The Cloud has brought new challenges to authentication and we are called upon to present protocols such as OAuth, SAML, OpenID, as well as FIDO peripherals and PassKeys. But how they work? After a historical view on authentication protocols, we will look into the functioning, benefits and limitations of different protocols and how they fit different requirements.
Marc is a typical specimen of an “Alpine Geek” (Nerdus Alpinus), having delivered courses in two languages and multiple countries for over 25 years, but living in a three-hundred year old chalet in the Swiss Alps that only got broadband Internet in 2009. He works with Microsoft subsidiaries, particularly around Partner Readiness, presents at various Microsoft conferences (TechED, TechDays, MCT Summits) and was the longest-serving member of the MCT Advisory Council. He currently serves the Microsoft Certified Trainer community as the MCT Regional Lead for Switzerland.