May 16JWTs: Connecting the Dot — Why, When and HowUnderstanding the fundamentals of JSON web tokens is essential. When incorrectly configured or misused, they can give users access beyond their privileges. JSON web tokens (JWTs) are great — they are easy to work with and stateless, requiring less communication with a centralized authentication server. JWTs are handy when you…Jwt7 min readJwt7 min read
May 55 Steps to Modernize Large Websites Using OAuthAn overview of some recommended deployment and separation patterns for when implementing security solutions for web and API components. One of the major concerns in software systems is keeping a code base maintainable over time as the amount of logic grows. In recent years it has been a best practice…Oauth9 min readOauth9 min read
Apr 24Identity Distribution is Essential for Modern API SecurityIt ensures that in the complex mesh of services comprising your API, every party handles requests securely and performs informed authorization decisions. Behind today’s APIs, it’s common to have many services processing a single request. Gone are the days when a monolithic application was exposed directly on the internet and…Api Security7 min readApi Security7 min read
Feb 175 Software Security Goals All CTOs Should PrioritizeA design with a good separation of concerns will perform well. Keep the application security code simple and ensure that security behavior is easy to extend. Companies providing digital services need to secure access to information to protect data that belongs to the organization, its customers and its business partners…Security6 min readSecurity6 min read
Dec 14, 2022How to Handle Sessions with Cookies and TokensAn application is usually an orchestration of several components, requiring more advanced session management than a single instance. A session can be considered as the user’s activity within an application in a given time frame. It starts when the user first interacts with the application and ends when the user…Session Management4 min readSession Management4 min read
Nov 29, 2022To Password or Not to Password: That is the QuestionA no-password approach is better for increased security, but who needs it, and how and when should an organization go passwordless? Passwords remain the default method of user authentication, but the question is for how long? It is becoming more or less an established fact that passwords are insufficient to…Passwordless5 min readPasswordless5 min read
Nov 16, 2022How to Improve Your OAuth Developer ExperienceEnable developers to operate in a more business-aligned way with design patterns that enable your company to run the best security everywhere. These days, developer experience (DX) is a term used frequently but is often misunderstood. The truth is that a poor developer setup can negatively affect the time to…Oauth9 min readOauth9 min read
Oct 6, 2022The Different Token Types and Formats ExplainedDifferent tokens have different purposes and should be used appropriately for each use case. When building security solutions using OAuth and OpenID Connect (OIDC), we frequently discuss tokens. Sometimes these systems are even referred to as token-based architectures. Tokens play a core role in authorizing access to applications, services and…Token8 min readToken8 min read
Sep 9, 2022The OAuth Flows You Need for Modern SecurityA few years back, I wrote the article “8 Vital OAuth Flows and Powers” for Nordic APIs. Since then, a lot has happened around the OAuth and OpenID specifications. Some flows have been updated, others have been deprecated and some new ones have been added. …Oauth7 min readOauth7 min read
Sep 1, 2022To Truly Secure APIs, Go Beyond API KeysWhat is the most important lesson we can learn regarding API security? Apart from that, it should be of paramount concern for all modern enterprises, it’s my view that API security should revolve around identity. …API4 min readAPI4 min read