Foreword
Preface
- Part One: Basic Identity Concepts
Introducing The API Security Maturity Model
The Difference Between HTTP Auth, API Keys, and OAuth
API Keys ≠ Security: Why API Keys Are Not Enough
Why Can’t I Just Send JWTs Without OAuth?
How To Control User Identity Within Microservices
- Part Two: OAuth Flows and Deep Dives
8 Types of OAuth Flows And Powers
Exploring OAuth.tools, The World’s First OAuth Playground
Strategies for integrating OAuth with API Gateways
Assisted Token Flow: The Answer to OAuth Integration in Single Page Applications
Using OAuth Device Flow For UI-Incapable Devices
SCIM: Building the Identity Layer for the Internet
- Part Three: The Role of Identity
OAuth 2.0 – Why It’s Vital to IoT Security
Is OAuth Enough for Financial-Grade API Security?
The Role of Identity in API Security
Nordic APIs Resources