The concept of a zero trust architecture (ZTA) has been around for a while. However, in practice, zero trust implementations have been moving at a pretty slow pace.

The downside of this architecture is that it placed an incredible amount of trust in whoever was accessing the network and the network’s ability to appropriately control access to services and data.

In a zero trust architecture, the new perimeter hinges on identity.

OAuth and OpenID Connect (OIDC) are standards that enable a token-based architecture, a pattern that fits exceptionally well with a ZTA.

Related Articles