The sample application that we are going to build is very similar to the one that we created at the start of Chapter 3, Authentication Using SAML, LDAP, and OAuth/OIDC. Many aspects are similar but differ in a subtle manner. Each step will be explained; however, at times we won't go into details as we have seen some aspects in earlier samples.