From my understanding the difference from OAuth to OpenID Connect is that when the client hits /token endpoint of OAuth, OAuth responds with the following:
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-store
Pragma: no-cache
{
"access_token": "SlAV32hkKG",
"token_type": "Bearer",
"refresh_token": "8xLOxBtZp8",
"expires_in": 3600,
"id_token": "e134j23jk432j"
}
I was under the impression from reading documentation that the ID token contains an authentication type to denote if the user passed authorization by inputting a password. This would therefore verify the user did authenticate, not just authorize. I'm just not clear how the token is used to verify this.
It's my understanding the id_token isn't opaque to the client, so is there a standard way in which information is interpreted by the client?
Further, the documentation I found at http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html under 5. Definitions of Multiple-Valued Response Type Combinations
shows an example request for id_token being made to /authorize. Shouldn't id_token be obtained at /token?
verify the user did authenticate, not just authorize.
Whether password entered or not they were authenticated by the IdP. Nothing is being authorised – iandayman