Administration
Learn how to restrict access to the Curity Identity Server and implement DevOps use cases.
![Using AD for Admin UI Users](/images/resources/howtos/using_ad_admin.png)
Using AD for Admin UI Users
How to configure Curity to use AD for Admin users to log in to the admin UI.
![Federated Login to the Admin UI](/images/resources/howtos/authentication/federated-admin-login/federated-login-admin-ui.png)
Federated Login to the Admin UI
How to configure Federated or Multi-Factor Login to the Admin UI.
![DevOps Dashboard Overview](/images/resources/howtos/devops-dashboard.png)
DevOps Dashboard Overview
The role of the DevOps dashboard in the Curity Identity Server
![Token Signing Key Rotation](/images/resources/howtos/token-signing-key-rotation.png)
Token Signing Key Rotation
How to quickly and safely update the token signing key, for JWTs issued to your applications
![Curity Access Control Rules](/images/resources/howtos/admin-access-rules.png)
Curity Access Control Rules
Access control rules and how to configure them using the admin UI
![Authorization Rules for the RESTCONF API](/images/resources/tutorials/configuration/authorization-rules-for-the-restconf-api.png)
Authorization Rules for the RESTCONF API
How to setup authorization rules for configuration access through RESTCONF
![Configuring Redirect URI Policies](/images/resources/howtos/configuration/redirect-uri-policies/redirect-uri-policies.png)
Configuring Redirect URI Policies
How-to work with Redirect URI Policies so that clients can use dynamic redirect URIs in OAuth flows.
![Using DKIM](/images/resources/howtos/configuration/dkim/title.png)
Using DKIM
Enable DKIM to avoid email spoofing
![Integrating PKCS#11-based High Security Modules](/images/resources/tutorials/deploy/tutorials-yubi-hsm.png)
Integrating PKCS#11-based High Security Modules
Tutorial describing how to integrate PKCS#11-based HSMs like YubiHSM with the Curity Identity Server
![Endpoints and their URLs](/images/resources/operate/tutorials/endpoints_and_url.png)
Endpoints and their URLs
The specifics of Endpoints in the Curity Identity Server
![Running the Curity Identity Server in a Multi-Tenant Architecture](/images/resources/howtos/concepts/multitenant-architecture.png)
Running the Curity Identity Server in a Multi-Tenant Architecture
The concepts of different levels of separation to achieve a multi-tenant architecture with the Curity Identity Server