API concepts, especially those around security, can often be confusing. While we generally understand basic concepts like “credentials,” trying to explain how the ROPC Flow differs from the Client Credentials Flow can often devolve relatively quickly into acronyms and diagrams. Accordingly, we’ve compiled a list of 20 resources that help to nail these concepts down. Read more
Posts Tagged: IETF
HTTP/3 is a robust protocol, offering many gains with few adoption blockers. The promise of this protocol, however, is just that – a promise. While the protocol is, in theory, an attractive proposition, it still has quite a lot of iteration to go through, which has left many programmers with a simple question – what is the current state of HTTP/3 and QUIC, and what is explicitly the protocol offering compared to HTTP/2 and HTTP/1? Read more
Eight years is a long time in any business, but that’s perhaps nowhere more true than the tech space. Indulge us for a moment, and let’s think back to 2010…
We saw Jesse Eisenberg forever linked with Mark Zuckerberg by The Social Network. Read more
As the internet grows and more devices become interconnected, authorization is becoming more and more complex.
Early implementations of online services were easy to authorize against since they were tied to desktops, but modern authorization must consider varying environments, from mobile apps to IoT scenarios. Read more
An Introduction to System for Cross-domain Identity Management (SCIM)
What is SCIM?
SCIM stands for “System for Cross-domain Identity Management” and is firstly a standardized way of representing users, groups, and anything related. Secondly, SCIM helps to standardize methods for acting on this data, such as creating, querying, searching, updating, and deleting. Read more