{"id":59704,"date":"2022-11-09T15:06:10","date_gmt":"2022-11-09T07:06:10","guid":{"rendered":"https:\/\/version-2.com\/?p=59704"},"modified":"2022-12-02T18:13:32","modified_gmt":"2022-12-02T10:13:32","slug":"federated-authentication-vs-delegated-authentication-whats-the-difference","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/11\/federated-authentication-vs-delegated-authentication-whats-the-difference\/","title":{"rendered":"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"59704\" class=\"elementor elementor-59704\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<article class=\"is-type-body-default is-important\"><p>The demand for web applications compelled tech vendors to adopt standards that allow authorized users to access resources, across domains, through a single set of credentials. That approach, called federated authentication, has simplified SaaS adoption. However, small and medium-sized enterprises (SMEs) still face barriers when they attempt to extend single sign-on (SSO) to all of their resources. Not every asset is an app, and IT teams struggle to set up access control throughout their entire infrastructure and often turn to complex or siloed systems.<\/p><p>Delegated authentication is a simpler approach that addresses the shortcomings of federated authentication by broadening the protocols (and resources) that your identities can interface with. This article explores both types of authentication in more detail and outlines how an open directory adds more value to your existing identity and access management (IAM) investments.<\/p><h2 id=\"heading1\">What Is Federated Authentication?<\/h2><p>One identity should log your users into all of their web apps.<\/p><h3>Overview<\/h3><p>Standards of federated authentication including <a href=\"https:\/\/jumpcloud.com\/blog\/saml-oauth\">OAuth<\/a>, <a href=\"https:\/\/jumpcloud.com\/blog\/saml-vs-openid\">OIDC<\/a>, and <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-saml\">SAML<\/a> make it possible for one identity provider (IdP) to manage <a href=\"https:\/\/jumpcloud.com\/blog\/difference-between-authorization-and-authentication\">access and authorization<\/a> into many service providers (SP). For instance, that\u2019s what happens when you log into a non-Google service with your Google Workspace credentials. Your credentials don\u2019t pass over the web and the IdP determines whether access is granted. SSO users are managed from a single directory, even if applications have unique entitlements.\u00a0<\/p><h3>Benefits and Drawbacks<\/h3><p>Federated authentication increases productivity, lowers management overhead, simplifies user lifecycle management, and increases security. There\u2019s fewer passwords to manage (assuming passwords are still required) and service providers don\u2019t store credentials. That has the benefit of reducing the risk of identities being compromised from third-party breaches. This form of authentication has given rise to entire ecosystems of cloud-native apps with seamless integrations that wouldn\u2019t have been possible without SSO. Those authentications are protected by other IdP security controls such as multi-factor authentication (MFA). Some IdPs are even adopting more user-friendly and secure passwordless solutions for frictionless access control.\u00a0<\/p><p>Entitlement management, through a directory and <a href=\"https:\/\/jumpcloud.com\/blog\/welcome-to-groups\">groups<\/a>, can enforce <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-least-privilege#:~:text=Least%20privilege%20is%20the%20concept,without%20interfering%20with%20their%20job.\">least privilege computing<\/a> to ensure that users don\u2019t become a risk. For example, JumpCloud automates group memberships by continually auditing attributes. The result is that IT admins remember to remove access when one of your team members changes his\/her role.<\/p><p>This approach to identity management is auditable and serves to satisfy <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-cloud-compliance\">cloud compliance requirements<\/a>. Your organization can more easily attest to its compliance by using SSO.<\/p><h4>Potential Lock-In<\/h4><p>The spirit of openness doesn\u2019t always survive a vendor\u2019s stack. Identity providers and service providers can diminish the intention and effectiveness of using open standards by introducing closed practices and roadblocks. IAM lock-in presents itself in the form of vendor-specific considerations such as integrations with proprietary APIs that are roadblocks to accessing data and features. Spending on development projects for APIs creates a higher cost of switching. Other roadblocks include requiring components and licensing to work with other systems.\u00a0<\/p><p>For example, Microsoft\u2019s approach to IAM can obligate organizations to adopt its extended stack including <a href=\"https:\/\/jumpcloud.com\/blog\/use-aad-authentication\">Azure Active Directory<\/a> (AAD), licensing <a href=\"https:\/\/jumpcloud.com\/blog\/microsoft-server-core-licensing-costs-more\">Windows Server<\/a>, in addition to either <a href=\"https:\/\/jumpcloud.com\/blog\/ad-ds\">Active Directory Domain Services<\/a> (AD DS), or <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-adfs\">Active Directory Federation Service<\/a> (AD FS) for users to access web apps. That\u2019s because Active Directory wasn\u2019t intended for the internet. Microsoft embraced open standards, but intertwined its monoculture with the IAM services it introduced.<\/p><h4>Hidden Costs<\/h4><p>Service providers may also upcharge for SSO, a practice that\u2019s dubbed the \u201c<a href=\"https:\/\/jumpcloud.com\/blog\/how-to-test-saml-and-configure-sso-for-free\">SSO Tax<\/a>.\u201d Interoperability is possible, but it comes at a higher cost per user. The SSO tax runs contrary to the spirit of open standards and may even compromise security if the MFA solution that your organization has implemented can\u2019t function <a href=\"https:\/\/jumpcloud.com\/platform\/multi-factor-authentication-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">environment-wide<\/a>. Some IdPs, such as Microsoft, restrict the number of apps your users can access without incurring additional charges. Always consider hidden costs and how subscriptions change over time before you select an IdP or service provider. A directory that provides true federated authentication should make it possible to assemble the optimal stack of services from the vendors of your choosing, without limits.<\/p><h4>Accessing Non-Web Apps<\/h4><p>SMEs commonly have resources that authenticate using <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-the-radius-protocol\">RADIUS<\/a> or LDAP, including VPNs or Wi-Fi networks. Identity and access management (IAM) suites strive to fill in the gaps when interoperability falls short, but not every solution works the same way. Operational overhead can vary dramatically, depending on the use case, and how those solutions are implemented.<\/p><p>Typically, this work is prerequisite:<\/p><ul><li>Installing and provisioning the server<\/li><li>Configuring policies<\/li><li>Managing user access to the RADIUS server<\/li><li>Ongoing maintenance of the server including updating and patching<\/li><\/ul><p>Without delegated authentication, SMEs must implement dedicated authentication tools that exist independently from IAM infrastructure, creating identity silos, and more work. Other interventions include configuring physical servers such as Microsoft Network Policy Server (NPS) or FreeRADIUS. These setups increase the cyberattack surface area in addition to overall management overhead and operational costs. It can also be cumbersome to integrate those services with your IdP, or a solution may lock you into a specific stack. <a href=\"https:\/\/jumpcloud.com\/blog\/radius-in-the-cloud\">Cloud RADIUS<\/a> is another option, but these solutions generally don\u2019t support authentication via an in-place IdP.<\/p><h3>Use Cases<\/h3><p>SSO protocols make many different scenarios possible.<\/p><ul><li>Mobile apps commonly deploy OIDC for SSO, because it\u2019s lightweight, and many of the facilities that developers use are pre-built or available from add-on libraries.<\/li><li>Most web apps have SAML built-in, providing an readily available method for federated authentication. IdPs provide pre-built connectors to streamline SSO connectivity. It is also ideal for accessing enterprise apps via a user portal.<\/li><li>OAuth 2.0 or OIDC extend federated identity to APIs and microservices architecture.<\/li><li>Enterprises sometimes favor SAML due to its capacity for customization and prioritization of secure data exchange.<\/li><\/ul><h2 id=\"heading2\">What Is Delegated Authentication?<\/h2><p>Your existing IdP credentials can be used to grant secure access beyond web apps.<\/p><h3>Overview<\/h3><p><a href=\"https:\/\/jumpcloud.com\/blog\/feature-bulletin-radius-auth-azure-ad\">Delegated authentication<\/a> is a standards-based approach (OAuth 2.0 and TLS) that securely brokers established policy and credentials from one IdP to services provided by an open directory. For example, AAD doesn\u2019t offer Cloud RADIUS, but AAD credentials can be leveraged through delegated authentication for seamless and appropriate access into network resources.<\/p><h3>Benefits and Drawbacks<\/h3><p>The primary benefit is maximizing your existing IAM infrastructure with an in-place IdP while minimizing the number of vendors and siloed solutions necessary to use RADIUS.\u00a0<\/p><p>There\u2019s very little technical overhead involved to use delegated authentication and non-centralized logins are eliminated. Delegated authentication reduces the need for IT involvement in RADIUS infrastructure, freeing resources to focus on <a href=\"https:\/\/jumpcloud.com\/blog\/how-to-use-an-it-priority-matrix\">higher priorities<\/a> that add business value. This also lowers the potential for security and operational failings through credential sharing and improves the user experience while enabling secure employee Wi-Fi access that segregates out undesirable traffic. Guests and vendors can access your network on a separate VLAN.<\/p><p>Technical constraints restrict authentications to a single factor, but additional security controls such as role-based access control can be layered on for a stronger posture. Group management permits you to achieve fine-grained control of Wi-Fi and VPN access based on established policy and identity settings. JumpCloud has plans to add device-level logins.<\/p><h3>Use Cases<\/h3><p>The primary use case is authentication for WAP2 Enterprise\/802.1x applications, switches, and networking appliances. No configuration is required on device endpoints, and there\u2019s no need for physical servers.<\/p><p><a href=\"https:\/\/youtu.be\/F5w9vte9h2U\" target=\"_blank\" rel=\"noreferrer noopener\">What Is Cloud RADIUS?<\/a><\/p><h2>Can Federated and Delegated Authentication Be Used Together?<\/h2><p>Federated authentication and delegated authentication are complementary IAM solutions that benefit SMEs that have standardized on IdPs that don\u2019t offer readily available RADIUS services.<\/p><figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-71024\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/10\/screenshpt.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/10\/screenshpt.png 512w, https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/10\/screenshpt-300x144.png 300w\" alt=\"screenshot of JumpCloud primary authentication\" width=\"512\" height=\"245\" \/><\/figure><h2>Try JumpCloud<\/h2><p>JumpCloud\u2019s open directory platform consumes identities from established IdPs such as AAD to grant convenient, secure, and appropriate access to RADIUS resources. The platform also provides identity management with environment-wide Push MFA, and LDAP, in addition to cross-OS unified device management. Conditional access rules, patching and password management are also <a href=\"https:\/\/jumpcloud.com\/pricing\" target=\"_blank\" rel=\"noreferrer noopener\">available as add-ons<\/a>. New accounts are <a href=\"https:\/\/console.jumpcloud.com\/signup?email=&amp;first_touch=Non-Paid&amp;first_touch_timestamp=2022-09-05T06:42:17.230Z&amp;jcsgmtuuid=3e98afb0-b055-44b0-b943-254a1f55d8f7\" target=\"_blank\" rel=\"noreferrer noopener\">fully functional and free<\/a> for up to 10 users\/devices. Complimentary chat support is available to help you get started.<br \/><br \/>Sometimes self-service doesn\u2019t get you everything you need. If that\u2019s how you\u2019re feeling, <a href=\"https:\/\/calendly.com\/jc-implementation\/free-one-time-30-min-consult\" target=\"_blank\" rel=\"noreferrer noopener\">schedule a 30-minute consultation<\/a> to discuss options for implementation assistance, migration services, custom scripting, and more.<\/p><div class=\"blog-post-tags m-t-2\"><ul class=\"blog-post-topics-list\"><li class=\"blog-post-topics-list-item\"><a class=\"blog-post-topics-list-link is-type-body-default is-important is-type-weight-semi-bold has-text-navy\" href=\"\/blog?topics=unification\">Unification<\/a><\/li><\/ul><ul class=\"blog-post-collections-list\"><li class=\"blog-post-collections-list-item\"><a class=\"blog-post-collections-list-link is-type-body-tiny is-type-weight-semi-bold is-important directory-services\" href=\"\/blog?collections=directory-services\">Directory Services<\/a><\/li><li class=\"blog-post-collections-list-item\"><a class=\"blog-post-collections-list-link is-type-body-tiny is-type-weight-semi-bold is-important user-access\" href=\"\/blog?collections=user-access\">User Access<\/a><\/li><\/ul><\/div><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"57539\" class=\"elementor elementor-57539\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About JumpCloud<\/strong><br \/>At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The demand for web applications compelled tech vendors  [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,1016,61],"tags":[489,1017],"class_list":["post-59704","post","type-post","status-publish","format-standard","hentry","category-488","category-jumpcloud","category-press-release","tag-489","tag-jumpcloud"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Federated Authentication vs. Delegated Authentication: What\u2019s the Difference? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference? - Version 2\" \/>\n<meta property=\"og:description\" content=\"The demand for web applications compelled tech vendors [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-09T07:06:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-02T10:13:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/10\/screenshpt.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/federated-authentication-vs-delegated-authentication#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/11\\\/federated-authentication-vs-delegated-authentication-whats-the-difference\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference?\",\"datePublished\":\"2022-11-09T07:06:10+00:00\",\"dateModified\":\"2022-12-02T10:13:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/11\\\/federated-authentication-vs-delegated-authentication-whats-the-difference\\\/\"},\"wordCount\":1382,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/federated-authentication-vs-delegated-authentication#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/screenshpt.png\",\"keywords\":[\"2022\",\"JumpCloud\"],\"articleSection\":[\"2022\",\"JumpCloud\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/11\\\/federated-authentication-vs-delegated-authentication-whats-the-difference\\\/\",\"url\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/federated-authentication-vs-delegated-authentication\",\"name\":\"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/federated-authentication-vs-delegated-authentication#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/federated-authentication-vs-delegated-authentication#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/screenshpt.png\",\"datePublished\":\"2022-11-09T07:06:10+00:00\",\"dateModified\":\"2022-12-02T10:13:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/federated-authentication-vs-delegated-authentication#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/federated-authentication-vs-delegated-authentication\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/federated-authentication-vs-delegated-authentication#primaryimage\",\"url\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/screenshpt.png\",\"contentUrl\":\"https:\\\/\\\/jumpcloud.com\\\/\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/screenshpt.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/federated-authentication-vs-delegated-authentication#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication","og_locale":"zh_HK","og_type":"article","og_title":"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference? - Version 2","og_description":"The demand for web applications compelled tech vendors [&hellip;]","og_url":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication","og_site_name":"Version 2","article_published_time":"2022-11-09T07:06:10+00:00","article_modified_time":"2022-12-02T10:13:32+00:00","og_image":[{"url":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/10\/screenshpt.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/11\/federated-authentication-vs-delegated-authentication-whats-the-difference\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference?","datePublished":"2022-11-09T07:06:10+00:00","dateModified":"2022-12-02T10:13:32+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/11\/federated-authentication-vs-delegated-authentication-whats-the-difference\/"},"wordCount":1382,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/10\/screenshpt.png","keywords":["2022","JumpCloud"],"articleSection":["2022","JumpCloud","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/11\/federated-authentication-vs-delegated-authentication-whats-the-difference\/","url":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication","name":"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/10\/screenshpt.png","datePublished":"2022-11-09T07:06:10+00:00","dateModified":"2022-12-02T10:13:32+00:00","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication#primaryimage","url":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/10\/screenshpt.png","contentUrl":"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/10\/screenshpt.png"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/federated-authentication-vs-delegated-authentication#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Federated Authentication vs. Delegated Authentication: What\u2019s the Difference?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fwY","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/59704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=59704"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/59704\/revisions"}],"predecessor-version":[{"id":59711,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/59704\/revisions\/59711"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=59704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=59704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=59704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}