We provide examples of the most common multi-factor authentication approaches to help you find the right balance between security and usability.| curity.io
A step-by-step tutorial describing how to configure the Curity Identity Server to use the phantom token pattern| curity.io
What is Open Banking, and what are the security requirements to implement Open Banking solutions?| curity.io
Learn API security best practices to safeguard your digital assets with effective authentication, authorization, and token management techniques.| curity.io
API security is a touch concept. So, we've compiled a list of over 20 of the best resources, eBooks, whitepapers, RFCs, and more to help understand.| Nordic APIs
Design patterns to allow JWTs to be validated using extended header fields and Public Key Infrastructure.| curity.io
What is Mutual TLS, and how does Client Authentication with Mutual TLS work?| curity.io
Protecting APIs with strong security by requiring clients to authenticate using JWT client assertions| curity.io
An enterprise has many clients that require data of a user's identity. How can the claims infrastructure be used to sustain all parts of an organization?| curity.io
A thorough explanation of the OpenID Connect Authorization Code Flow. Learn how to authenticate users and clients with OIDC.| curity.io
Learn how the Proof Key for Code Exchange (PKCE) should be used in the OAuth server.| curity.io
The Split Token Approach, applicable for any OAuth 2.0 ecosystem, aims to improve your tokens' security.| curity.io
Adopt the Phantom Token Approach:a privacy-preserving token usage pattern for securing APIs and microservices.| curity.io
An overview of the OAuth 2.0 authorization framework, summarizing the roles of resource owner, client, resource server and authorization server.| curity.io
Best practices for using JTWs in applications. Learn about JWTs as access tokens, which algorithms to use, when to validate the token and other useful tips.| curity.io
What is Demonstrating Proof of Possession (DPoP), and how can it be used to improve the security of public clients.| curity.io