Security Architecture Best Practices
How can you best implement the neo-security architecture? Learn about architecting APIs and identity to strengthen network and cloud security.
A security architecture covers the building blocks used to protect an enterprise's IT infrastructure. Implement a scalable future proof security architecture that allows you to approach the identity landscape for API driven systems the right way
Federation Requirements Introduced in FIPS 201-3
An overview of FIPS 201-3 and SP 800-C3, listing the requirements and explaining how OpenID Connect fits into the picture.
Privacy and GDPR Using OAuth
How to comply with privacy regulations and GDPR, using OAuth. Incorporate User Privacy Design in your organization's architecture to keep data safe and meet regulations.
Open Policy Agent: Integration Overview
What is Open Policy Agent (OPA) and how does it work? Find out how Curity's Identity Server and OPA can create strong user authentication.
Integrate Identity with Business Data
Protect business data with an Identity and Access Management System. In this article, we provide design choices and guide you through the integration process.
The Token Handler Pattern for Single Page Applications
Learn how the Token Handler design pattern strengthens the security of your Single Page Applications and improves user experience.
Zero Trust Architecture is a Token-Based Architecture
What is Zero Trust Architecture (ZTA), and why is it essential to implement Zero Trust Security to protect your resources? Build a Zero Trust Model.
Identity and Access Management Primer
Basic IAM concepts and practical advice on how best to implement Identity and Access Management for a small business.