What's New
Recently published resources.
- ArticlesWhat is Partner Identity and Access Management (PIAM), and How Does it Relate to B2B?
- How-tosVerifiable Credentials in Wallets
- ArticlesDesign MCP Authorization for APIs
- Code ExamplesImplementing MCP Authorization for APIs
- ArticlesBest Practices - OAuth and XSS Prevention
- ArticlesMutual TLS Sender Constrained Access Tokens
- ArticlesMutual TLS Client Authentication
- VideosA Decade of Identity Innovation: Curity at 10
- ArticlesThe Split Token Approach
- ArticlesThe API Security Maturity Model
- How-tosNon-Templatized Dynamic Client Registration
- Code ExamplesSecuring a .NET API with JWTs
- ArticlesHarden API Access with Workload Identities
- ArticlesCIAM and API Security
- ArticlesOpenID Connect Hybrid Flow
- How-tosNGINX Phantom Token Module
- ArticlesBest Practices - OAuth for Mobile Apps
- ArticlesElevating API Security and Resilience with Token Patterns
- How-tosAdvanced Login Customizations for HAAPI Mobile Apps
- Code ExamplesKotlin Android App using HAAPI
- Code ExamplesSwift iOS App using HAAPI
- VideosHow to Build a Fortress with the Security of a Tent
- VideosWho Needs That FAPI Thing, Anyway?
- VideosPanel Discussion: API Authorization
- VideosThe Swedish Chef Would Be Proud: Cooking up a Secure API in Minutes – Instructions Included
- VideosOAuth Well Played – Mods and Combos for the Cloud Native API Security Game
- VideosShow Me Your Wallet to Tell Me Who You Are - Using Verifiable Credentials with OAuth
- VideosCurity Token Handler for Single Page Applications
- VideosDitch the Browser, Native API-Driven App Authentication with Passkeys
- VideosMilitary-Grade Security for APIs
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.