What options do APIs and microservices have when it comes to authentication and authorization? What is the role of identity in API security?
In our last LiveCast, we sought to discover best practices for handling identity within API security. Read more
OAuth is an incredibly popular internet standard for granting apps and web services access to the information available on other websites. Though the implementation is complex, the premise is simple: you tell a website you want to access its data, you log in with the user’s details, and off you go — but without some kind of protocol the process would be a whole lot more complicated. Read more
Mic check. 1-2-3. Earlier this week, Nordic APIs held a 2.5 day event, jam-packed with workshops, 30 speakers, and critical insights on building success in the API ecosystem. This was our first ever conference in Austin, and our 2nd ever Nordic APIs event in the United States. Read more
As the internet grows and more devices become interconnected, authorization is becoming more and more complex.
Early implementations of online services were easy to authorize against since they were tied to desktops, but modern authorization must consider varying environments, from mobile apps to IoT scenarios. Read more
An Introduction to System for Cross-domain Identity Management (SCIM)
What is SCIM?
SCIM stands for “System for Cross-domain Identity Management” and is firstly a standardized way of representing users, groups, and anything related. Secondly, SCIM helps to standardize methods for acting on this data, such as creating, querying, searching, updating, and deleting. Read more