Identity Company
Ping Identity Company
 
Ping Identity
Ping IdentityPing Identity
Ping Identity
 
Single Sign On
Single Sign OnSingle Sign On
Single Sign On
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 

Recently uploaded

Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of ProgrammingMatt Welsh
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownloadvrstrong314
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAlluxio, Inc.
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfAMB-Review
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfMeon Technology
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageGlobus
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEJelle | Nordend
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandIES VE
 

Recently uploaded (20)

Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 

The ultimate deal on open id uses

  • 1. The Ultimate Deal On OPEN ID Uses Open ID connect allows the user to use an already existing account to login into various other websites without creating new passwords. The client might choose to share their information with the identity provider which can be further shared with the website where the account is being made like name and email address. By having open ID the password is not shared with anyone, only the user has control over his or her data whether they want to share their information or not. Customers do not need to worry about their account as everything is maintained by them. This method is gaining popularity as every website is moving towards it due to the high level of security and control over other sites. Sites like Google, Microsoft, and Facebook have already started using this technique. The Openid uniquely identifies the user on the internet so whenever open ID account is seen it will automatically detect the owner. There are two types of information one is private, and the other is public. The data which is made public is only shown on the web other than that private data is not accessible besides user. It simplifies the sign in process, one needs to remember only the name and password of open ID, and from there they can log in into multiple applications. It very much secure as the information is not shared with any web sites and people can enjoy it without any fuss
  • 2. Identifiers: To obtain an open id enabled URL that can be used to login into open ID-enabled web sites, a user registers an id identifier with an identity provider. Identity providers offer the ability to register a URL (third domain) that will automatically be configured with MFA Authentication service. Once they are recorded the user can use an existing URL under their control as an alias or “delegated identity.” They directly insert the appropriate open ID tags in the HTML. OAuth 2.0: OAuth is an open standard for token-based authentication, commonly used as a way for internet users to grant web sites or applications access to their information but without giving them the password. This mechanism is used by several companies like Microsoft, Google, and Facebook, etc. to permit the users to share information about their accounts with third-party applications. Open ID is an extension of OAuth 2.0 which adds and strictly defines an ID token for returning user information. A system called identity provider handles the authentication process and returns an access token representing success. Many people create different accounts for various purposes which mean as many passwords. It is very difficult to remember all those passwords, due to which people choose simple passcodes like date of birth or anniversary. These types of the password can be hacked easily so it is better to have Open ID Connect account as it is a safer option and one can sign in using one set of name and code. People don’t need to remember those long lengthy passcodes.