Welcome to the Curity Identity Server Docs
The Curity Identity Server is the central component in an end-to-end security architecture for users, applications and APIs. The docs explain how to install, configure, operate and deploy the Curity Identity Server.
Concepts
The Curity Identity Server provides multiple business benefits.
Productive Team Development
The Curity Identity Server implements many security standards that you use as policy. Development teams integrate APIs and applications, after which policies can evolve without code changes.
Secure Business Integrations
Security standards can extend business reach. APIs can grant controlled access to many types of clients, including AI agents. You can also integrate with external organizations in many ways.
Token Based Architecture
Your APIs and applications use a token-based architecture that ensures least-privilege access to business resources. The Curity Identity Server provided context to your APIs to enable the correct authorization.
Extensible Security
You can extend security behaviors in the key places, like user onboarding and login experiences. You can also integrate with other security ecosystems before events like token issuance.
Learn by Area
The docs are split into the following main sections.
Administration
The Administration Guide explains the various ways to manage security settings as policies.
System and Operation
The System and Operation Guide explains how to deploy the Curity Identity Server and operate it reliably.
Facilities
The Facilities Guide explains shared components, like data sources or event listeners, that you can use across multiple profiles.
Profiles
The Profile Guide explains the main security behaviors. The three base profiles are for user management, user authentication and token issuance.
Developer Guide
The Developer Guide explains how to extend login experiences or the invisible security behaviors, to enable non-trivial use cases.
Configuration Reference
The Configuration Reference explains all of the settings for security policies, including the more intricate options.
Learn by Use Case
In addition to docs, you can read many use-case based learning resources on the Curity website.
Getting Started
How to get up and running, then run flows to authenticate users and work with tokens.
Code Examples
How to integrate APIs and applications with the Curity Identity Server's endpoints
How-tos
Detailed walkthroughs on particular ways to configure or operate the Curity Identity Server.
Articles
Explainers on security standards and design patterns, to meet use cases for organizations.
Videos
Video tutorials to show what various working security solutions look like.
Webinars
Extended video sessions where Curity experts explain innovative ways to apply security.
Training Courses
In-depth training resources for administrators, operators and developers.
Documents
Detailed documents and whitepapers on security topics.
Blog
Stay up to date with the latest security insights from the Curity team.