Introduction to Authentication Protocols
AS404W : AS404W
This introductory course provides a foundational understanding of the most widely used authentication protocols in modern digital security and in SAS Viya too: OpenID Connect, OAuth, Kerberos, and SAML. Designed for beginners, it covers the essential concepts, components, and workflows behind each protocol, explaining how they enable secure access and identity verification in digital environments.
Learn How To
- Understand the details of Kerberos authentication protocol.
- Understand the details of OpenID Connect authentication protocol.
- Understand the details of SAML authentication protocol.
Who Should Attend
Students who want a deeper understanding of modern authentication protocols
Prerequisites
Before attending this course, you need only an interest in understanding different authentication protocols.
SAS Products Covered
SAS Viya
Course Outline
Kerberos Core Concepts
- Key terms.
- Key considerations.
- Kerberos components.
- Kerberos Phase 1 initial authentication.
- Kerberos Phase 2 authentication to a service.
- Kerberos delegated authentication.
- Kerberos Cross-Realm authentication.
- Kerberos prerequisites.
- Kerberos encryption mechanisms.
- Kerberos in Windows.
- Kerberos in Unix.
- MIT Kerberos.
- Kerberos KVNO.
- Constrained delegation key terms.
- Constrained delegation key considerations.
- S4U2SELF.
- S4U2PROXY.
- Constrained delegation requirements.
- Setting constrained delegation using the GUI.
- Setting constrained delegation using PowerShell.
- Resource-based constrained delegation settings.
- Examples.
- Key terms.
- Key considerations.
- OAuth 2.0 components.
- OpenID connect components.
- OAuth 2.0 authorization process.
- OpenID connect authentication process.
- OAuth 2.0 OpenID connect requirements.
- Protocol endpoints.
- Client registration.
- Client authentication.
- Token details.
- OAuth grant types.
- Claim details.
- Examples.
- Key terms.
- Key considerations.
- SAML 2.0 components.
- SAML 2.0 authentication process.
- SAML 2.0 requirements.
- SAML assertions details.
- SAML name identifier types details.
- SAML signing and encryption details.
- SAML AuthnRequest details.
- Detailed flow diagrams.
- SAML assertions specification.
- SAML protocol details.
Live Class Schedule
Duration: 4 hours
Step into our live classes and experience a dynamic learning environment where you can ask questions, share ideas, and connect with your instructor and classmates. With on-demand lab hours, you can explore the material at your own pace. Our globally acclaimed instructors will motivate you to think bigger, so you can take what you've learned and achieve your biggest goals.
This course isn't publicly scheduled, but private training and mentoring may be available. Contact us to explore options.
Private Training
Get training tailored specifically for your team, led by expert SAS instructors. Choose from virtual sessions, or training at your location (or ours). Perfect for teams seeking a customized curriculum and plenty of interaction with a SAS specialist. We'll schedule it at a time that works for you.
Mentoring Services
Take your training to the next level with personalized mentoring. While private training offers structured coursework, mentoring provides hands-on, real-time support from a subject matter expert. As you work with your own data, you'll receive expert guidance to help you uncover insights, unlock the full potential of your data, and make faster progress. Perfect for those looking to apply what they’ve learned and see quicker results.