Topics of Interest
Learn about multi-factor authentication, SSO, OAuth, API security and much more, choose your topic of interest below.
- Introduction to Multi-Factor Authentication
- MFA and the Curity Identity Server
- Approaches to Multi-Factor Authentication
- New Country vs. Changed Country, What's the Difference?
- The Impossible Journey Authentication Action
- Using Geo-Location Data in the Authentication Process
- An Overview of WebAuthn
- What are Passkeys?
- OpenID Connect Overview
- Dynamic Client Registration Overview
- Dynamic Client Registration Authentication Methods
- Dynamic Client Registration Management
- OAuth and OIDC Request Objects
- JWT Secured Authorization Response Mode (JARM)
- Pairwise Pseudonymous Identifiers
- OpenID Connect Standards
- OpenID Connect Single Logout
- Client Initiated Backchannel Authentication (CIBA)
- Device Flow vs CIBA | Which Flow Should You Choose?
- Encrypted ID Tokens
- The API Security Maturity Model
- API Security Best Practices
- Concepts for Serving Identities in a Kubernetes Environment
- JWT Security Best Practices
- Top 10 API Security Vulnerabilities According to OWASP
- Implementing Zero Trust APIs
- The Phantom Token Approach
- The Split Token Approach
- Self-contained JWTs
- Token Sharing Approaches
- Impersonation Approaches
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.