• Overview
    • Authentication Service
    • Token Service
    • User Management Service
    • Configuration
    • Deployment
    • Conformance
    • Monitoring and Metrics
    • Alarms
    • Plans & pricing
    • Common Identity Platform
    • Identity for Government Solutions
    • Modernizing Infrastructure
    • Open Banking & Financial-Grade APIs
    • Protecting Health Care
    • Secure Financial Services
    • Secure Frictionless Authentication
    • Tech and SaaS Security
    • Zero Trust and Security Architecture
    • Resource Library
    • Getting Started
    • Articles
    • How-tos
    • Guides
    • Code Examples
    • Webinars
    • Documents
    • Videos
    • Courses
    • About
    • Customers
    • Partners
    • Careers
    • Events Calendar
    • Press
    • News
    • Blog
    • Developer Portal
    • Releases
    • Documentation
    • Libraries & SDKs
    • OAuth Tools
    • Ticket-based Support
    • Instant Message Support
    • Professional Services
    • Training
  • Contact
  • Search
NewsWhat are Decentralized Identifiers and Verifiable Credentials? - Read in our blog!
Curity logo
  • Contact
  • Search
  • Schedule a Demo
  • Start Free Trial
ArticlesGetting StartedHow-tosGuidesCode ExamplesDocumentationVideosWebinarsCoursesDocuments
What's newRSS

How-tosHow-tos

  • Main Concepts
    • Keys, Certificates and Trust Stores
    • Endpoints and their URLs
    • Running in multi-tenant architecture
    • Control Authentication using Actions
    • DevOps Dashboard
    Authentication
    • Authenticate using Azure AD
    • Authenticate With Google Authenticator
    • How to Add Authentication Actions
    • Authentication Actions Example
    • Credential verification with Azure AD
    • Account Linking with Facebook
    • Account Creation After Login
    • Geo-Location Authenticator Filter
    • Scripted attribute transformation
    • Sign in with Apple
    • User Account Lockout
    • WebAuthn Authenticator
    • Preregister Devices in a WebAuthn Authenticator
    • Migrating to Passwordless
    • Opt-in Multi-Factor Authentication
    • Authenticate using Signicat
    • User behavior MFA using the BehavioSec Authenticator
    • Beyond Identity Integration using OIDC Authenticator
    • Federated Login to the Admin UI
    • SITHS Authentication With AD Attributes
    • Integrating with SAML Identity Providers
    • Using the Dynamic Authenticator
    OAuth & OpenID Connect
    • Code Flow
    • Implicit Flow
    • Hybrid Flow
    • Client Credentials Flow
    • Refresh Tokens
    • Revoking OAuth Tokens
    • Resource Owner Password Flow
    • User consent
    • Device Authorization Grant
    Advanced OAuth & OpenID Connect
    • Non-Templatized DCR
    • Configuring Proof Key for Code Exchange
    • Templatized DCR
    • Using PPIDs
    • Adding Claims from Authentication
    • JWT Assertions
    • Entitlements in Introspection
    • Running a CIBA Flow
    • OAuth Authorization with JWT Authorization Requests
    • Using Pushed Authorization Requests
    • Consuming responses with JARM
    • Custom Token Issuer
    • Custom DCR Request Validation
    • Implementing Impersonation
    • Using SAN to Authenticate an OAuth Client
    API Gateway Integration - Phantom Token
    • OAuth Introspection and Phantom Tokens
    • Integrating with Apigee Edge
    • Integrating with the AWS API Gateway
    • Integrating with Broadcom CA Layer7
    • Integrating with Kong OS
    • Integrating with Kubernetes Ingress controller
    • Integrating with Microsoft Azure API Management
    • Integrating with OpenResty
    • Integrating other API Gateways
    API Gateway Integration - Split Token
    • Integrating with Apigee Edge
    • Integrating with the AWS API Gateway
    • Integrating with the Cloudflare Gateway
    API Gateway Integration - Advanced
    • Cloud: User Routing
    • Cloudflare Gateway: Dynamic User Routing
    • Kong Enterprise: OpenID Connect Integration
    • Kong OS: API Authorization using Open Policy Agent
    • Kong OS: Dynamic User Routing
    • NGINX: Dynamic User Routing
    Application Integration
    • Apache mod_auth_openidc module
    • Curity as IdP in Salesforce
    • Curity as an IdP in Cloudflare
    • Integrating with Azure Active Directory
    • Setting up OIDC in MuleSoft Anypoint
    • Integrating with Kong Developer Portal
    • Integrating with the Jetty "openid" module
    • Tyk: Integrating with API Gateway Developer Portal using DCR
    Working with Users
    • DevOps Dashboard User Administration
    • User Management with SCIM
    • User Management with GraphQL
    • Authorizing Access to User Data
    • Scope Authorization Manager
    • Implementing Role Based Security
    • Email Activation When Using SCIM
    Deployment and Operation
    • Docker Container Customization
    • Exposing an Instance Using ngrok
    • Introduction to the CLI
    • Running in Cluster Mode
    • Clustering with Docker Compose
    • Automate Certificate Renewal
    • Testing the Curity Identity Server
    • Install on AWS using CloudFormation
    • AWS Deployment Overview
    • Azure Deployment Overview
    Advanced Deployment and Operation
    • Kubernetes Local Installation
    • Deploy to Google Kubernetes Engine (GKE)
    • Deploy to Elastic Kubernetes Service (EKS)
    • Deploy to Azure Kubernetes Service (AKS)
    • Deploy to an Istio Service Mesh
    • Kubernetes Auto Scaling
    • Encrypted Configuration using Helm
    • Configuration Backups and Logging using Helm
    • Integrating PKCS#11-based High Security Modules
    • GitOps Configuration Management
    • Implementing Dynamic User Routing
    • EKS: IAM Role for Service Accounts
    Migrations
    • Migrating from Spring Security OAuth
    • Migrating from Keycloak
    • Migrating from IdentityServer4
    Configuration
    • Using AD for Admin users
    • Curity Access Control Rules
    • Authorization Rules for the RESTCONF API
    • Token Designer Overview
    • EdDSA Signatures in Tokens
    • Working With Claims
    • Configuring Redirect URI Policies
    • Import and Export Configurations
    • Token Signing Key Rotation
    Logging and Monitoring
    • The Grafana Dashboard
    • Per-client Debug Logging
    • Log Aggegation to Splunk
    • Log Aggregation to Datadog
    • Log Aggregation to Elasticsearch
    • Health and Auto Healing
    • Integrate Alarms with Cloud Monitoring
    • Java Runtime Monitoring
    Customization
    • Design your Look and Feel
    • Fast Look and Feel Customization
    • Extended Look and Feel Customization
    • Custom Password Validation
    • Customizing User Consent
    Writing Clients
    • OIDC Client with mTLS
    • MITREid Connect Client Library
    • Handling Expired Sessions during Authentication
    • Mobile Setup with ngrok
    Writing Plugins
    • Getting Started with the Plugin SDK
    • Simple Authentication Action
    • Generic Consentor Plugin
    • Attaching a Remote Debugger
    How to Implement Hypermedia Authentication API
    • Authentication API demo client
    • Android SDK for the Authentication API
    • iOS SDK for the Authentication API
    • Implementing HAAPI Fallback

Learn more

  • Webinars
  • Documents
  • Videos
Logging and Monitoring

Logging and Monitoring

Learn how to monitor system behavior after deployment by configuring various loggings and alarms.

The Grafana Dashboard for the Curity Identity Server

The Grafana Dashboard for the Curity Identity Server

A description of the features provided by the Grafana dashboard for the Curity Identity Server

Per-client Debug Logging in Production Environments

Per-client Debug Logging in Production Environments

Using log4j2 to filter and log requests based on the calling client.

Log Aggegation to Splunk

Log Aggegation to Splunk

How to configure logging to Splunk

Log Aggregation to Datadog

Log Aggregation to Datadog

How to configure logging to Datadog

Log Aggregation to Elasticsearch

Log Aggregation to Elasticsearch

How to configure logging to Elasticsearch

Health and Auto Healing

Health and Auto Healing

How to connect to the health endpoint and use it to maintain the desired state of the Curity Identity Server

Integrate Alarms with Cloud Monitoring

Integrate Alarms with Cloud Monitoring

Implementing a custom alarm handler to report temporary failures

Java Runtime Monitoring

Java Runtime Monitoring

Getting set up with Java Monitoring and Runtime Profiling

Curity logo

info@curity.io

Get in touch

  • Nordic APIs
  • Nordic APIs
  • Nordic APIs
  • Nordic APIs
  • Nordic APIs
  • Pitchbook
  • Medium
  • Nordic APIs

Sign up for API Security Insights.

© Curity AB Terms of Service

Product

  • Product Overview
  • Authentication Service
  • Token Service
  • User Management Service
  • Community Edition
  • Product Plans
  • FAQ
  • Support

Solutions

  • Open Banking and Financial-grade APIs
  • Common Identity Platform
  • Zero Trust and Security Architecture
  • Secure Frictionless Authentication
  • Modernizing Infrastructure

Resources

  • Resource Library
  • What's New
  • Articles
  • Getting Started
  • How-tos
  • Code Examples
  • Webinars
  • Whitepapers
  • Documents
  • Videos
  • Courses
  • OAuth Tools

Company

  • About
  • Customers
  • Partners
  • Careers
  • Events Calendar
  • Press
  • News
  • Blog
  • Investor Relations