Security Architecture Best Practices

Security Architecture Best Practices

What is Neo-Security Architecture and how can you best implement it? Learn about architecting APIs and identity to strengthen network and cloud security.

A security architecture should describe the security design and framework protecting an enterprise's IT infrastructure. Implement a scalable future proof security architecture that allows you to approach the identity landscape for API driven systems the right way

Federation Requirements Introduced in FIPS 201-3

Federation Requirements Introduced in FIPS 201-3

This article provides an overview of FIPS 201-3 and SP 800-C3. It lists the requirements and explains how OpenID fits into the picture.

Privacy and GDPR Using OAuth

Privacy and GDPR Using OAuth

How to comply with privacy regulations and GDPR, using OAuth. Incorporate User Privacy Design in your organization's architecture to keep data safe and meet regulations.

Integrate Identity with Business Data

Integrate Identity with Business Data

Protect business data with an Identity and Access Management System. In this article, we provide design choices and guide you through the integration process.

Identity and Access Management Primer

Identity and Access Management Primer

Basic IAM concepts and practical advice on how best to implement Identity and Access Management for a small business.

Glossary of Identity Management Terms

Glossary of Identity Management Terms

All the terminology of Identity Management and Neo-Security: Authentication, Authorization, Tokens, DCR, SCIM and more.

The Token Handler Pattern for Single Page Applications

The Token Handler Pattern for Single Page Applications

Learn how the Token Handler design pattern strengthens the security of your Single Page Applications and improves user experience.

Zero Trust Architecture is a Token-Based Architecture

Zero Trust Architecture is a Token-Based Architecture

What is Zero Trust Architecture (ZTA), and why is it essential to implement Zero Trust Security to protect your resources? Build a Zero Trust Model.

What is an Entitlement Management System? A Brief Overview

What is an Entitlement Management System? A Brief Overview

What is an Entitlement Management System, what are the functions and what components does it include?

What is an API Management system? A Brief Overview

What is an API Management system? A Brief Overview

What is an API Management System, what does it do, and what services does it contain?

Open Policy Agent: Integration Overview

Open Policy Agent: Integration Overview

What is Open Policy Agent (OPA) and how does it work? Find out how Curity's Identity Server and OPA can create strong user authentication.

What is an Identity Management System?

What is an Identity Management System?

An overview of the Identity Management System, and its main components: authentication service, token service, federation and user management service.

Curity and the Neo-Security Architecture

Curity and the Neo-Security Architecture

The Neo-Security Architecture is a modular security architecture. Learn how an Identity Management System like the Curity Identity Server fits in this adaptive security architecture.

Introducing the Neo-Security Architecture

Introducing the Neo-Security Architecture

Learn what the Neo-Security Architecture is and how it ensures easy integration, future scalability, API Security and secure identity management.