The three most common API authentication methods
As you begin working with third-party APIs, you’ll run into a variety of API authentication methods. The three most common methods to perform authenticated requests with an API are: Basic Read more...
As you begin working with third-party APIs, you’ll run into a variety of API authentication methods. The three most common methods to perform authenticated requests with an API are: Basic Read more...
Use caution with OAuth 2.0 protocol for enterprise logins The reason why authentication specifications, such as the OAuth 2.0 protocol, are such a vital information security control for maintaining secure Read more...
Insecure OAuth implementations: How are mobile app users at risk? OAuth 2.0 is an open standard for token-based authorization that allows a user’s account information to be accessed by third-party Read more...
OpenAM Two-factor authentication for mobile with OATH Two-factor (or multi-factor authentication) is nothing new and is commonly found in various applications where the basic authentication process of providing just a Read more...
Webinar Managing Identities for Fun and Profit Topics include: Trends and challenges in application architectures (e.g. cloud, mobile, APIs, password breaches). Implications for identity management (e.g. reduce passwords, IDaaS, device Read more...
A key technical underpinning of the Cloud is the Application Programming Interface (API). APIs provide consistent methods for outside entities such as web services, clients and desktop applications to interface Read more...