OAuth vs SAML vs Kerberos

They are all ways to help authenticate and authorize users/services to another service through an identity provider. They use different strategies and have some differences between them.

OAuth:

  • Parties are: Client, Service Provider, and Authorization Provider
  • Main task: It gives a service provider access to some resource through the Authorization Provider requiring Client’s consent
  • OAuth allows to give scopes to these service providers to have certain access
  • OAuth returns an Access Token to be used by the service provider
  • OAuth can have an identity layer and it’s named OpenId Connect or OIDC, it returns also an Id Token which is used to identify the user
  • JSON-Based and uses JWTs
  • More modern and used by newer apps
  • Doesn’t require prior introduction between the Authorization Provider and Service Provider making it easy to setup

SAML:

  • Used mainly for Authentication but can have an authorization layer
  • Parties are: Client, Service Provider and Identity provider
  • Main task: it gives access to a client to a service provider through the identity provider
  • Very similar to OIDC
  • XML based and used by older applications and government software

Kerberos

  • Used mainly for Authentication & Authorization among a bunch of services with asymmetric keys (no public key) and avoid sharing keys between these many services
  • Parties: many services and a Key Distribution Center which includes two servers Authentication server and Ticket Granting server
  • Main Task: Gives access and keys to a service to communicate with another service using a session key

Read more:

Last Updated: