Security Architecture Best Practices
How can you best implement the neo-security architecture? Learn about architecting APIs and identity to strengthen network and cloud security.
A security architecture covers the building blocks used to protect an enterprise's IT infrastructure. Implement a scalable future proof security architecture that allows you to approach the identity landscape for API driven systems the right way

Federation Requirements Introduced in FIPS 201-3
An overview of FIPS 201-3 and SP 800-C3, listing the requirements and explaining how OpenID Connect fits into the picture.

Privacy and GDPR Using OAuth
How to comply with privacy regulations and GDPR, using OAuth. Incorporate User Privacy Design in your organization's architecture to keep data safe and meet regulations.

Open Policy Agent: Integration Overview
What is Open Policy Agent (OPA) and how does it work? Find out how Curity's Identity Server and OPA can create strong user authentication.

Integrate Identity with Business Data
Protect business data with an Identity and Access Management System. In this article, we provide design choices and guide you through the integration process

The Token Handler Pattern for Single Page Applications
Learn how to secure an SPA using an API-driven Backend for Frontend, for the best all-round architecture

Zero Trust Architecture is a Token-Based Architecture
What is Zero Trust Architecture (ZTA), and why is it essential to implement Zero Trust Security to protect your resources? Build a Zero Trust Model.

Identity and Access Management Primer
Basic IAM concepts and practical advice on how best to implement Identity and Access Management for any business.