Twitter | Search | |
curityio
We talk about identity and API security. A lot. Follow us for the stuff between the lines of the OAuth spec! We created
692
Tweets
143
Following
252
Followers
Tweets
curityio 14h
JWTs can help you maintain a high level of security in your applications. In our short on-demand course you can learn best practices from the comfort of your chair
Reply Retweet Like
curityio Aug 6
Using Curity Identity Server to handle . Read article
Reply Retweet Like
curityio Aug 6
Secure eID Access to Cloud platforms - Watch the recorded webinar and learn how you can make the and process for access to platforms stronger and more secure. Check it out
Reply Retweet Like
curityio Aug 5
Describing how -location data can be used in the Curity Identity Server to customize the process. Read article
Reply Retweet Like
curityio Aug 5
KGH Customs Services created 'one truth' for identity and data sharing with the Curity Identity Server. Read their story here
Reply Retweet Like
curityio Aug 4
Geo-location data can be used in the Curity Identity Server to customize the process. Have a read of this article to learn more
Reply Retweet Like
curityio Aug 4
Get Started with OAuth and OpenID Connect in this free online course. Receive each session sent to your inbox. Register here
Reply Retweet Like
curityio Aug 4
Curity's outlines the difference between HTTP Auth, Keys, and
Reply Retweet Like
curityio Aug 3
Curity Identity Server 5.2 is out! This release includes support for alarms that can send notifications via email, webhooks, Slack, etc. as well as a beta of our new hypermedia API. Read more here
Reply Retweet Like
curityio Jul 30
JWT safety depends greatly on how the tokens are implemented and used. In this 30 minute lesson you can learn best practices based on community standards and our own experiences
Reply Retweet Like
curityio Jul 30
Kindred increased the performance of their digital services with the Curity Identity Server. Learn how
Reply Retweet Like
curityio Jul 29
New tutorial: How to Use AD for credential verification
Reply Retweet Like
curityio Jul 29
What are and and how they relate to each other? Here is a brief explanation
Reply Retweet Like
curityio Jul 29
🛠 Learn and explore the inner workings of Connect and
Reply Retweet Like
curityio Jul 28
How can you adjust the behaviour depending on the methods used by the user? We outline some methods in this article
Reply Retweet Like
curityio Jul 28
We've compiled some JWT Security Best Practices. Have a read here:
Reply Retweet Like
curityio Jul 24
You can use (free) to learn and explore . Easily connect the tool to any OAuth server and try the full set of flows. Check it out
Reply Retweet Like
curityio Jul 23
Geo-location data can be used in the Curity Identity Server to customize the process. Read article
Reply Retweet Like
curityio Jul 23
The more evolved Security is, the more identity emphasis it tends to have. So how do you encapsulate identity with APIs and make it useful? We've written an article about it - read it here:
Reply Retweet Like
curityio Jul 22
Learn something new this summer, or brush up on existing skills. Register for our on-demand JWT Security Best Practice course
Reply Retweet Like