The Curity Identity Server is an API Security solution that brings identity and API access management together.| curity.io
Articles, whitepapers and other resources offering insights on identity management, authentication, API security and much more.| curity.io
The Split Token Approach, applicable for any OAuth 2.0 ecosystem, aims to improve your tokens' security.| curity.io
Adopt the Phantom Token Approach:a privacy-preserving token usage pattern for securing APIs and microservices.| curity.io
Best practices for using JTWs in applications. Learn about JWTs as access tokens, which algorithms to use, when to validate the token and other useful tips.| curity.io
What is Demonstrating Proof of Possession (DPoP), and how can it be used to improve the security of public clients.| curity.io
[RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] | www.rfc-editor.org
JSON Object Signing and Encryption (JOSE)| www.iana.org
[RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] | www.rfc-editor.org