In this blog post, Curity's experts delve into the OAuth and OpenID Connect adoption funnel, providing a micro-level view of the specifications.
With security becoming more sophisticated in recent years, implementing authentication workflows within applications is no longer viable.
This article offers advice on what to consider when starting your identity and access management (IAM) journey.
The OAuth family of specifications provides the best architecture capabilities and many advanced design patterns for managing security-related use cases.
With APIs becoming the most frequent attack vector of cybercrimes, it's now more important than ever to stay on top of API security trends.
How should you serve your access tokens: JWTs, phantom, or split?
What is digital identity, and what measures should one take to protect it most efficiently? Read the interview with Curity's CTO Jacob Ideskog.
If you're looking for a place to experiment, learn, and explore the inner workings of OAuth and OpenID Connect, check out our award-winning OAuth Tool.
If you are building an API, website, mobile app or API gateway integration, our guides can help you.
OAuth and OpenID Connect tokens are vital standards to help maintain a high level of security.
As the number of APIs grow, protecting them becomes increasingly difficult.
JWT Secured Authorization Response Mode (JARM) allows you to use signed and encrypted responses. But why introduce another encryption if there is TLS?
How ICA Gruppen consistently manages identities and app security in a very complex IT environment.
How do you protect people's integrity in a pandemic when you rely on private data being shared and accessible?
Thoughts on the current state of identity security and what developments it needs to go through.
Learn how the Zero-Trust Architecture approach is all about tight control access based on identity.
App2App login is a pattern that is driven heavily by the Open Banking implementations around the world.
Follow @curityio on Twitter
Subscribe for more content!