WebinarHarden Data Security with Non-Human Identities - Register for webinar!
Curity logo
  • Contact us
  • Search
  • Schedule a Demo
  • Start Free Trial
ArticlesGetting StartedHow-tosGuidesCode ExamplesDocumentationVideosWebinarsCoursesTrainingDocuments
What's newRSS

Authentication and AuthorizationAuthentication and Authorization

  • Authentication
    • Authentication Overview
    • WebAuthn Authenticator
    • Passkeys Authenticator
    • Google Authenticator App
    • Handling Expired Sessions During Authentication
    • Manage User Account Lockout
    • Preregister Devices in a WebAuthn Authenticator
    • Geo-Location Authenticator Filter
  • Integration With Identity Providers
    • Identity Providers Overview
    • Authenticate Using Microsoft Entra ID
    • Authenticate Using Okta
    • Authenticate Using Sign in With Apple
    • Authenticate Using Beyond Identity
    • Authenticate Using Signicat
    • Authenticate Using BankID v6
    • Authenticate Using SITHS Authentication
    • Authenticate Using Norwegian BankID
    • Integrating with SAML Identity Providers
    • Using the Dynamic Authenticator
    • Credential Verification With Entra ID
  • Authentication Actions
    • Authentication Actions Concepts
    • MFA Using Authentication Actions
    • Opt-in Multi-Factor Authentication
    • Scripted Attribute Transformation
    • Authentication Actions Data Example
    • Action Bundles
    • Account Creation after Login
    • Account Linking With Social Identity Providers
    • Migrating to Passkeys
  • OAuth & OpenID Connect
    • Code Flow
    • Implicit Flow
    • Hybrid Flow
    • Client Credentials Flow
    • Refresh Tokens
    • Revoking OAuth Tokens
    • Resource Owner Password Flow
    • User Consent
    • Device Authorization Grant
  • Advanced OAuth & OpenID Connect
    • Configuring Proof Key for Code Exchange
    • Non-Templatized DCR
    • Templatized DCR
    • Custom DCR Request Validation
    • Using PPIDs
    • Entitlements in Introspection
    • JWT Assertions
    • Using JWT Authorization Requests
    • Using Pushed Authorization Requests
    • Consuming Responses with JARM
    • Running a CIBA Flow
    • Using SAN to Authenticate an OAuth Client
    • mTLS Client Credentials in a Service Mesh
  • Tokens and Claims
    • Token Designer Overview
    • Custom Token Issuer
    • Working With Claims
    • Adding Claims from Authentication
    • Implementing Custom Claims
    • Implementing Token Exchange
    • Verified Claims and Identity Assurance
    • EdDSA Signatures in Tokens
    • Implementing Impersonation
  • Decentralized Identities
    • Run Verifiable Credentials Demo Wallet
    • Issue a Verifiable Credential
    • VCI with Pre-authorized Code

OnboardingOnboarding

  • Configuration Management
    • Configuration Overview
    • Import and Export Configurations
    • Configure Deployed Environments
    • Introduction to the CLI
    • Keys, Certificates and Trust Stores
    • Automate Certificate Renewal
    • Configuration as Code
  • Data Management
    • Data Management Overview
    • Get Started with Identity Data
    • Get Connected to SQL Data Sources
    • Get Connected to NoSQL Data Sources
    • Multi-Region Dynamic User Routing
    • Multi-Tenant Architectures
  • Deployment
    • Docker Container Customization
    • Exposing an Instance Using ngrok
    • Running in Cluster Mode
    • Clustering with Docker Compose
    • Testing the Curity Identity Server
    • AWS Deployment Overview
    • Install on AWS using CloudFormation
    • Install on AWS using the CDK
    • Azure Deployment Overview
    • Upgrade Best Practices
  • Kubernetes
    • Configure Deployments using Helm
    • Expose OAuth Endpoints from Kubernetes
    • Use Kubernetes Data Storage
    • Use Kubernetes API Gateway Plugins
    • Deploy to Google Kubernetes Engine (GKE)
    • Deploy to Elastic Kubernetes Service (EKS)
    • Deploy to Azure Kubernetes Service (AKS)
    • Deploy to an Istio Service Mesh
    • Kubernetes Auto Scaling
    • Encrypted Configuration using Helm
    • Configuration Backups and Logging using Helm
    • IAM Role for Service Accounts
  • Migrations
    • Migrating from Spring Security OAuth
    • Migrating from Keycloak
    • Migrating from IdentityServer4

OperationOperation

  • Administration
    • Using AD for Admin UI Users
    • Federated Login to the Admin UI
    • DevOps Dashboard Overview
    • Token Signing Key Rotation
    • Curity Access Control Rules
    • Authorization Rules for the RESTCONF API
    • Configuring Redirect URI Policies
    • Using DKIM
    • Integrating PKCS#11-based High Security Modules
    • Endpoints and their URLs
  • Dashboard and API Access
    • User Management with SCIM
    • User Management with GraphQL
    • Database Client Management with GraphQL
    • Running the DevOps Dashboard
    • Scope Authorization Manager
    • Groups Authorization Manager
    • Attribute Authorization Manager
    • Implementing Role Based Security
    • Email Activation When Using SCIM
  • Branding and User Experience
    • Customization Overview
    • Fast Look and Feel Customization
    • Extended Look and Feel Customization
    • Single Brand Customization Example
    • Multi-Brand Customization Example
    • Email Customization Example
    • Custom Password Validation
    • Customizing User Consent
    • Right-to-Left Language Support
  • Logging and Monitoring
    • Logging and Monitoring Overview
    • The Grafana Dashboard
    • OpenTelemetry Tracing
    • Logging Best Practices
    • Customizing Auditing Logs
    • Debug Logging
    • Per-client Debug Logging
    • Log Aggregation to Splunk
    • Log Aggregation to Datadog
    • Log Aggregation to Elasticsearch
    • Health and Auto Healing
    • Integrate Alarms with Cloud Monitoring
    • Java Runtime Monitoring
    • How to Record a Browser Trace
  • Integrations
    • Apache mod_auth_openidc module
    • Curity as IdP in Salesforce
    • Curity as an IdP in Cloudflare
    • Integrating with Microsoft Entra ID
    • Setting up OIDC in MuleSoft Anypoint
    • Integrating with Kong Developer Portal
    • Integrating with Tyk Developer Portal
    • Integrating with the Jetty "openid" module
  • Writing Plugins
    • OAuth Customization using Scripting
    • OAuth Customization using Plugins
    • Getting Started with Authentication Plugins
    • Authentication Plugin Techniques
    • Simple Authentication Action
    • Generic Consentor Plugin
    • Attaching a Remote Debugger

API Gateway IntegrationAPI Gateway Integration

  • Phantom Token
    • Implementing the Phantom Token Approach
    • Integrating with NGINX
    • Integrating with Kong Enterprise
    • Integrating with Kong Open Source
    • Integrating with OpenResty
    • Integrating with Apigee Edge
    • Integrating with Microsoft Azure API Management
    • Integrating with the AWS API Gateway
    • Integrating with Broadcom CA Layer7
    • Integrating other API Gateways
    • Integrating with Zuplo
    • Integrating with Mulesoft Flex
  • Split Token
    • Integrating with Apigee Edge
    • Integrating with the AWS API Gateway
    • Integrating with the Cloudflare Gateway
  • OAuth Proxy
    • Integrating with Kong API Gateway
    • Integrating with OpenResty
    • Integrating with NGINX
    • Integrating with Azure API Management
    • Integrating with AWS API Gateway
    • Integrating with Google Apigee API Management
  • Advanced Integration
    • Dynamic User Routing with NGINX
    • Dynamic User Routing with Kong Open Source
    • Dynamic User Routing with Cloudflare Gateway
    • Dynamic User Routing with Cloud Platforms
    • API Authorization using Open Policy Agent and Kong
    • Open Banking Brazil DCR Request Validation

ApplicationsApplications

  • Single Page Applications
    • Create a Token Handler
  • HAAPI Configuration
    • Web Client HAAPI Setup
    • Android Client HAAPI Setup
    • iOS Client HAAPI Setup
    • Native Passkeys Configuration
  • HAAPI Mobile Guides
    • Android Integration
    • iOS Integration
    • Password Flows
    • Advanced Flows
    • Customize the Android Look and Feel
    • Customize the iOS Look and Feel
    • Advanced Login Customizations
    • App2App Logins using BankID
    • Security Lifecycle
    • Attestation Fallback

Learn MoreLearn more

  • Webinars
  • Documents
  • Videos

How-tos

Recipes for working with the Curity Identity Server.

How-tos
Advanced Login Customizations for HAAPI Mobile Apps

Advanced Login Customizations for HAAPI Mobile Apps

April 17, 2025

Take control over login behavior using SDK extensibility features

Latest

  • Upgrade Best Practices

    Upgrade Best Practices

    April 10, 2025
  • Implementing HAAPI Attestation Fallback

    Implementing HAAPI Attestation Fallback

    April 10, 2025
  • Integrating with the Mulesoft Flex API Gateway

    Integrating with the Mulesoft Flex API Gateway

    April 8, 2025
  • Resource Owner Password Flow

    Resource Owner Password Flow

    April 4, 2025
  • Data Management Overview

    Data Management Overview

    March 31, 2025
  • Get Started with Identity Data

    Get Started with Identity Data

    March 28, 2025
  • Get Connected to NoSQL Data Sources

    Get Connected to NoSQL Data Sources

    March 28, 2025
  • Get Connected to SQL Data Sources

    Get Connected to SQL Data Sources

    March 28, 2025
  • Implementing the Phantom Token Approach Using OAuth Introspection

    Implementing the Phantom Token Approach Using OAuth Introspection

    March 17, 2025
  • Logging Best Practices

    Logging Best Practices

    March 13, 2025

Popular

  • Implementing HAAPI Attestation Fallback

    Implementing HAAPI Attestation Fallback

    April 10, 2025
  • Resource Owner Password Flow

    Resource Owner Password Flow

    April 4, 2025
  • Implementing the Phantom Token Approach Using OAuth Introspection

    Implementing the Phantom Token Approach Using OAuth Introspection

    March 17, 2025
  • Logging Best Practices

    Logging Best Practices

    March 13, 2025
  • Log Aggregation to Elasticsearch

    Log Aggregation to Elasticsearch

    March 12, 2025
  • Manage User Account Lockout

    Manage User Account Lockout

    March 4, 2025
  • OpenTelemetry Tracing

    OpenTelemetry Tracing

    February 17, 2025
  • Configure Deployments using Helm

    Configure Deployments using Helm

    February 14, 2025
  • Use Kubernetes API Gateway Plugins

    Use Kubernetes API Gateway Plugins

    February 13, 2025
  • Configuration as Code

    Configuration as Code

    February 12, 2025
Newsletter

Join our Newsletter

Get the latest on identity management, API Security and authentication straight to your inbox.

Newsletter

Start Free Trial

Try the Curity Identity Server for Free. Get up and running in 10 minutes.

Start Free Trial

Next steps

Ready to modernize IAM?

Start Today - Build security and improve ease of use to stay ahead of the competition.

Free trial icon representing Start a free trial

Start a Free Trial

Calendar icon representing Schedule a demo

Schedule a demo

User with a computer icon representing Speak to an Identity Specialist

Speak to an Identity Specialist

Book icon representing Explore learning resources

Explore learning resources

footer lines
Curity logo

info@curity.io

Get in touch

  • X icon
  • LinkedIn icon
  • YouTube icon
  • Bluesky icon
  • GitHub icon
  • Subscribe to Curity's RSS Feeds icon
  • Medium icon
  • Nordic APIs icon
Sign up for API Security Insights.

© Curity AB Terms of Service

Product

  • Product Overview
  • Authentication Service
  • Token Service
  • User Management Service
  • Curity Token Handler
  • Authentication
  • Secure Acccess
  • User Journey Orchestration
  • Decentralized Identity
  • Extensibility and SDK:s
  • Identity Standards
  • Community Edition
  • Product Plans
  • FAQ
  • Support
  • Deployment
  • DevOps and Secops

Solutions

  • Overview
  • Common Identity Platform
  • Modernizing Infrastructure
  • Open Banking & Financial-Grade APIs
  • Secure Frictionless Authentication
  • Zero Trust and Security Architecture
  • Government
  • Healthcare
  • Telecom
  • Financial Services
  • Technology / SaaS

Resources

  • Resource Library
  • What's New
  • Articles
  • Getting Started
  • How-tos
  • Code Examples
  • Webinars
  • Whitepapers
  • Documents
  • Videos
  • Courses
  • OAuth Tools

Company

  • About
  • Customers
  • Partners
  • Blog
  • Careers
  • Events Calendar
  • ESG
  • News
  • Investor Relations
Security ScoreCardSOC 2 Type 1 Compliance
observatory: A+ (100/100)observatoryobservatoryA+ (100/100)A+ (100/100)
SSL: A+ SSL SSL A+ A+