What's New
Recently published resources.
- ArticlesAPI Security Best Practices
- Code ExamplesAuthZEN Authorization Manager
- ArticlesWhat's Customer Identity and Access Management, and Why Does it Matter
- ArticlesHow Customer Identity Access Management Protects Data
- ArticlesPasskeys - Design your Solution
- ArticlesWhat are Passkeys?
- VideosShow Me Your Wallet to Tell Me Who You Are - Using Verifiable Credentials with OAuth
- VideosPanel Discussion: API Authorization
- VideosOAuth Well Played – Mods and Combos for the Cloud Native API Security Game
- VideosWho Needs That FAPI Thing, Anyway?
- VideosHow to Build a Fortress with the Security of a Tent
- VideosThe Swedish Chef Would Be Proud: Cooking up a Secure API in Minutes – Instructions Included
- ArticlesClaims Best Practices
- ArticlesScope Best Practices
- How-tosNGINX OAuth Proxy Module
- ArticlesSelective Disclosure for JWTs (SD-JWT)
- ArticlesOpenID Connect Overview
- ArticlesDevice Flow vs CIBA | Which Flow Should You Choose?
- How-tosAuthentication Overview
- How-tosOpenResty OAuth Proxy Plugin
- How-tosAuthentication Plugin Techniques
- VideosCurity Token Handler for Single Page Applications
- VideosDitch the Browser, Native API-Driven App Authentication with Passkeys
- VideosBrowserless OAuth Flows in Mobile Apps Using a Hypermedia API
- VideosAddressing Top API Security Risks
- VideosDecentralized Identities Changes Everything, Even Your APIs
- VideosMilitary-Grade Security for APIs
- VideosWhat is Decentralized Identity?
- VideosWhy Are We Talking about Decentralized Identity Now?
- VideosWhat Are Decentralized Identifiers and Verifiable Credentials?
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.