This article explores the management of multi-tenancy in an IAM system by looking into different multi-tenant strategies that can be used to secure identities.
Where to Deploy Your Customer Identity and Access Management
Decentralized Identifiers and Verifiable Credentials combined provide a promising new way of identity management.
Last week, some of us attended the OpenID Foundation’s OpenID Workshop and the Internet Identity Workshop (IIW) in San Francisco, California. Here are some of my key takeaways.
This article offers advice on what to consider when starting your identity and access management (IAM) journey.
Deciding the best way to modernize or scale up your Identity and Access Management and API security can be a difficult task. Here are some considerations.
The OAuth family of specifications provides the best architecture capabilities and many advanced design patterns for managing security-related use cases.
How should you serve your access tokens: JWTs, phantom, or split?
Best practices for SaaS companies to ensure the security of their solutions and empower their businesses.
What is digital identity, and what measures should one take to protect it most efficiently? Read the interview with Curity's CTO Jacob Ideskog.
Integrating an IdP responsible for user authentication with the Curity Identity Server allows organizations to reuse and extend existing solutions.
As the number of APIs grow, protecting them becomes increasingly difficult.
What are the factors that need to be considered when choosing a way to modernize your identity and access management infrastructure?
Modern businesses need to enable consistent, secure authentication experiences for end-users and provide access security to developer teams.
Curity has just had its sixth birthday. The company grew from a simple idea - to help software developers make secure and user-friendly access to applications a whole lot easier.
Follow @curityio on Twitter
Subscribe for more content!