This is a list of all the SAML2 vs JWT related posts I have written. This series explores SAML2 use[…]
Read moreCategory: Uncategorized
SAML v2.0 vs JWT: SAML2 Web Application SSO Use Cases
This post continues our look at SAML v2.0 and how it compares to JSON Web Tokens (JWT). In the last[…]
Read moreAPI GOVERNANCE IN THE ENTERPRISE
This post was originally published as “API Governance in the Enterprise” on the Levvel Blog. An organization’s API management program[…]
Read moreSAML 2.0 VS. JWT: UNDERSTANDING FEDERATED IDENTITY AND SAML
This post was originally published as “SAML 2.0 VS. JWT: UNDERSTANDING FEDERATED IDENTITY AND SAML” on the Levvel Blog. This[…]
Read moreAPI MANAGEMENT AND PERIMETER SECURITY FOR COTS APPLICATIONS
This post was originally published as “API Management and Perimeter Security for COTS Applications” on the Levvel Blog. Kronos provides[…]
Read moreAPI Security vs. Web Application Security: Part 2
This post was originally published as “API Security vs. Web Application Security: Part 2” on the Levvel Blog. In this[…]
Read moreAPI Security vs. Web Application Security Part 1: A Brief History of Web Application Architecture
This post was originally published as “API Security vs. Web Application Security Part 1: A Brief History of Web Application[…]
Read moreDSig Part 3: XML DSig vs. JSON Web Signature
This post was originally published as “DSig Part 3: XML DSig vs. JSON Web Signtaure” on the Levvel Blog. This[…]
Read moreDSig Part 2: JSON Web Signature (JWS)
This post was originally published as “DSig Part 2: JSON Web Signature (JWS)” on the Levvel Blog. This is the[…]
Read moreDSig Part 1: XML Digital Signature and WS-Security Integrity
This post was originally published as “DSig Part 1: XML Digital Signature and WS-Security Integrity” on the Levvel Blog. This[…]
Read more