Watch this video on YouTube
In which IAM model are applications configured to trust identity providers, and identity providers authenticate users using digital security tokens?