Posts Tagged: identity

From Inception to RFC – The SCIM Story

Eight years is a long time in any business, but that’s perhaps nowhere more true than the tech space. Indulge us for a moment, and let’s think back to 2010…

We saw Jesse Eisenberg forever linked with Mark Zuckerberg by The Social Network. Read more

Standardized-User-Management-with-SCIM

Standardized User Management With SCIM

An Introduction to System for Cross-domain Identity Management (SCIM)

What is SCIM?

SCIM stands for “System for Cross-domain Identity Management” and is firstly a standardized way of representing users, groups, and anything related. Secondly, SCIM helps to standardize methods for acting on this data, such as creating, querying, searching, updating, and deleting. Read more

3 Common Methods of API Authentication Explained

APIs handle enormous amounts of data of a widely varying type – accordingly, one of the chief concerns of any data provider is how specifically to secure this data. The idea that data should be secret, that it should be unchanged, and that it should be available for manipulation is key to any conversation on API data management and handling. Read more

oauth 2.0

OAuth 2.0 – Why It’s Vital to IoT Security

In this article we’ll explain why OAuth 2.0 is vital to IoT security. The internet is fundamentally an unsafe place. For every service, every API, there are users who would love nothing more than to break through the various layers of security you’ve erected. Read more

Review of Approov for Mobile API Security

Unfortunately, the reality of mobile apps is that at some point, someone is going to try to do something they’re not allowed to. Whether this is through brute-forcing keys, spoofing identities, or simply issuing distributed attacks across the application’s server dependencies, the threat to public-facing APIs in the mobile space is real, dangerous, and often inefficiently mitigated. Read more