▲ | BrenBarn 2 days ago | ||||||||||||||||
> No more typing your password in every client you’d like to log in to. So. . . how will we log in? This post is heavy on vague promises of greatness but light on concrete details of UX. | |||||||||||||||||
▲ | kuschku 2 days ago | parent | next [-] | ||||||||||||||||
If you use e.g., "Sign in with Google" today, you get redirected to your web browser, log in, and get redirected back to the client. This means you can use the saved passwords of your browser, and if already logged in there, you just have to click "continue" instead of logging in again. With MAS, every login works like that. If you click "sign in", instead of getting redirected to Google, you get redirected to the website of your homeserver, where you can login and authenticate before being redirected back to the client. The primary benefit of using a standard OIDC flow is that your authentication server can easily add support for passkeys, webauthn, TOTP or captchas, without having to wait for every single client to support these features. While matrix.org uses MAS for this, providing the same login features as it used to, your organization might want to use Keycloak to connect their homeserver directly to LDAP. | |||||||||||||||||
| |||||||||||||||||
▲ | palata 2 days ago | parent | prev | next [-] | ||||||||||||||||
> So. . . how will we log in? I think you will log into your server, and then the server will offer you to give access to the client. The screenshot right below the line you quote seems to show exactly that. | |||||||||||||||||
| |||||||||||||||||
▲ | halJordan 2 days ago | parent | prev [-] | ||||||||||||||||
Read the whole blog, and it directs you further for more details. But this blog does tell you they're moving to oidc. That means you will get all the non password flows oidc supports. This is a reading comprehension problem more than a blog writing problem |