The IoT is coming, and OAuth 2.0 is the way to secure it. We define OAuth 2.0, what it accomplishes, and why Jacob Ideskog sees it as key to IoT security.| Nordic APIs
Input-constrained browserless environments require a special OAuth recipe. In this article we describe authorization for an example living room streaming app, advocating for the new OAuth Device Flow for ultimate API security.| Nordic APIs
Decentralized identity is set to make a big impact on how APIs are accessed and secured. We cover a relevant recent talk from Jacob Ideskog.| Nordic APIs