What's your topic? Learn about multi-factor authentication, SSO, OAuth, OpenID Connect, API security, identity architecture, and much more.
Discover different aspects of API Security and learn best practice approaches.
Claims & Scopes
Learn how claims and scopes can be used for standards-based authorization.
Discover different aspects of client security and learn best practice approaches.
A decentralized ecosystem for digital identification builds upon verifiable credentials and decentralized identifiers. In these articles, Curity experts share insights on different aspects of verifiable credentials and decentralized identities.
Guides on going beyond standard OAuth security and using financial grade options for the strongest security
Hypermedia Authentication API
Explore the Curity Hypermedia Authentication API
An introduction to multi-factor authentication. Resources offering multi-factor examples and approaches. Learn how to authenticate users with an MFA solution.
Explore OAuth 2.0. What is it and how can you best implement it?
Explore the OpenID Connect authorization framework. Learn about OpenID Connect vs. OAuth, OpenID Connect Code Flow, Dynamic Client Registration, and more.
Operation and Configuration
Designs for deploying and operating an identity server
What is Neo-Security Architecture? Learn about the terms, concepts and building blocks for a security design.
Security Architecture Best Practices
How can you best implement the neo-security architecture? Learn about architecting APIs and identity to strengthen network and cloud security.
What is Single Sign-On, when is it needed, and how does it work? In these articles, Curity experts share insights on different aspects of SSO and best practices for implementation.
Leveraging the standardized SCIM interface for user management