The IoT is coming, and OAuth 2.0 is the way to secure it. We define OAuth 2.0, what it accomplishes, and why Jacob Ideskog sees it as key to IoT security.| Nordic APIs
How do you handle a batch process using OAuth? We describe a flow for creating long-lived access tokens bound to the request to secure API identity control.| Nordic APIs
OAuth can be paired with OpenID Connect to perform delegation of user identity across microservices for secure and replicable control of access management.| Nordic APIs
In this post we'll see why APIs and microservices should decouple user identity from their designs, and how to go about this implementation using scopes.| Nordic APIs
We explore facial detection APIs and sentiment analysis APIs that can be integrated into apps to detect emotion from users.| Nordic APIs
We review Apple's recent SiriKit release, along with Alexa, Viv, and other virtual assistants making (audio) waves through the use of 3rd dev integrations.| Nordic APIs
Jacob Ideskog is an Identity Specialist and CTO at Curity. Most of his time is spent working with security solutions in the API and Web space. He has worked with both designing and implementing OAuth and OpenID Connect solutions for large enterprise deployments as well as small startups.| Nordic APIs