The OAuth 2.0 authorization framework enables a third-party| www.rfc-editor.org
Most APIs today have moved beyond HTTP Basic Auth and API Keys. Here's why OAuth 2.0 is necessary for secure authorization.| Nordic APIs
Design patterns to allow JWTs to be validated using extended header fields and Public Key Infrastructure.| curity.io
What is Mutual TLS, and how does Client Authentication with Mutual TLS work?| curity.io
Protecting APIs with strong security by requiring clients to authenticate using JWT client assertions| curity.io
An enterprise has many clients that require data of a user's identity. How can the claims infrastructure be used to sustain all parts of an organization?| curity.io
The Curity Identity Server is an API Security solution that brings identity and API access management together.| curity.io
A brief introduction to Single Sign-On. Read about the benefits of SSO and how it can be used with OpenID Connect to authenticate users.| curity.io
Multi-factor authentication is an authentication method that relies on more than one factor when determining whether to grant access to a user.| curity.io
In this piece, we’re going to look at OAuth, and give a brief rundown of each flow type. We’ll look at when each flow is appropriate, and what its specific use case is.| Nordic APIs
Best practices for using JTWs in applications. Learn about JWTs as access tokens, which algorithms to use, when to validate the token and other useful tips.| curity.io