One token to rule them all, one token to find them, One token to bring them all, and in the cluster spawn them (I meant the pods.).
“Shire… Baggins!”, the only two words that poor, tortured Gollum could whisper-scream, yet they were enough to reveal the identity of the ring bearer.
Likewise, “Email… Groups…”, the claims carried in an ID token — are all the Relying Party needs to recognize who you are and what you’re allowed to do.Let’s see how.
👉 Not a Medium member? You can read it here.
In the world of authentication, tokens fall into two categories:
- Server-dependent
- Self-Contained
Think of an opaque token like a barcode on a wristband at an amusement park.