Skip to content

Instantly share code, notes, and snippets.

@rbrayb
Created January 31, 2019 18:26
Show Gist options
  • Save rbrayb/ee6db055bd64e458c8706da47ad76374 to your computer and use it in GitHub Desktop.
Save rbrayb/ee6db055bd64e458c8706da47ad76374 to your computer and use it in GitHub Desktop.
Comparing the Identity Providers (IDP’s) that I use
Functions Azure AD Azure AD B2C ADFS 3.0 ADFS 4.0 identityserver Auth0
Authenticate against Azure AD Azure AD (but different tenant type to AAD) AD AD LDAP v3.0 Anything AD LDAP SQL DB Auth0 repository
WS-Federation (Server - STS / R-STS) Yes / No No / No Yes / Yes Yes / Yes Yes / Yes Yes / Yes
SAML 2.0 (Server - STS / R-STS) Yes / No No / Yes (Via custom policies) Yes / Yes Yes / Yes Yes / Yes (Via Rock Solid Knowledge / Sustainsys SAML handler) Yes / Yes
OpenID Connect (Server - STS / R-STS) Yes / No Yes / Yes (Via custom policies) No / No Yes / No Yes / Yes Yes / Yes
WS-Federation (From client) Yes (Via Katana (OWIN) extension) No Yes (Via Katana (OWIN) extension) Yes (Via Katana (OWIN) extension) Yes (Via plug-in) Yes (Via Lock)
SAML 2.0 (From client) Yes (Via 3rd party extension) No Yes (Via 3rd party extension) Yes (Via 3rd party extension) Yes (Via plug-in) Yes (Via Lock)
OpenID Connect (OAuth as below) (From client) Yes (Via Katana (OWIN) extension or ADAL) Yes (Via Katana (OWIN) extension or ADAL) No Yes (Via Katana (OWIN) extension or ADAL) Yes Yes (Via Lock)
OpenID Connect Discovery Yes No No Yes (but only SID returned) Yes Yes
OAuth Authorisation Code Grant Yes Yes Yes (Only for confidential client Web API) Yes Yes Yes
OAuth Implicit Flow Yes Yes No Yes Yes Yes
OAuth Client Credential Yes Yes No Yes Yes Yes
OAuth resource owner password Yes No No Yes Yes Yes
Functions Azure AD Azure AD B2C ADFS 3.0 ADFS 4.0 identityserver Auth0
Code sample https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-developers-guide https://github.com/Azure-Samples?utf8=%E2%9C%93&q=active-directory-b2c&type=&language= https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-development http://docs.identityserver.io/en/release/ https://github.com/auth0-samples
Social Facebook Google Twitter Microsoft (Windows Live) Facebook Google+ Amazon Linkedin Twitter WeChat Weibo QQ (Others via custom profiles) Via federation with: Azure B2C Auth0 identityserver Via federation with: Azure B2C Auth0 identityserver Anything that is supported by ASP.NET Core e.g. Google, Twitter, Facebook etc. (Also via 30+ more via https://github.com/aspnet-contrib/AspNet.Security.OAuth.Providers) Many (https://auth0.com/docs/identityproviders)
Claims rules No (Use Graph API) No (Use Graph API) Yes Yes Yes (Via code) Yes (Via Rules)
Conditional access Yes No Yes (Via Issuance Authorisation Rules) Yes (Via Access Policies) Yes (Via code) Yes (Via Rules)
Hybrid intranet / internet Yes (Via AAD Connect AAD Proxy) No Yes (Via AAD Connect ADFS WAP) Yes (Via AAD Connect ADFS WAP) No Yes (Via AD / LDAP Connector)
Functions Azure AD Azure AD B2C ADFS 3.0 ADFS 4.0 identityserver Auth0
On-premises Yes (Via Azure Stack) No Yes Yes Yes Yes (Via Private SaaS (PSaaS) Appliance)
Cloud Yes Yes Yes (Via Azure VM) Yes (Via Azure VM) Yes (Via any cloud service, e.g. Azure WebApps, VMs, Lambda?) Yes
Licence Commercial Commercial Commercial Commercial Open source (Commercial support via Rock Solid Knowledge) Commercial
MFA Yes (Needs AAD Premium) Yes Yes Yes Yes Yes
Wizard for configuration Yes Yes Yes Yes Yes (Via Rock Solid Knowledge AdminUI) Yes
Functions Azure AD Azure AD B2C ADFS 3.0 ADFS 4.0 identityserver Auth0
@rbrayb
Copy link
Author

rbrayb commented Jan 31, 2019

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment