This post continues our look at SAML v2.0 and how it compares to JSON Web Tokens (JWT). In the last[…]
Read moreAuthor: rcbj-admin
API GOVERNANCE IN THE ENTERPRISE
This post was originally published as “API Governance in the Enterprise” on the Levvel Blog. An organization’s API management program[…]
Read moreSAML 2.0 VS. JWT: UNDERSTANDING FEDERATED IDENTITY AND SAML
This post was originally published as “SAML 2.0 VS. JWT: UNDERSTANDING FEDERATED IDENTITY AND SAML” on the Levvel Blog. This[…]
Read moreAPI MANAGEMENT AND PERIMETER SECURITY FOR COTS APPLICATIONS
This post was originally published as “API Management and Perimeter Security for COTS Applications” on the Levvel Blog. Kronos provides[…]
Read moreAPI Security vs. Web Application Security: Part 2
This post was originally published as “API Security vs. Web Application Security: Part 2” on the Levvel Blog. In this[…]
Read moreAPI Security vs. Web Application Security Part 1: A Brief History of Web Application Architecture
This post was originally published as “API Security vs. Web Application Security Part 1: A Brief History of Web Application[…]
Read moreDSig Part 3: XML DSig vs. JSON Web Signature
This post was originally published as “DSig Part 3: XML DSig vs. JSON Web Signtaure” on the Levvel Blog. This[…]
Read moreDSig Part 2: JSON Web Signature (JWS)
This post was originally published as “DSig Part 2: JSON Web Signature (JWS)” on the Levvel Blog. This is the[…]
Read moreDSig Part 1: XML Digital Signature and WS-Security Integrity
This post was originally published as “DSig Part 1: XML Digital Signature and WS-Security Integrity” on the Levvel Blog. This[…]
Read moreNissan LEAF, API Security, Who Owns API Security, and How Much Security Is Enough?
This post was originally published as “Nissan LEAF, API Security, Who Owns API Security, and How Much Security Is Enough?”[…]
Read more