Security Architecture Best Practices
What is Neo-Security Architecture and how can you best implement it? Learn about architecting APIs and identity to strengthen network and cloud security.
A security architecture should describe the security design and framework protecting an enterprise's IT infrastructure. Implement a scalable future proof security architecture that allows you to approach the identity landscape for API driven systems the right way
Federation Requirements Introduced in FIPS 201-3
This article provides an overview of FIPS 201-3 and SP 800-C3. It lists the requirements and explains how OpenID fits into the picture.
Privacy and GDPR Using OAuth
How to comply with privacy regulations and GDPR, using OAuth. Incorporate User Privacy Design in your organization's architecture to keep data safe and meet regulations.
Integrate Identity with Business Data
Protect business data with an Identity and Access Management System. In this article, we provide design choices and guide you through the integration process.
Identity and Access Management Primer
Basic IAM concepts and practical advice on how best to implement Identity and Access Management for a small business.
Glossary of Identity Management Terms
All the terminology of Identity Management and Neo-Security: Authentication, Authorization, Tokens, DCR, SCIM and more.
The Token Handler Pattern for Single Page Applications
Learn how the Token Handler design pattern strengthens the security of your Single Page Applications and improves user experience.
Zero Trust Architecture is a Token-Based Architecture
What is Zero Trust Architecture (ZTA), and why is it essential to implement Zero Trust Security to protect your resources? Build a Zero Trust Model.
What is an Entitlement Management System? A Brief Overview
What is an Entitlement Management System, what are the functions and what components does it include?
What is an API Management system? A Brief Overview
What is an API Management System, what does it do, and what services does it contain?
Open Policy Agent: Integration Overview
What is Open Policy Agent (OPA) and how does it work? Find out how Curity's Identity Server and OPA can create strong user authentication.
What is an Identity Management System?
An overview of the Identity Management System, and its main components: authentication service, token service, federation and user management service.
Curity and the Neo-Security Architecture
The Neo-Security Architecture is a modular security architecture. Learn how an Identity Management System like the Curity Identity Server fits in this adaptive security architecture.
Introducing the Neo-Security Architecture
Learn what the Neo-Security Architecture is and how it ensures easy integration, future scalability, API Security and secure identity management.