The terms used by OpenID Connect may be strange to those used to SAML federations. The reverse is also true and for those new to either of them it can be an unexpected learning curve. This table should help.

OpedID ConnectSAMLEnglish
AuthenticationAuthenticationChecking user credentials. Done by the identity provider - e.g. library.
AuthorisationAuthorisationChecking user permissions. Done by the service provider - e.g. Journal.
Authorisation EndpointSSO address / endpointWhere the user should be sent for authentication
ClaimAttributeA defined bit of data about a user - e.g. a persistent ID
EndpointEndpointA URI where authentication or authorisation happens
IssuerEntityID

An identifier for the Identity Provider. In OIDC it is the root URI for the provider and has a practical use in the software.

In SAML it is a unique identifier that enables one entity to find another in aggregated metadata. It is usually in the form of a secure URI which may or may not have a real target.

Provider / OPIdentity Provider (IdP)The party that does the authentication - e.g. the library, university, hospital, legislative assembly
Redirect URIAssociation Consumer Service (ACS)Where at the relying party / service provider the user should be returned after they are authenticated  
Relying PartyService Provider (SP)The party that does the authorisation and provides the service being accessed
ScopeThe closest to this would be the attribute statement in the SAML response.In OIDC, a scope is a collection of related claims
UserInfo EndpointNo current equivilent in SAML. The closest would be the Attribute Authority that was used by old versions of SAML that were superseded in 2005.Where the relying party can obtain the user's attributes. In SAML2 the attributes are encrypted and sent via the browser.
Well known OpenID configurationA bit like IdP metadataA defined path to a JSON document where an OIDC relying party can discover information about the Provider

Metadata

An XML document that describes an entity (IdP or SP) in a SAML federation. Contains information such as endpoints, signing and encription certificates.

A federation will publish an aggregated set of all IdP and SP metadata.


SAMLSecurity Assertion Markup Language. You do not need to worry about the technical parts of this if you are using OpenAthens Cloud, but your customers will be used to the language it uses (see below).

ScopeIn SAML federations, a scope is an organisation identifier, most often in the form of an internet domain owned by the Identity Provider
TokenToken

In SAML, a token is the encrypted XML that is passed as a parameter in the user's browser. This could be the request or response depending on who is sending it.

In OIDC, a token is a time limited key issued by an identity provider to a relying party (content provider) which is then used to authorise the call the relying party makes to the identity provider to read any claims.