Articles
Our articles offer insights on a range of topics such as identity and access management, Financial-grade and API security.
API Security Best Practices
Security tips to consider when designing and creating APIs.
What's Customer Identity and Access Management, and Why Does it Matter
Understand the main principles and benefits of customer identity and access management, and find out how it can be used by different industries.
How Customer Identity Access Management Protects Data
Understand how organizations can leverage CIAM systems to better protect their user's data.
Passkeys - Design your Solution
Passkeys technology support and design recommendations
What are Passkeys?
Passkeys offer a passwordless and convenient way to sign in to online accounts and services. They improve both security and user-experience of logins.
Claims Best Practices
Best practices for implementing claims. Learn how to issue custom claims step by step.
Scope Best Practices
Best practices for designing OAuth scopes in real world systems and managing them at scale. Discover how to perform API Authorization using Scopes.
Selective Disclosure for JWTs (SD-JWT)
Selective disclosure is the ability to select which data within a signed document to disclose to a counterpart compared to sharing all data at once. This article describes SD-JWT, a format that allows for selectively disclosing parts of a signed JWT.
OpenID Connect Overview
OpenID Connect explained: what it is and what benefits does it offer. How does it compare with OAuth2 and SAML?
Device Flow vs CIBA | Which Flow Should You Choose?
Which Flow Should You Choose, the OAuth Device Authorization Grant or OpenID Client Initiated Back-Channel Authentication?
Token Handler Design Overview
A design overview of the key behavior when using the token handler pattern
Demonstrating Proof of Possession Overview
What is Demonstrating Proof of Possession (DPoP), and how can it be used to improve the security of public clients.
JWT Security Best Practices
Best practices for using JTWs in applications. Learn about JWTs as access tokens, which algorithms to use, when to validate the token and other useful tips.
Token Handler Deployment Patterns
Design patterns for deploying an API-driven backend for front-end Single Page Applications
Token Sharing Approaches
Learn about the different ways in which access tokens can be shared.
OAuth Client Credentials Flow
The OAuth Client Credentials Flow Explained.
OAuth Implicit Flow | Curity
The OAuth Implicit flow explained.
What is an API Management System?
What is an API Management System, what does it do, and what services does it contain?
What is an Identity Management System?
An overview of the Identity Management System, and its main components: authentication service, token service, federation and user management service.
Best Practices - OAuth for Single Page Applications
Single Page Applications (SPAs) are different from regular web applications, requiring further security measures. Learn how to use OAuth to secure SPAs.
Topics
Join our Newsletter
Get the latest on identity management, API Security and authentication straight to your inbox.
Start Free Trial
Try the Curity Identity Server for Free. Get up and running in 10 minutes.
Start Free Trial