Input-constrained browserless environments require a special OAuth recipe. In this article we describe authorization for an example living room streaming app, advocating for the new OAuth Device Flow for ultimate API security.| Nordic APIs
Passwords are extremely common but carry many problems. Here's how a hypermedia-driven state machine can bring passwordless authentication.| Nordic APIs
With the growing number of apps, the struggles of user provisioning is real. In this post we examine how the open standard SCIM aids the identity lifecycle.| Nordic APIs
Here's an introduction to OAuth 2.0 for beginners. Learn what OAuth accomplishes, common OAuth flows, and benefits it brings to API security.| Nordic APIs
Learn about the importance of FIDO2 and biometric authentication in enhancing security and user experiences for mobile and handheld devices.| Nordic APIs
These APIs from Auth0, Curity, SAASPAAS, and Microsoft can enable programmatic multi-factor authentication for apps, websites, and APIs.| Nordic APIs
Decentralized identity is set to make a big impact on how APIs are accessed and secured. We cover a relevant recent talk from Jacob Ideskog.| Nordic APIs