Authorization for Apps Easier to Apply and More Transparent than Ever Before
Securing applications is not easy, we get it. Is it, however, possible to enable the developers to d...
Securing applications is not easy, we get it. Is it, however, possible to enable the developers to d...
OAuth 2.0 Token Exchange on-behalf-of (delegation) flow enables client applications to act on behalf of a different entity
This article is the third part of a series to explore usage of the SecureAuth authorization platform for externalized GraphQL runtime authorization along with policy based access controls.
Learn how to secure partner API integrations using OAuth with mutual TLS authentication.
This article is the first part of a series to explore usage of the SecureAuth authorization platform for externalized GraphQL runtime authorization along with policy based access controls.
This article is the second part of a series to explore usage of the SecureAuth authorization platform for externalized GraphQL runtime authorization along with policy based access controls.
This article describes how the OpenID foundation certification process is done in SecureAuth with th...
Solid backup process is a necessity for any SaaS platform and SecureAuth is no exception. We underst...