• Products
    • IdentityServer
    • IdentityServer for Redistribution
    • Backend for Frontend (BFF) Security Framework
    • Open Source
  • Documentation
  • Use Cases
    • Federation Broker & Identity Orchestration
    • Control-Centric Identity Infrastructure
    • Compliance & Security-Ready Identity
    • Application Modernization
    • Secure MCP Implementation
  • Resources
    • Duende Product Insiders
    • Training
    • Company Blog
    • IdentityServer4 Upgrade Assessment
    • Customer Stories
    • Unifying Identity and Access Management in Norwegian Healthcare with HelseID
    • Customer Story: USC Shoah Foundation
    • Featured Articles
    • 7 common security pitfalls in OAuth 2.0 implementations
    • OAuth 2.0 grant types and when to use them
    • JSON Web Token (JWT) Authentication Example: A Real-World .NET API
    • Securing a .NET API With JWT Authentication: Step-by-Step Tutorial
  • About
    • Company
      Partners
      Tools & Components
    • Careers
    • Contact
  • Start for free
    Talk to an expert
Duende
  • Products
    • IdentityServer
    • IdentityServer for Redistribution
    • Backend for Frontend (BFF) security framework
    • Open Source
  • Documentation
  • Use Cases
    • Federation Broker & Identity Orchestration
    • Control-Centric Identity Infrastructure
    • Compliance & Security-Ready Identity
    • Application Modernization
    • Secure MCP Implementation
  • Resources
    • IdentityServer 4

      Get a FREE upgrade assessment for better security, performance, and support.

      Company Blog

      Stay up-to-date with the latest developments in identity and access management.

      Duende Product Insiders

      Early Access. Deep Collaboration. Better Security and Identity.

      Training

      Comprehensive training programs for identity and access management.

    • Customer Stories
      • Norwegian Health Network (NHN)
      • USC Shoah Foundation
    • Featured Articles
      • 7 common security pitfalls in OAuth 2.0 implementations
      • OAuth 2.0 grant types and when to use them
      • JSON Web Token (JWT) Authentication Example: A Real-World .NET API
      • Securing a .NET API With JWT Authentication: Step-by-Step Tutorial
  • About
    • Company
    • Partners
    • Tools & Components
    • Careers
    • Contact
  • Start for free
    Talk to an expert

Featured Articles

Read our blog
Contact sales
  • 7 common security pitfalls in OAuth 2.0 implementations

    Clifford Spielman | December 24, 2025

    Secure your OAuth 2.0 implementation by avoiding these 7 common pitfalls. Learn best practices for grant types, PKCE, token validation, and secure storage.

    Read More...
  • OAuth 2.0 grant types and when to use them

    Clifford Spielman | December 23, 2025

    Learn how to use different OAuth 2.0 grant types and their relevant use cases in web application architecture for a better, more secure UX.

    Read More...
  • JSON Web Token (JWT) Authentication Example: A Real-World .NET API

    Clifford Spielman | November 27, 2025

    Learn how Microsoft Graph API uses JWTs, short-lived tokens, and delegated identity management to create a scalable, multi-tenant authentication model.

    Read More...
  • Securing a .NET API With JWT Authentication: Step-by-Step Tutorial

    Clifford Spielman | November 26, 2025

    Learn how to secure a .NET API using JSON Web Tokens (JWTs) with a step-by-step tutorial that walks through authentication configuration, token issuance, and endpoint protection.

    Read More...
  • Best Practices When Using JWTs With Web and Mobile Apps

    Clifford Spielman | September 30, 2025

    Avoid common JWT security pitfalls in web and mobile app development. Follow best practices for token storage, expiration, and validation to build robust apps.

    Read More...
  • What Is a JSON Web Token (JWT) and How Does It Work in Modern Web Apps?

    Clifford Spielman | September 26, 2025

    Secure modern web apps using JSON Web Tokens (JWT). Learn what they are, how they work, and their benefits in stateless architectures.

    Read More...
  • How to build a secure login flow in ASP.NET Core using IdentityServer

    Paul Williams | August 07, 2025

    Learn how to build a secure ASP.NET Core authentication flow with Duende IdentityServer. Create custom, secure authentication with ease.

    Read More...
  • Implementing Multi-Factor Authentication in Organizations

    Ivan DeHaas | August 04, 2025

    Multi-factor authentication adds a simple yet helpful layer of security. Here's how you can implement multi-factor authentication within your organization.

    Read More...
  • ASP.NET Authentication Explained

    Paul Williams | July 30, 2025

    Explore ASP.NET Core authentication and learn about login processes, MFA, biometrics, and workflows to secure your ASP.NET Core app.

    Read More...
  • Role-Based Access Control with ASP.NET Core Identity

    Ivan DeHaas | July 29, 2025

    Role-based access control is a well-known and secure authorization strategy. Learn why it’s so popular with ASP.NET Core Identity developers.

    Read More...
  • A Step-by-Step Guide to OAuth 2.0

    Paul Williams | July 24, 2025

    Learn how OAuth 2.0 works and how it protects web app APIs and resources, including tokens, scopes, and grants. Essential for web developers.

    Read More...
  • How to Generate, Store, and Secure API Tokens in Web Apps

    Paul Williams | July 22, 2025

    Learn to generate, store, and secure API tokens in web applications and why it is essential for web app security and development.

    Read More...
  • How Token-Based Authentication Works in Modern Web APIs

    Paul Williams | July 17, 2025

    Discover how token-based authentication strengthens modern web API security. Learn about token formats, data, and their crucial role in protecting your apps.

    Read More...
  • The Key Differences When Using Access Tokens vs. ID Tokens in Web App Architecture

    Paul Williams | July 16, 2025

    Enhance web app security. Learn the key differences between access tokens and ID tokens in modern web application architecture.

    Read More...
  • Enhancing Web Security with Identity Frameworks

    Ivan DeHaas | July 08, 2025

    Identity frameworks play a significant role in data security. Learn what they are and why identity frameworks are important to your organization.

    Read More...
  • Access Control: A Comprehensive Guide

    Ivan DeHaas | July 08, 2025

    Access control is a vital aspect of information security. Learn what access control is, what it can do, and the methods of securing data.

    Read More...
  • Securing User Identities with Multi-Factor Authentication

    Ivan DeHaas | July 04, 2025

    Multi-Factor Authentication helps to protect sensitive data from cyberattacks in many industries. Learn why it's a must for every organization.

    Read More...
  • Get a Free Assessment and Upgrade IdentityServer4

    Paul Williams | July 03, 2025

    Still using open source IdentityServer4? Upgrading may be easier than you think. Get a free 30-minute assessment from our experts.

    Read More...
  • A Guide to Securing Your Web API with OAuth 2.0

    Paul Williams | June 26, 2025

    Protect your company's ASP.NET Core web application and APIs with OAuth 2.0. Learn best practices for secure internal and external APIs.

    Read More...
  • The Differences Between OAuth 2.0 and OpenID Connect and Why They Matter

    Paul Williams | June 26, 2025

    Learn the key differences between OAuth 2.0 and OpenID Connect and why each matters. Understand how these protocols secure web applications and APIs.

    Read More...
  • The Backend for Frontend (BFF) Pattern Explained: Benefits, Challenges, and Best Practices

    Paul Williams | June 19, 2025

    Learn the backend for frontend (BFF) pattern: benefits (like enhanced security and streamlined development), challenges, and best practices.

    Read More...
  • How BFF Helps Secure Single Page Applications

    Paul Williams | June 19, 2025

    Learn more about how Duende's Backend for Frontend Framework can help secure single page applications by storing tokens on the server-side.

    Read More...
  • Implement BFF with ASP.NET Core and IdentityServer

    Paul Williams | June 09, 2025

    Learn how to implement a secure Backend for Frontend (BFF) pattern using ASP.NET Core and Duende IdentityServer.

    Read More...
  • 5 Important Reasons for Using Backend for Frontend

    Paul Williams | June 09, 2025

    Learn 5 reasons why implementing a Backend for Frontend (BFF) pattern is crucial for modern web application security.

    Read More...
  • Choosing the Right Identity Management and Access Control

    Ivan DeHaas | June 04, 2025

    IAM tools are vital to any organization with a digital presence. Learn how to choose the right identity management and access control solutions for your needs.

    Read More...
  • Managing Users with Identity Frameworks

    Ivan DeHaas | June 04, 2025

    Learn the best practices for managing user privileges with an identity framework and how they can help manage employee roles and user verification.

    Read More...
  • The Best SPA Frameworks for ASP.NET Core

    Ivan DeHaas | May 23, 2025

    Single page applications are essential to web development. Here are the best tools for building SPAs and why ASP.NET Core devs love them.

    Read More...
  • How to Navigate Identity Authentication Regulations

    Ivan DeHaas | May 23, 2025

    Learn top tips for how your service and organization can comply with difficult to navigate identity authentication standards.

    Read More...
  • Duende IdentityServer vs. Microsoft Identity Platform

    Maarten Balliauw | May 16, 2025

    Duende IdentityServer and Microsoft's identity platform are both popular identity and access management solutions. Learn their strengths and weaknesses.

    Read More...
  • Quick Guide to (BFF) Backend for Frontend

    Maarten Balliauw | May 16, 2025

    Backend for Frontend (BFF) architecture makes application development efficient and powerful. Here's why developers should care about BFF architecture.

    Read More...
  • 9 Best Practices for Stronger Identity Authentication

    Ivan DeHaas | April 28, 2025

    Identity authentication solutions are critical to securing important data. Learn the best practices for strengthening your identity authentication system.

    Read More...
  • Guide to Understanding Identity Frameworks

    Ivan DeHaas | April 28, 2025

    Identity frameworks are a safe and effective cybersecurity solution. Learn how they work and why they're worth adopting for your organization.

    Read More...
Duende logo

Products

  • IdentityServer
  • IdentityServer for Redistribution
  • Backend for Frontend (BFF)
  • IdentityModel
  • Access Token Management
  • IdentityModel OIDC Client

Community

  • Documentation
  • Company Blog
  • GitHub Discussions

Company

  • Company
  • Partners
  • Training
  • Quickstarts
  • Careers
  • Contact

Subscribe to our newsletter

Stay up-to-date with the latest developments in identity and access management.

Copyright © 2021-2025 Duende Software. All rights reserved.

Privacy Policy | Terms of Service