Application Security Models
I like to start system design (at the application level) with the security model that will be used to protect[…]
Read moreThe Intersection of Identity, Integration, API Management, and Application Security.
I like to start system design (at the application level) with the security model that will be used to protect[…]
Read more
The following blog posts are part of a series I wrote on digital signatures. DSig Part 1: XML Digital Signature[…]
Read more
I’m taking a brief excursion from my usual identity and API-centric posts to answer a question about performance tuning someone[…]
Read more
There are several identity protocols that are commonly supported by Identity Providers today — OAuth2, OAuth2 Token Exchange, OIDC, SAML2 Browser Profile,[…]
Read more
A while back I needed a summary of which protocols were supported/recommended in different situations by Azure Active Directory while[…]
Read more
Authentication. Federation. Single Sign On (SSO). I’ve mentioned these concepts many times. I haven’t actually formally defined what each of[…]
Read more
This post was originally published as “How to Submit Tokens to an API Provider, Pt 2” on the Apigee Blog.[…]
Read more
This post was originally published as “How to Submit Tokens to an API Provider, Pt 1” on the Apigee Blog.[…]
Read more
This post concludes our discussion of SAML2 and JWT. Here we look at a comparison of the features and use[…]
Read more
This post explores the equivalent JWT use cases corresponding to the five SAML2 use cases that were explored earlier in[…]
Read more