• Overview
    • Authentication Service
    • Token Service
    • User Management Service
    • Configuration
    • Deployment
    • Conformance
    • Monitoring and Metrics
    • Alarms
    • Plans & pricing
    • Common Identity Platform
    • Identity for Government Solutions
    • Modernizing Infrastructure
    • Open Banking & Financial-Grade APIs
    • Protecting Health Care
    • Secure Financial Services
    • Secure Frictionless Authentication
    • Tech and SaaS Security
    • Zero Trust and Security Architecture
    • Resource Library
    • Getting Started
    • Articles
    • How-tos
    • Guides
    • Code Examples
    • Webinars
    • Documents
    • Videos
    • Courses
    • About
    • Customers
    • Partners
    • Careers
    • Events Calendar
    • Press
    • News
    • Blog
    • Developer Portal
    • Releases
    • Documentation
    • Libraries & SDKs
    • OAuth Tools
    • Ticket-based Support
    • Instant Message Support
    • Professional Services
    • Training
  • Contact
  • Search
NewsWhat are Decentralized Identifiers and Verifiable Credentials? - Read in our blog!
Curity logo
  • Contact
  • Search
  • Schedule a Demo
  • Start Free Trial
ArticlesGetting StartedHow-tosGuidesCode ExamplesDocumentationVideosWebinarsCoursesDocuments
What's newRSS

How-tosHow-tos

  • Main Concepts
    • Keys, Certificates and Trust Stores
    • Endpoints and their URLs
    • Running in multi-tenant architecture
    • Control Authentication using Actions
    • DevOps Dashboard
    Authentication
    • Authenticate using Azure AD
    • Authenticate With Google Authenticator
    • How to Add Authentication Actions
    • Authentication Actions Example
    • Credential verification with Azure AD
    • Account Linking with Facebook
    • Account Creation After Login
    • Geo-Location Authenticator Filter
    • Scripted attribute transformation
    • Sign in with Apple
    • User Account Lockout
    • WebAuthn Authenticator
    • Preregister Devices in a WebAuthn Authenticator
    • Migrating to Passwordless
    • Opt-in Multi-Factor Authentication
    • Authenticate using Signicat
    • User behavior MFA using the BehavioSec Authenticator
    • Beyond Identity Integration using OIDC Authenticator
    • Federated Login to the Admin UI
    • SITHS Authentication With AD Attributes
    • Integrating with SAML Identity Providers
    • Using the Dynamic Authenticator
    OAuth & OpenID Connect
    • Code Flow
    • Implicit Flow
    • Hybrid Flow
    • Client Credentials Flow
    • Refresh Tokens
    • Revoking OAuth Tokens
    • Resource Owner Password Flow
    • User consent
    • Device Authorization Grant
    Advanced OAuth & OpenID Connect
    • Non-Templatized DCR
    • Configuring Proof Key for Code Exchange
    • Templatized DCR
    • Using PPIDs
    • Adding Claims from Authentication
    • JWT Assertions
    • Entitlements in Introspection
    • Running a CIBA Flow
    • OAuth Authorization with JWT Authorization Requests
    • Using Pushed Authorization Requests
    • Consuming responses with JARM
    • Custom Token Issuer
    • Custom DCR Request Validation
    • Implementing Impersonation
    • Using SAN to Authenticate an OAuth Client
    API Gateway Integration - Phantom Token
    • OAuth Introspection and Phantom Tokens
    • Integrating with Apigee Edge
    • Integrating with the AWS API Gateway
    • Integrating with Broadcom CA Layer7
    • Integrating with Kong OS
    • Integrating with Kubernetes Ingress controller
    • Integrating with Microsoft Azure API Management
    • Integrating with OpenResty
    • Integrating other API Gateways
    API Gateway Integration - Split Token
    • Integrating with Apigee Edge
    • Integrating with the AWS API Gateway
    • Integrating with the Cloudflare Gateway
    API Gateway Integration - Advanced
    • Cloud: User Routing
    • Cloudflare Gateway: Dynamic User Routing
    • Kong Enterprise: OpenID Connect Integration
    • Kong OS: API Authorization using Open Policy Agent
    • Kong OS: Dynamic User Routing
    • NGINX: Dynamic User Routing
    Application Integration
    • Apache mod_auth_openidc module
    • Curity as IdP in Salesforce
    • Curity as an IdP in Cloudflare
    • Integrating with Azure Active Directory
    • Setting up OIDC in MuleSoft Anypoint
    • Integrating with Kong Developer Portal
    • Integrating with the Jetty "openid" module
    • Tyk: Integrating with API Gateway Developer Portal using DCR
    Working with Users
    • DevOps Dashboard User Administration
    • User Management with SCIM
    • User Management with GraphQL
    • Authorizing Access to User Data
    • Scope Authorization Manager
    • Implementing Role Based Security
    • Email Activation When Using SCIM
    Deployment and Operation
    • Docker Container Customization
    • Exposing an Instance Using ngrok
    • Introduction to the CLI
    • Running in Cluster Mode
    • Clustering with Docker Compose
    • Automate Certificate Renewal
    • Testing the Curity Identity Server
    • Install on AWS using CloudFormation
    • AWS Deployment Overview
    • Azure Deployment Overview
    Advanced Deployment and Operation
    • Kubernetes Local Installation
    • Deploy to Google Kubernetes Engine (GKE)
    • Deploy to Elastic Kubernetes Service (EKS)
    • Deploy to Azure Kubernetes Service (AKS)
    • Deploy to an Istio Service Mesh
    • Kubernetes Auto Scaling
    • Encrypted Configuration using Helm
    • Configuration Backups and Logging using Helm
    • Integrating PKCS#11-based High Security Modules
    • GitOps Configuration Management
    • Implementing Dynamic User Routing
    • EKS: IAM Role for Service Accounts
    Migrations
    • Migrating from Spring Security OAuth
    • Migrating from Keycloak
    • Migrating from IdentityServer4
    Configuration
    • Using AD for Admin users
    • Curity Access Control Rules
    • Authorization Rules for the RESTCONF API
    • Token Designer Overview
    • EdDSA Signatures in Tokens
    • Working With Claims
    • Configuring Redirect URI Policies
    • Import and Export Configurations
    • Token Signing Key Rotation
    Logging and Monitoring
    • The Grafana Dashboard
    • Per-client Debug Logging
    • Log Aggegation to Splunk
    • Log Aggregation to Datadog
    • Log Aggregation to Elasticsearch
    • Health and Auto Healing
    • Integrate Alarms with Cloud Monitoring
    • Java Runtime Monitoring
    Customization
    • Design your Look and Feel
    • Fast Look and Feel Customization
    • Extended Look and Feel Customization
    • Custom Password Validation
    • Customizing User Consent
    Writing Clients
    • OIDC Client with mTLS
    • MITREid Connect Client Library
    • Handling Expired Sessions during Authentication
    • Mobile Setup with ngrok
    Writing Plugins
    • Getting Started with the Plugin SDK
    • Simple Authentication Action
    • Generic Consentor Plugin
    • Attaching a Remote Debugger
    How to Implement Hypermedia Authentication API
    • Authentication API demo client
    • Android SDK for the Authentication API
    • iOS SDK for the Authentication API
    • Implementing HAAPI Fallback

Learn more

  • Webinars
  • Documents
  • Videos
API Gateway Integration - Phantom Token

API Gateway Integration - Phantom Token

Learn how to integrate an API Gateway with the Curity Identity Server leveraging the Phantom Token Pattern.

OAuth Introspection and Phantom Tokens

OAuth Introspection and Phantom Tokens

A step-by-step tutorial describing how to configure the Curity Identity Server for Phantom Tokens

Integrating Curity Identity Server with Apigee Edge

Integrating Curity Identity Server with Apigee Edge

How to integrate the Curity Identity Server with Apigee, with API proxy policies

Integrating the Curity Identity Server with AWS API Gateway using the Phantom Token Pattern

Integrating the Curity Identity Server with AWS API Gateway using the Phantom Token Pattern

How to configure the Curity Identity Server to use the AWS Phantom Token Lambda Authorizer with the AWS API Gateway

Integrating With the Broadcom CA Layer7 API Gateway

Integrating With the Broadcom CA Layer7 API Gateway

How to configure integration between the Curity Identity Server and the Broadcom CA Layer7 API Gateway

Integrating with Kong Open Source

Integrating with Kong Open Source

Using Kong Open Source and LUA scripting to implement a phantom token plugin

Integrating Plugins with Kubernetes

Integrating Plugins with Kubernetes

Learn about the role of the Ingress controller resource in Kubernetes and how to configure it with the phantom-token plugin

Microsoft Azure API Management

Microsoft Azure API Management

How to configure integration with the Curity Identity Server and Microsoft Azure API Management

Integrating with OpenResty

Integrating with OpenResty

An end to end how-to for getting quickly set up with OpenResty and the Curity phantom token pattern

Integrating the Curity Identity Server with API Gateways using the Phantom Token Pattern

Integrating the Curity Identity Server with API Gateways using the Phantom Token Pattern

How to configure the Curity Identity Server to use an API Gateway and leverage the Phantom Token Pattern

Curity logo

info@curity.io

Get in touch

  • Nordic APIs
  • Nordic APIs
  • Nordic APIs
  • Nordic APIs
  • Nordic APIs
  • Pitchbook
  • Medium
  • Nordic APIs

Sign up for API Security Insights.

© Curity AB Terms of Service

Product

  • Product Overview
  • Authentication Service
  • Token Service
  • User Management Service
  • Community Edition
  • Product Plans
  • FAQ
  • Support

Solutions

  • Open Banking and Financial-grade APIs
  • Common Identity Platform
  • Zero Trust and Security Architecture
  • Secure Frictionless Authentication
  • Modernizing Infrastructure

Resources

  • Resource Library
  • What's New
  • Articles
  • Getting Started
  • How-tos
  • Code Examples
  • Webinars
  • Whitepapers
  • Documents
  • Videos
  • Courses
  • OAuth Tools

Company

  • About
  • Customers
  • Partners
  • Careers
  • Events Calendar
  • Press
  • News
  • Blog
  • Investor Relations