WebinarHarden Data Security with Non-Human Identities - Register for webinar!
Curity logo
  • Contact us
  • Search
  • Schedule a Demo
  • Start Free Trial
ArticlesGetting StartedHow-tosGuidesCode ExamplesDocumentationVideosWebinarsCoursesTrainingDocuments
What's newRSS

Authentication and AuthorizationAuthentication and Authorization

  • Authentication
    • Authentication Overview
    • WebAuthn Authenticator
    • Passkeys Authenticator
    • Google Authenticator App
    • Handling Expired Sessions During Authentication
    • Manage User Account Lockout
    • Preregister Devices in a WebAuthn Authenticator
    • Geo-Location Authenticator Filter
  • Integration With Identity Providers
    • Identity Providers Overview
    • Authenticate Using Microsoft Entra ID
    • Authenticate Using Okta
    • Authenticate Using Sign in With Apple
    • Authenticate Using Beyond Identity
    • Authenticate Using Signicat
    • Authenticate Using BankID v6
    • Authenticate Using SITHS Authentication
    • Authenticate Using Norwegian BankID
    • Integrating with SAML Identity Providers
    • Using the Dynamic Authenticator
    • Credential Verification With Entra ID
  • Authentication Actions
    • Authentication Actions Concepts
    • MFA Using Authentication Actions
    • Opt-in Multi-Factor Authentication
    • Scripted Attribute Transformation
    • Authentication Actions Data Example
    • Action Bundles
    • Account Creation after Login
    • Account Linking With Social Identity Providers
    • Migrating to Passkeys
  • OAuth & OpenID Connect
    • Code Flow
    • Implicit Flow
    • Hybrid Flow
    • Client Credentials Flow
    • Refresh Tokens
    • Revoking OAuth Tokens
    • Resource Owner Password Flow
    • User Consent
    • Device Authorization Grant
  • Advanced OAuth & OpenID Connect
    • Configuring Proof Key for Code Exchange
    • Non-Templatized DCR
    • Templatized DCR
    • Custom DCR Request Validation
    • Using PPIDs
    • Entitlements in Introspection
    • JWT Assertions
    • Using JWT Authorization Requests
    • Using Pushed Authorization Requests
    • Consuming Responses with JARM
    • Running a CIBA Flow
    • Using SAN to Authenticate an OAuth Client
    • mTLS Client Credentials in a Service Mesh
  • Tokens and Claims
    • Token Designer Overview
    • Custom Token Issuer
    • Working With Claims
    • Adding Claims from Authentication
    • Implementing Custom Claims
    • Implementing Token Exchange
    • Verified Claims and Identity Assurance
    • EdDSA Signatures in Tokens
    • Implementing Impersonation
  • Decentralized Identities
    • Run Verifiable Credentials Demo Wallet
    • Issue a Verifiable Credential
    • VCI with Pre-authorized Code

OnboardingOnboarding

  • Configuration Management
    • Configuration Overview
    • Import and Export Configurations
    • Configure Deployed Environments
    • Introduction to the CLI
    • Keys, Certificates and Trust Stores
    • Automate Certificate Renewal
    • Configuration as Code
  • Data Management
    • Data Management Overview
    • Get Started with Identity Data
    • Get Connected to SQL Data Sources
    • Get Connected to NoSQL Data Sources
    • Multi-Region Dynamic User Routing
    • Multi-Tenant Architectures
  • Deployment
    • Docker Container Customization
    • Exposing an Instance Using ngrok
    • Running in Cluster Mode
    • Clustering with Docker Compose
    • Testing the Curity Identity Server
    • AWS Deployment Overview
    • Install on AWS using CloudFormation
    • Install on AWS using the CDK
    • Azure Deployment Overview
    • Upgrade Best Practices
  • Kubernetes
    • Configure Deployments using Helm
    • Expose OAuth Endpoints from Kubernetes
    • Use Kubernetes Data Storage
    • Use Kubernetes API Gateway Plugins
    • Deploy to Google Kubernetes Engine (GKE)
    • Deploy to Elastic Kubernetes Service (EKS)
    • Deploy to Azure Kubernetes Service (AKS)
    • Deploy to an Istio Service Mesh
    • Kubernetes Auto Scaling
    • Encrypted Configuration using Helm
    • Configuration Backups and Logging using Helm
    • IAM Role for Service Accounts
  • Migrations
    • Migrating from Spring Security OAuth
    • Migrating from Keycloak
    • Migrating from IdentityServer4

OperationOperation

  • Administration
    • Using AD for Admin UI Users
    • Federated Login to the Admin UI
    • DevOps Dashboard Overview
    • Token Signing Key Rotation
    • Curity Access Control Rules
    • Authorization Rules for the RESTCONF API
    • Configuring Redirect URI Policies
    • Using DKIM
    • Integrating PKCS#11-based High Security Modules
    • Endpoints and their URLs
  • Dashboard and API Access
    • User Management with SCIM
    • User Management with GraphQL
    • Database Client Management with GraphQL
    • Running the DevOps Dashboard
    • Scope Authorization Manager
    • Groups Authorization Manager
    • Attribute Authorization Manager
    • Implementing Role Based Security
    • Email Activation When Using SCIM
  • Branding and User Experience
    • Customization Overview
    • Fast Look and Feel Customization
    • Extended Look and Feel Customization
    • Single Brand Customization Example
    • Multi-Brand Customization Example
    • Email Customization Example
    • Custom Password Validation
    • Customizing User Consent
    • Right-to-Left Language Support
  • Logging and Monitoring
    • Logging and Monitoring Overview
    • The Grafana Dashboard
    • OpenTelemetry Tracing
    • Logging Best Practices
    • Customizing Auditing Logs
    • Debug Logging
    • Per-client Debug Logging
    • Log Aggregation to Splunk
    • Log Aggregation to Datadog
    • Log Aggregation to Elasticsearch
    • Health and Auto Healing
    • Integrate Alarms with Cloud Monitoring
    • Java Runtime Monitoring
    • How to Record a Browser Trace
  • Integrations
    • Apache mod_auth_openidc module
    • Curity as IdP in Salesforce
    • Curity as an IdP in Cloudflare
    • Integrating with Microsoft Entra ID
    • Setting up OIDC in MuleSoft Anypoint
    • Integrating with Kong Developer Portal
    • Integrating with Tyk Developer Portal
    • Integrating with the Jetty "openid" module
  • Writing Plugins
    • OAuth Customization using Scripting
    • OAuth Customization using Plugins
    • Getting Started with Authentication Plugins
    • Authentication Plugin Techniques
    • Simple Authentication Action
    • Generic Consentor Plugin
    • Attaching a Remote Debugger

API Gateway IntegrationAPI Gateway Integration

  • Phantom Token
    • Implementing the Phantom Token Approach
    • Integrating with NGINX
    • Integrating with Kong Enterprise
    • Integrating with Kong Open Source
    • Integrating with OpenResty
    • Integrating with Apigee Edge
    • Integrating with Microsoft Azure API Management
    • Integrating with the AWS API Gateway
    • Integrating with Broadcom CA Layer7
    • Integrating other API Gateways
    • Integrating with Zuplo
    • Integrating with Mulesoft Flex
  • Split Token
    • Integrating with Apigee Edge
    • Integrating with the AWS API Gateway
    • Integrating with the Cloudflare Gateway
  • OAuth Proxy
    • Integrating with Kong API Gateway
    • Integrating with OpenResty
    • Integrating with NGINX
    • Integrating with Azure API Management
    • Integrating with AWS API Gateway
    • Integrating with Google Apigee API Management
  • Advanced Integration
    • Dynamic User Routing with NGINX
    • Dynamic User Routing with Kong Open Source
    • Dynamic User Routing with Cloudflare Gateway
    • Dynamic User Routing with Cloud Platforms
    • API Authorization using Open Policy Agent and Kong
    • Open Banking Brazil DCR Request Validation

ApplicationsApplications

  • Single Page Applications
    • Create a Token Handler
  • HAAPI Configuration
    • Web Client HAAPI Setup
    • Android Client HAAPI Setup
    • iOS Client HAAPI Setup
    • Native Passkeys Configuration
  • HAAPI Mobile Guides
    • Android Integration
    • iOS Integration
    • Password Flows
    • Advanced Flows
    • Customize the Android Look and Feel
    • Customize the iOS Look and Feel
    • Advanced Login Customizations
    • App2App Logins using BankID
    • Security Lifecycle
    • Attestation Fallback

Learn MoreLearn more

  • Webinars
  • Documents
  • Videos
Branding and User Experience

Branding and User Experience

Learn how to customize and brand user facing behaviors, using the Curity Identity Server.

Look and Feel Customization Overview

Look and Feel Customization Overview

An overview of behavior when customizing login screens

Fast Look and Feel Customization with the Admin UI

Fast Look and Feel Customization with the Admin UI

Controlling the Look and Feel of the Curity Identity Server

Extended Look and Feel Customization with the UI Builder

Extended Look and Feel Customization with the UI Builder

Advanced Control over the Look and Feel of the Curity Identity Server

Single Brand Customization Example

Single Brand Customization Example

Example steps for creating a branded login screen

Multi-Brand Customization Example

Multi-Brand Customization Example

Example steps for creating distinct branded login screens per client application

Email Customization Example

Email Customization Example

Example steps for customizing the look and feel of email messages

How to Customize Password Validation

How to Customize Password Validation

Learn how to validate passwords in the backend and override the existing progress bar in the frontend.

Customizing User Consent

Customizing User Consent

Customizing look and feel for consent

Connect with a Global Audience with Right-to-Left Language Support

Connect with a Global Audience with Right-to-Left Language Support

Increase accessibility and improve usability with Curity's support for right-to-left languages like Arabic and Hebrew.

Next steps

Ready to modernize IAM?

Start Today - Build security and improve ease of use to stay ahead of the competition.

Free trial icon representing Start a free trial

Start a Free Trial

Calendar icon representing Schedule a demo

Schedule a demo

User with a computer icon representing Speak to an Identity Specialist

Speak to an Identity Specialist

Book icon representing Explore learning resources

Explore learning resources

footer lines
Curity logo

info@curity.io

Get in touch

  • X icon
  • LinkedIn icon
  • YouTube icon
  • Bluesky icon
  • GitHub icon
  • Subscribe to Curity's RSS Feeds icon
  • Medium icon
  • Nordic APIs icon
Sign up for API Security Insights.

© Curity AB Terms of Service

Product

  • Product Overview
  • Authentication Service
  • Token Service
  • User Management Service
  • Curity Token Handler
  • Authentication
  • Secure Acccess
  • User Journey Orchestration
  • Decentralized Identity
  • Extensibility and SDK:s
  • Identity Standards
  • Community Edition
  • Product Plans
  • FAQ
  • Support
  • Deployment
  • DevOps and Secops

Solutions

  • Overview
  • Common Identity Platform
  • Modernizing Infrastructure
  • Open Banking & Financial-Grade APIs
  • Secure Frictionless Authentication
  • Zero Trust and Security Architecture
  • Government
  • Healthcare
  • Telecom
  • Financial Services
  • Technology / SaaS

Resources

  • Resource Library
  • What's New
  • Articles
  • Getting Started
  • How-tos
  • Code Examples
  • Webinars
  • Whitepapers
  • Documents
  • Videos
  • Courses
  • OAuth Tools

Company

  • About
  • Customers
  • Partners
  • Blog
  • Careers
  • Events Calendar
  • ESG
  • News
  • Investor Relations
Security ScoreCardSOC 2 Type 1 Compliance
observatory: A+ (100/100)observatoryobservatoryA+ (100/100)A+ (100/100)
SSL: A+ SSL SSL A+ A+