The two main Sing-ins methods in OAuth.

Sascha Peter Bajonczak
System Weakness
3 min readJan 27, 2022

--

Photo by Markus Spiske on Unsplash

Hi, first of all, this will not a simple how-to of how we implement authentication in our system. I will tell you something about my personal experience and novice power from my developer career ;). I focus this on Azure (for the screenshots), but it will apply to AWS and GCP too.

Different mechanism?

--

--