A step-by-step tutorial describing how to configure the Curity Identity Server to use the phantom token pattern| curity.io
Learn API security best practices to safeguard your digital assets with effective authentication, authorization, and token management techniques.| curity.io
The Split Token Approach, applicable for any OAuth 2.0 ecosystem, aims to improve your tokens' security.| curity.io
Adopt the Phantom Token Approach:a privacy-preserving token usage pattern for securing APIs and microservices.| curity.io
Best practices for using JTWs in applications. Learn about JWTs as access tokens, which algorithms to use, when to validate the token and other useful tips.| curity.io
Nowadays, with cloud resources and remote employees, the perimeter doesn’t really exist anymore. This is where Zero-Trust Architecture comes into play.| Nordic APIs