Most APIs today have moved beyond HTTP Basic Auth and API Keys. Here's why OAuth 2.0 is necessary for secure authorization.| Nordic APIs
How do we design and implement an OAuth flow for Single Page Applications (SPAs), a design style that has no backend? Learn the Assisted Token flow.| Nordic APIs
Adopt the Phantom Token Approach:a privacy-preserving token usage pattern for securing APIs and microservices.| curity.io
In this piece, we’re going to look at OAuth, and give a brief rundown of each flow type. We’ll look at when each flow is appropriate, and what its specific use case is.| Nordic APIs
An overview of the OAuth 2.0 authorization framework, summarizing the roles of resource owner, client, resource server and authorization server.| curity.io
What is a zero-trust architecture? Here we define zero-trust and look at how OAuth can enable a zero-trust architectural approach.| Nordic APIs