Celyse is working for a large social media company that wants to expand their offerings to their customers. They want to become an Identity Provider (IdP) that can verify the identification of their customers to other websites. Which of the following is an authentication protocol they would likely use?