Articles
Our articles offer insights on a range of topics such as identity and access management, Financial-grade and API security.

Mutual TLS Sender Constrained Access Tokens
Use mutual TLS to harden the use of access tokens, so that an attacker cannot use stolen tokens to gain API access.
Mutual TLS Client Authentication
What is Mutual TLS, and how does Client Authentication with Mutual TLS work?
The Split Token Approach
The Split Token Approach, applicable for any OAuth 2.0 ecosystem, aims to improve your tokens' security.
The API Security Maturity Model
There is a spectrum of API security implementations, and not all of them are equal. The model describes API security in ever-increasing levels of trust, complexity, and efficiency.
Harden API Access with Workload Identities
An introduction to workload identities and their role in API security.
CIAM and API Security
Understand how Customer Identity and Access Management serves APIs to enable the correct access to business data.
OpenID Connect Hybrid Flow
Learn about the OpenID Connect hybrid flow, its components, and how it combines the implicit and authorization code flows for secure authentication.
Best Practices - OAuth and XSS Prevention
Mitigate XSS threats in OAuth-secured Browser Based Apps
Best Practices - OAuth for Mobile Apps
Best practices to harden security when integrating OAuth into mobile applications.
Elevating API Security and Resilience with Token Patterns
Elevate API security with token patterns like phantom and token exchange. Improve resilience and privacy, and enable zero-trust architecture.
Supported OAuth 2.0 RFCs
An overview of the OAuth 2.0 related standards and their support in the Curity Identity Server.
OpenID Authorization Exchange (AuthZEN)
This article gives an overview of the AuthZEN Authorization API and how it relates to authentication and authorization.
OAuth Device Flow
Learn how OAuth 2.0 Device Flow enables secure authentication on input-constrained devices like smart TVs and consoles: easy setup and seamless user experience.
OAuth Resource Owner Password Credentials Flow
The OAuth Resource Owner Password Credentials Flow Explained.
OAuth Revoke Flow
Learn how OAuth 2.0 token revocation works to securely revoke access and refresh tokens, enhance security, and prevent unauthorized access.
OpenID Connect Standards
Overview of OpenID Connect standards and how they used by the Curity Identity Server.
Dynamic Client Registration Overview
An overview of the Dynamic Client Registration (DCR) protocol. Learn about its use cases, deployment patterns and how to build a more dynamic network.
Using Dynamic Client Registration
Dynamic Client Registration allows new clients to be registered using a standard API. In this article we provide examples of use cases.
Which OAuth Flow Should I Use?
Learn how to select the right OAuth 2.0 flow for your app, including code flow, client credentials flow, device flow, and more for various use cases.
Consent and Claims
Learn how consent relates to claims in the authorization process.
Topics
Join our Newsletter
Get the latest on identity management, API Security and authentication straight to your inbox.
Start Free Trial
Try the Curity Identity Server for Free. Get up and running in 10 minutes.
Start Free Trial