Hi folks,

I’m seeing there are multiple services which externalise the task of “identity provider” (e.g. login with Facebook, google or what not).

In my case, I am curious about Tailscale, a VPN service which allows one to chose an identity provider/SSO between Google, Microsoft, Github, Apple and OIDC.

How can I find out what data is actually communicates to the identity provider? Their task should simply be to decide whether I am who I claim to be, nothing more. But I’m guessing there may be some subtleties.

In the case of Tailscale, would the identity provider know where I’m trying to connect? Or more?

Answers and insights much appreciated! The topic does not seem to have much information online.

  • Em Adespoton@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    SSO can be fine, it all depends on how it is implemented. If you run your own OIDS or manage your own FIDO2 keys manually, SSO works great; it means that every time you access an online account, a different challenge/response is sent, but you only have to manage a single account on your end. This means less data to be stolen, and if implemented correctly, a sso-backed login attempt in a new context will require further action, preventing someone from just stealing your cookies/certificates and having full access to all your accounts.

    The problem is that so much SSO junk is intentionally mis-implemented to include third parties in the process where there’s no need for them to be. Avoid those where appropriate.

    • UnfortunateShort@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      Ok, fair enough, but at that point you’re basically deploying your own password manager which most people would consider a little over the top :D