Reverse Engineering (Global)

High-quality technical overview of Reverse Engineering in the context of blockchain security.

Conteúdo pendente de tradução. Exibindo a versão em inglês.

Roles: 1. Identity Store. 2. Auth Service. 3. Token Issuer. Standards: SAML 2.0, OpenID Connect (OIDC), OAuth 2.0. Examples: Okta, Auth0, Ping Identity, Microsoft Entra ID.

        graph LR
  Center["Reverse Engineering (Global)"]:::main
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Explique como se eu tivesse 5 anos

Imagine you want to go into five different clubs. Usually, you would have to show your ID to five different guards. An IdP is like a special VIP wristband station at the start of the street. You show your ID once, get a magic wristband, and all five clubs let you in just by looking at that wristband. The station that gave you the wristband is the Identity Provider.

🤓 Expert Deep Dive

Technically, an IdP is a 'Token-Issuing Authority' in a federated identity model. It manages a 'User Directory' and handles the 'Authentication' part of the IAM equation. When a user attempts to access a 'Service Provider' (SP), the SP redirects the user to the IdP. After successful authentication, the IdP sends a 'SAML Assertion' or an 'OIDC ID Token' back to the SP. This trust is based on 'Asymmetric Cryptography': the IdP signs the token with a private key, and the SP verifies it using the IdP's public key. This architecture is the foundation of modern 'Enterprise SSO' and 'Social Login'.

📚 Fontes