In 2007 Kevin Kelly gave a TED talk in which he forecasted how the World Wide Web would look 5000 days into the future, prophesizing the emergence of the IoT and AI. He envisioned a more connected planet where all manufactured goods tap into a single, global, intelligent network. At the time, the Internet of ...| Nordic APIs
How to remotely share access to IoT devices using OAuth and OpenId Connect. We offer workflows for user-user delegation, using a smart bike lock IoT device as an example case.| Nordic APIs
The IoT is coming, and OAuth 2.0 is the way to secure it. We define OAuth 2.0, what it accomplishes, and why Jacob Ideskog sees it as key to IoT security.| Nordic APIs
API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain keys can be decompiled to extract keys, or deobfuscated from on-device storage, plaintext files can be stolen for unapproved use, and password managers are susceptible to security risks as with any application. In this piece we outline the disadvantages of solely relying on API keys to secure the proper access to your data.| Nordic APIs