. . "That is, the user is redirected from the application they want to use to the identity provider, they sign-in, authorise the request and then are returned to the application." . .