API security is complex, and the underlying systems that support it are even more so. Getting a grasp on API security requires understanding many underlying components. Accordingly, any tool that can help contextualize these systems is not only a good educational tool, but it’s also a good business tool. Read more
Posts Tagged: Curity.io
As the internet grows and more devices become interconnected, authorization is becoming more and more complex.
Early implementations of online services were easy to authorize against since they were tied to desktops, but modern authorization must consider varying environments, from mobile apps to IoT scenarios. Read more
An Introduction to System for Cross-domain Identity Management (SCIM)
What is SCIM?
SCIM stands for “System for Cross-domain Identity Management” and is firstly a standardized way of representing users, groups, and anything related. Secondly, SCIM helps to standardize methods for acting on this data, such as creating, querying, searching, updating, and deleting. Read more
Before the rise of graphical interfaces and flashy user desktops, the Command Line Interface (CLI) was the only way to interact with a computer. But the retro CLI is making a comeback.
It’s a basic form of computing — the CLI accepts text commands and interprets them into functions on the operating system. Read more