What's New
Recently published resources.
- ArticlesClaims Best Practices
- ArticlesScope Best Practices
- How-tosNGINX OAuth Proxy Module
- ArticlesSelective Disclosure for JWTs (SD-JWT)
- ArticlesOpenID Connect Overview
- ArticlesDevice Flow vs CIBA | Which Flow Should You Choose?
- How-tosAuthentication Overview
- How-tosOpenResty OAuth Proxy Plugin
- How-tosAuthentication Plugin Techniques
- How-tosGetting Started with Authentication Plugins
- ArticlesToken Handler Design Overview
- Code ExamplesExchange Opaque Token to JWT
- ArticlesDemonstrating Proof of Possession Overview
- ArticlesJWT Security Best Practices
- How-tosIntegration With Identity Providers Overview
- How-tosConfigure Deployed Environments
- How-tosConfiguration Overview
- VideosCurity Token Handler for Single Page Applications
- Code ExamplesSPA using Token Handler
- How-tosCreate a Token Handler
- ArticlesToken Handler Deployment Patterns
- VideosDitch the Browser, Native API-Driven App Authentication with Passkeys
- VideosBrowserless OAuth Flows in Mobile Apps Using a Hypermedia API
- VideosAddressing Top API Security Risks
- VideosDecentralized Identities Changes Everything, Even Your APIs
- VideosMilitary-Grade Security for APIs
- VideosWhat is Decentralized Identity?
- VideosWhy Are We Talking about Decentralized Identity Now?
- VideosWhat Are Decentralized Identifiers and Verifiable Credentials?
- VideosHow Will the Shift To Decentralized Identity Affect the Digital Identity Space?
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.