First, the protocol was introduced using analogies with real situations. In addition, use cases for this protocol and possible applications in our environment were detailed.
Later, the two main use flows were discussed: Client-side flow and Server-side flow. For both, the diagram of the token generation process was presented, as well as its characteristics.
Finally, OpenID Connect was introduced and security measures to be taken into account were discussed.