-
7 common security pitfalls in OAuth 2.0 implementations
Secure your OAuth 2.0 implementation by avoiding these 7 common pitfalls. Learn best practices for grant types, PKCE, token validation, and secure storage.
Read More... -
OAuth 2.0 grant types and when to use them
Learn how to use different OAuth 2.0 grant types and their relevant use cases in web application architecture for a better, more secure UX.
Read More... -
JSON Web Token (JWT) Authentication Example: A Real-World .NET API
Learn how Microsoft Graph API uses JWTs, short-lived tokens, and delegated identity management to create a scalable, multi-tenant authentication model.
Read More... -
Securing a .NET API With JWT Authentication: Step-by-Step Tutorial
Learn how to secure a .NET API using JSON Web Tokens (JWTs) with a step-by-step tutorial that walks through authentication configuration, token issuance, and endpoint protection.
Read More... -
Best Practices When Using JWTs With Web and Mobile Apps
Avoid common JWT security pitfalls in web and mobile app development. Follow best practices for token storage, expiration, and validation to build robust apps.
Read More... -
What Is a JSON Web Token (JWT) and How Does It Work in Modern Web Apps?
Secure modern web apps using JSON Web Tokens (JWT). Learn what they are, how they work, and their benefits in stateless architectures.
Read More... -
How to build a secure login flow in ASP.NET Core using IdentityServer
Learn how to build a secure ASP.NET Core authentication flow with Duende IdentityServer. Create custom, secure authentication with ease.
Read More... -
Implementing Multi-Factor Authentication in Organizations
Multi-factor authentication adds a simple yet helpful layer of security. Here's how you can implement multi-factor authentication within your organization.
Read More... -
ASP.NET Authentication Explained
Explore ASP.NET Core authentication and learn about login processes, MFA, biometrics, and workflows to secure your ASP.NET Core app.
Read More... -
Role-Based Access Control with ASP.NET Core Identity
Role-based access control is a well-known and secure authorization strategy. Learn why it’s so popular with ASP.NET Core Identity developers.
Read More... -
A Step-by-Step Guide to OAuth 2.0
Learn how OAuth 2.0 works and how it protects web app APIs and resources, including tokens, scopes, and grants. Essential for web developers.
Read More... -
How to Generate, Store, and Secure API Tokens in Web Apps
Learn to generate, store, and secure API tokens in web applications and why it is essential for web app security and development.
Read More... -
How Token-Based Authentication Works in Modern Web APIs
Discover how token-based authentication strengthens modern web API security. Learn about token formats, data, and their crucial role in protecting your apps.
Read More... -
The Key Differences When Using Access Tokens vs. ID Tokens in Web App Architecture
Enhance web app security. Learn the key differences between access tokens and ID tokens in modern web application architecture.
Read More... -
Enhancing Web Security with Identity Frameworks
Identity frameworks play a significant role in data security. Learn what they are and why identity frameworks are important to your organization.
Read More... -
Access Control: A Comprehensive Guide
Access control is a vital aspect of information security. Learn what access control is, what it can do, and the methods of securing data.
Read More... -
Securing User Identities with Multi-Factor Authentication
Multi-Factor Authentication helps to protect sensitive data from cyberattacks in many industries. Learn why it's a must for every organization.
Read More... -
Get a Free Assessment and Upgrade IdentityServer4
Still using open source IdentityServer4? Upgrading may be easier than you think. Get a free 30-minute assessment from our experts.
Read More... -
A Guide to Securing Your Web API with OAuth 2.0
Protect your company's ASP.NET Core web application and APIs with OAuth 2.0. Learn best practices for secure internal and external APIs.
Read More... -
The Differences Between OAuth 2.0 and OpenID Connect and Why They Matter
Learn the key differences between OAuth 2.0 and OpenID Connect and why each matters. Understand how these protocols secure web applications and APIs.
Read More... -
The Backend for Frontend (BFF) Pattern Explained: Benefits, Challenges, and Best Practices
Learn the backend for frontend (BFF) pattern: benefits (like enhanced security and streamlined development), challenges, and best practices.
Read More... -
How BFF Helps Secure Single Page Applications
Learn more about how Duende's Backend for Frontend Framework can help secure single page applications by storing tokens on the server-side.
Read More... -
Implement BFF with ASP.NET Core and IdentityServer
Learn how to implement a secure Backend for Frontend (BFF) pattern using ASP.NET Core and Duende IdentityServer.
Read More... -
5 Important Reasons for Using Backend for Frontend
Learn 5 reasons why implementing a Backend for Frontend (BFF) pattern is crucial for modern web application security.
Read More... -
Choosing the Right Identity Management and Access Control
IAM tools are vital to any organization with a digital presence. Learn how to choose the right identity management and access control solutions for your needs.
Read More... -
Managing Users with Identity Frameworks
Learn the best practices for managing user privileges with an identity framework and how they can help manage employee roles and user verification.
Read More... -
The Best SPA Frameworks for ASP.NET Core
Single page applications are essential to web development. Here are the best tools for building SPAs and why ASP.NET Core devs love them.
Read More... -
How to Navigate Identity Authentication Regulations
Learn top tips for how your service and organization can comply with difficult to navigate identity authentication standards.
Read More... -
Duende IdentityServer vs. Microsoft Identity Platform
Duende IdentityServer and Microsoft's identity platform are both popular identity and access management solutions. Learn their strengths and weaknesses.
Read More... -
Quick Guide to (BFF) Backend for Frontend
Backend for Frontend (BFF) architecture makes application development efficient and powerful. Here's why developers should care about BFF architecture.
Read More... -
9 Best Practices for Stronger Identity Authentication
Identity authentication solutions are critical to securing important data. Learn the best practices for strengthening your identity authentication system.
Read More... -
Guide to Understanding Identity Frameworks
Identity frameworks are a safe and effective cybersecurity solution. Learn how they work and why they're worth adopting for your organization.
Read More...