• Overview
    • Authentication Service
    • Token Service
    • User Management Service
    • Configuration
    • Deployment
    • Conformance
    • Monitoring and Metrics
    • Alarms
    • Plans & pricing
    • Common Identity Platform
    • Identity for Government Solutions
    • Modernizing Infrastructure
    • Open Banking & Financial-Grade APIs
    • Protecting Health Care
    • Secure Financial Services
    • Secure Frictionless Authentication
    • Tech and SaaS Security
    • Zero Trust and Security Architecture
    • Resource Library
    • Getting Started
    • Articles
    • How-tos
    • Guides
    • Code Examples
    • Webinars
    • Documents
    • Videos
    • Courses
    • About
    • Customers
    • Partners
    • Careers
    • Events Calendar
    • Press
    • News
    • Blog
    • Developer Portal
    • Releases
    • Documentation
    • Libraries & SDKs
    • OAuth Tools
    • Ticket-based Support
    • Instant Message Support
    • Professional Services
    • Training
  • Contact
  • Search
NewsWhat are Decentralized Identifiers and Verifiable Credentials? - Read in our blog!
Curity logo
  • Contact
  • Search
  • Schedule a Demo
  • Start Free Trial
ArticlesGetting StartedHow-tosGuidesCode ExamplesDocumentationVideosWebinarsCoursesDocuments
What's newRSS

Learn by topics

  • Security Architecture Best Practices
    • Introducing the Neo-Security Architecture
    • Curity and the Neo-Security Architecture
    • What is an Identity Management System?
    • What is an API Management System?
    • Authentication vs. Authorization, What’s the Difference?
    • Identity and Access Management Primer
    • CIAM vs IAM: What's the Difference?
    • Integrate Identity with Business Data
    • Privacy and GDPR Using OAuth
    • Zero Trust Architecture is a Token-Based Architecture
    • The Token Handler Pattern for SPAs
    • What is an Entitlement Management System?
    • Open Policy Agent: Integration Overview
    • Federation Requirements Introduced in FIPS 201-3
    • Glossary of Identity Management Terms
  • Single Sign-On
    • Single Sign-On Introduction
    • What is a Single Sign-On Session? A Brief Overview
    • Using OpenID Connect for a Single Sign-On Solution in Web Clients
    • SSO for Mobile Apps with OpenID Connect
    • SSO and Authentication Methods
    • Administrative Management of SSO
    • Prompting for Login during SSO
    • SSO for Web with OpenID Connect
    • SSO for Mobile with OpenID Connect
  • Multi-Factor Authentication
    • Introduction to Multi-Factor Authentication
    • MFA and the Curity Identity Server
    • Multi-Factor Authentication | MFA Security
    • New Country vs. Changed Country, what's the difference?
    • The Impossible Journey Authentication Action
    • Using Geo-Location Data in the Authentication Process
    • An Overview of WebAuthn
    • Account Linking Recipes
  • Claims & Scopes
    • Scopes vs Claims
    • Centralizing Identity Data
    • Scopes, Claims and the Client
    • Introduction to Claims
    • Claims Explained
    • Using Claims in APIs
    • Introduction to Scopes
    • Introduction to OAuth Scopes
    • What is Claims Authority?
    • Consent and Claims
    • Scope Best Practices
    • Claims Best Practices
    • Implementing Claims Best Practices
    • Implementing the Vectors of Trust Method
  • OpenID Connect
    • OpenID Connect Overview
    • OpenID Connect Authorization Code Flow
    • Validating an OpenID Connect ID Token
    • Dynamic Client Registration Overview
    • Using Dynamic Client Registration
    • Dynamic Client Registration Authentication Methods
    • Dynamic Client Registration Management
    • OAuth and OIDC Request Objects
    • JWT Secured Authorization Response Mode (JARM)
    • Pairwise Pseudonymous Identifiers
    • OpenID Connect Hybrid Flow
    • OpenID Connect Standards
    • OpenID Connect Single Logout
    • Client Initiated Backchannel Authentication (CIBA)
    • Client Initiated Backchannel Authentication (CIBA) Flow
    • Encrypted ID Tokens
  • OAuth 2.0
    • OAuth Code Flow
    • Proof Key for Code Exchange Overview
    • Demonstration of Proof-of-Possession overview
    • OAuth Implicit Flow
    • OAuth Client Credentials Flow
    • OAuth Resource Owner Password Credentials Flow
    • OAuth Device Flow
    • OAuth Refresh
    • OAuth Revoke Flow
    • Mutual TLS Client Authentication
    • Mutual TLS Sender Constrained Access Tokens
    • Client Assertions and the JWKS URI
    • Pushed Authorization Requests (PAR)
    • Supported OAuth 2.0 RFCs
  • API Security
    • The API Security Maturity Model
    • API Security Best Practices
    • JWT Security Best Practices
    • Top 10 API Security Vulnerabilities According to OWASP
    • Implementing Zero Trust APIs
    • The Phantom Token Approach
    • The Split Token Approach
    • Self-contained JWTs
    • Token Sharing Approaches
    • Impersonation Approaches
    • JWT Signatures and EdDSA
    • Zero Trust API Events
  • Client Security
    • Best Practices - OAuth for Single Page Applications
    • Best Practices - OAuth for Mobile Apps
    • Token Handler Overview
    • Token Handler Deployment Patterns
    • Token Handler Development Setup
    • The Nonce Authenticator Pattern
  • Hypermedia Authentication API
    • What is Hypermedia Authentication API
    • Mobile Fallback Attestation
  • Financial Grade
    • What is Financial-Grade Security?
    • What is PSD2?
    • What is Open Banking?
    • Implement Financial-Grade Security
    • App2App Mobile Architecture
    • App2App Logins via Hypermedia Authentication API
    • Consentors in Financial-Grade
    • Open Banking Brazil DCR Request Validation
  • User Management
    • User Provisioning With SCIM
    • Managing Users With SCIM
  • Operation and Configuration
    • Using External IDPs
    • Multi-Region Deployment
    • Dynamic User Routing
    • Logging Best Practices
    • OAuth Troubleshooting for Developers
    • OAuth Troubleshooting for DevOps
    • IAM Configuration Best Practices

Learn more

  • Webinars
  • Documents
  • Videos
Financial Grade

Financial Grade

Guides on going beyond standard OAuth security and using financial grade options for strongest security

Guides on going beyond standard OAuth security and using financial grade options for strongest security

Open Banking Brazil DCR Request Validation

Open Banking Brazil DCR Request Validation

This article describes how to perform advanced validation of a Dynamic Client Registration request to comply with the requirements of Open Banking Brazil specifications.

Consentors in Financial-Grade

Consentors in Financial-Grade

A guide for using consentors to meet financial-grade requirements.

App2App Logins via Hypermedia Authentication API

App2App Logins via Hypermedia Authentication API

Tutorial of App2App authentication using the Hypermedia Authentication API

App2App Mobile Architecture

App2App Mobile Architecture

An architectural summary of the App2App authentication flow and how it can be used in an Open Banking setting.

How to Implement Financial-Grade Security

How to Implement Financial-Grade Security

Overview of the different OAuth 2.0 and OpenID standards and best practices for implementing financial-grade security.

What is Open Banking?

What is Open Banking?

What is Open Banking, and what are the security requirements to implement Open Banking solutions?

What is PSD2?

What is PSD2?

A brief summary of PSD2 and the security requirements and goals to comply with its regulations.

What is Financial-Grade Security?

What is Financial-Grade Security?

Best practices to deal with the main financial-grade security concerns and ensure your services and data are protected.

Videos

Financial Grade APIs Using OAuth and OpenID Connect
OAuth and OpenID Connect for PSD2 and Third-Party Access
Curity logo

info@curity.io

Get in touch

  • Nordic APIs
  • Nordic APIs
  • Nordic APIs
  • Nordic APIs
  • Nordic APIs
  • Pitchbook
  • Medium
  • Nordic APIs

Sign up for API Security Insights.

© Curity AB Terms of Service

Product

  • Product Overview
  • Authentication Service
  • Token Service
  • User Management Service
  • Community Edition
  • Product Plans
  • FAQ
  • Support

Solutions

  • Open Banking and Financial-grade APIs
  • Common Identity Platform
  • Zero Trust and Security Architecture
  • Secure Frictionless Authentication
  • Modernizing Infrastructure

Resources

  • Resource Library
  • What's New
  • Articles
  • Getting Started
  • How-tos
  • Code Examples
  • Webinars
  • Whitepapers
  • Documents
  • Videos
  • Courses
  • OAuth Tools

Company

  • About
  • Customers
  • Partners
  • Careers
  • Events Calendar
  • Press
  • News
  • Blog
  • Investor Relations