<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Curity Articles</title>
    <link>https://curity.io</link>
    <description>Our articles offer insights on a range of topics such as identity and access management, Financial-grade and API security.</description>
    <lastBuildDate>Wed, 01 Apr 2026 14:40:12 GMT</lastBuildDate>
    <docs>http://blogs.law.harvard.edu/tech/rss</docs>
    <generator>GatsbyJS</generator>
    <copyright>All rights reserved 2026, @curityio</copyright>
    <item>
      <title>Design AI for Enterprises</title>
      <link>https://curity.io/resources/learn/ai-for-enterprises/</link>
      <guid>https://curity.io/resources/learn/ai-for-enterprises/</guid>
      <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
      <content:encoded>Many enterprises are considering ways to design AI initiatives and gain a business advantage. Usually, people start with basic AI and then want to upgrade to enterprise AI. This article summarizes the approaches that Curity recommends, to plan your future enterprise AI direction… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/ai-for-enterprises/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>OAuth Client ID Metadata Document</title>
      <link>https://curity.io/resources/learn/oauth-client-id-metadata-document/</link>
      <guid>https://curity.io/resources/learn/oauth-client-id-metadata-document/</guid>
      <pubDate>Mon, 02 Mar 2026 00:00:00 GMT</pubDate>
      <content:encoded>What is the Client ID Metadata Document?  refers to a draft specification that defines the client ID as an HTTPS URL that points to a JSON document, the client metadata document. This semantic definition of the client ID implies that each… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/oauth-client-id-metadata-document/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>Browserless OAuth</title>
      <link>https://curity.io/resources/learn/browserless-oauth-ai-agents/</link>
      <guid>https://curity.io/resources/learn/browserless-oauth-ai-agents/</guid>
      <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
      <content:encoded>Browserless OAuth is a way for applications to avoid having to open the browser for an OAuth flow. It describes API-driven approaches for applications to interact directly with the user and forward information to the authorization server. It enables applications to own the user… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/browserless-oauth-ai-agents/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>Dynamic Trust for AI Agents</title>
      <link>https://curity.io/resources/learn/dynamic-trust-for-ai-agents/</link>
      <guid>https://curity.io/resources/learn/dynamic-trust-for-ai-agents/</guid>
      <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
      <content:encoded>Dynamic trust establishment means that clients like AI agents (or AI agent developers) don't have to have a prior relationship with a server to securely integrate. Instead, clients can establish trust programmatically when needed. Dynamic trust establishment allows AI agents to… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/dynamic-trust-for-ai-agents/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>API Access Across Trust Domains</title>
      <link>https://curity.io/resources/learn/api-access-across-trust-domains/</link>
      <guid>https://curity.io/resources/learn/api-access-across-trust-domains/</guid>
      <pubDate>Wed, 04 Feb 2026 00:00:00 GMT</pubDate>
      <content:encoded>Trust domains are a way to segment a zero trust architecture. They allow for controlling who can talk to who based on a trust anchor. API access across trust domains implies that an OAuth client needs to communicate with multiple authorization servers to get the appropriate… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/api-access-across-trust-domains/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>SSO for AI Agents with OpenID Connect</title>
      <link>https://curity.io/resources/learn/sso-for-ai-agents-with-openid-connect/</link>
      <guid>https://curity.io/resources/learn/sso-for-ai-agents-with-openid-connect/</guid>
      <pubDate>Thu, 29 Jan 2026 00:00:00 GMT</pubDate>
      <content:encoded>Single Sign-On for AI agents means that users can use an active session with a common identity provider to authenticate to an AI agent and via an AI agent to other systems (APIs). In other words, SSO for AI agents has two aspects: SSO when the user logs in to an AI agent. SSO… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/sso-for-ai-agents-with-openid-connect/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>OpenID Authorization Exchange (AuthZEN)</title>
      <link>https://curity.io/resources/learn/authzen/</link>
      <guid>https://curity.io/resources/learn/authzen/</guid>
      <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
      <content:encoded>There are many approaches to implement fine-grained authorization and many different types of  in the market. For the most part they all strive to bring the ability to perform fine-grained authorization of access to data beyond what is possible with… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/authzen/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>An Introduction to Authorization</title>
      <link>https://curity.io/resources/learn/introduction-authorization/</link>
      <guid>https://curity.io/resources/learn/introduction-authorization/</guid>
      <pubDate>Tue, 02 Dec 2025 00:00:00 GMT</pubDate>
      <content:encoded>is the process of granting access to resources. It is tightly coupled to  that verifies the subjects that are requesting access. While the focus for authentication and authorization often lies on human users, they are becoming equally important for… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/introduction-authorization/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>API Security Best Practices for AI Agents</title>
      <link>https://curity.io/resources/learn/api-security-best-practice-for-ai-agents/</link>
      <guid>https://curity.io/resources/learn/api-security-best-practice-for-ai-agents/</guid>
      <pubDate>Thu, 13 Nov 2025 00:00:00 GMT</pubDate>
      <content:encoded>AI technology can produce pretty impressive results. As a consequence, AI agents are a popular way for users to consume data and, internally, to call APIs. The questions are, what exactly are AI agents and — more importantly — if you have an API, how do you properly secure API… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/api-security-best-practice-for-ai-agents/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>Design MCP Authorization for APIs</title>
      <link>https://curity.io/resources/learn/design-mcp-authorization-apis/</link>
      <guid>https://curity.io/resources/learn/design-mcp-authorization-apis/</guid>
      <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
      <content:encoded>AI Agents and API Access AI agents provide goal-oriented experiences for users, where a human sets an objective using natural language and the agent can choose actions to fulfill that objective. An AI agent uses a large language model (LLM) to process user input and determine… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/design-mcp-authorization-apis/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>MCP Authorization Lifecycle</title>
      <link>https://curity.io/resources/learn/mcp-authorization-lifecycle/</link>
      <guid>https://curity.io/resources/learn/mcp-authorization-lifecycle/</guid>
      <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
      <content:encoded>is currently the most popular standard for building AI agents. It allows large language model-powered applications to, essentially, call APIs. While organizations already protect their APIs, the nature of AI agents might require adjustments to the… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/mcp-authorization-lifecycle/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>OAuth With Unsolicited SAML Responses</title>
      <link>https://curity.io/resources/learn/unsolicited-saml/</link>
      <guid>https://curity.io/resources/learn/unsolicited-saml/</guid>
      <pubDate>Tue, 23 Sep 2025 00:00:00 GMT</pubDate>
      <content:encoded>The SAML protocol allows identity providers (IdP) to redirect an already authenticated user to an application — a service provider, or SP, in SAML terms — without initiating the flow on the service provider's part. This approach is called an unsolicited SAML response, or an IdP… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/unsolicited-saml/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>An Overview of WebAuthn</title>
      <link>https://curity.io/resources/learn/webauthn-overview/</link>
      <guid>https://curity.io/resources/learn/webauthn-overview/</guid>
      <pubDate>Tue, 09 Sep 2025 00:00:00 GMT</pubDate>
      <content:encoded>What is Webauthn? WebAuthn, or Web Authentication API, is a specification of a JavaScript API that allows applications to perform secure authentication for both multi-factor and single-factor scenarios. The API, exposed by a compliant browser, enables applications to talk to… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/webauthn-overview/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>Client Initiated Backchannel Authentication (CIBA) Flow</title>
      <link>https://curity.io/resources/learn/ciba-flow/</link>
      <guid>https://curity.io/resources/learn/ciba-flow/</guid>
      <pubDate>Tue, 09 Sep 2025 00:00:00 GMT</pubDate>
      <content:encoded>Overview of the CIBA Flow The  defines a protocol to support initiating authentication without user interaction from a consumption device. Authentication is performed via an authentication device by the user who also consents (if… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/ciba-flow/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>What is an Entitlement Management System?</title>
      <link>https://curity.io/resources/learn/entitlement-management-system/</link>
      <guid>https://curity.io/resources/learn/entitlement-management-system/</guid>
      <pubDate>Wed, 06 Aug 2025 00:00:00 GMT</pubDate>
      <content:encoded>An Entitlement Management System (EMS) is a core component of the Neo-Security Architecture that centrally manages, distributes, and enforces authorization policies across systems. It improves agility, audibility and compliance by allowing authorization logic to be maintained… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/entitlement-management-system/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>User Provisioning With SCIM</title>
      <link>https://curity.io/resources/learn/user-provisioning-with-scim/</link>
      <guid>https://curity.io/resources/learn/user-provisioning-with-scim/</guid>
      <pubDate>Fri, 01 Aug 2025 00:00:00 GMT</pubDate>
      <content:encoded>System for Cross-domain Identity Management (SCIM) is a REST-based protocol that provides a straightforward approach to resource management using the JSON data format. While SCIM is technically flexible enough to represent various types of resources, its most common application… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/user-provisioning-with-scim/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>What is PSD2, and How Does it Work?</title>
      <link>https://curity.io/resources/learn/what-is-psd2/</link>
      <guid>https://curity.io/resources/learn/what-is-psd2/</guid>
      <pubDate>Tue, 15 Jul 2025 00:00:00 GMT</pubDate>
      <content:encoded>PSD2 Explained The Revised Payment Services Directive (PSD2), introduced by the European Commission in 2015, helped to modernize the financial ecosystem across the European Union and European Economic Area. The main goals of the directive are to improve customer protection… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/what-is-psd2/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>Authentication vs. Authorization, What's the Difference?</title>
      <link>https://curity.io/resources/learn/authentication-vs-authorization/</link>
      <guid>https://curity.io/resources/learn/authentication-vs-authorization/</guid>
      <pubDate>Fri, 11 Jul 2025 00:00:00 GMT</pubDate>
      <content:encoded>The terms "authentication" and "authorization" are often mistakenly used interchangeably. However, they refer to two distinct security processes: authentication is the act of verifying a user's identity, while authorization determines what resources or actions the authenticated… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/authentication-vs-authorization/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>What Is OpenID Connect, and How Does It Work?</title>
      <link>https://curity.io/resources/learn/openid-connect-overview/</link>
      <guid>https://curity.io/resources/learn/openid-connect-overview/</guid>
      <pubDate>Mon, 07 Jul 2025 00:00:00 GMT</pubDate>
      <content:encoded>What is OpenID Connect? OpenID Connect (OIDC) is an identity layer on top of the  protocol. While OAuth provides ways to authorize resource access, OIDC allows applications to authenticate users, thus you will often hear about OIDC authentication.

The OpenID Connect… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/openid-connect-overview/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>What is Partner Identity and Access Management (PIAM), and How Does it Relate to B2B?</title>
      <link>https://curity.io/resources/learn/piam-overview/</link>
      <guid>https://curity.io/resources/learn/piam-overview/</guid>
      <pubDate>Thu, 26 Jun 2025 00:00:00 GMT</pubDate>
      <content:encoded>What is Partner Identity and Access Management (PIAM)? Partner Identity and Access Management (PIAM) is a type of  that incorporates the processes and tools to onboard, grant and govern access for business partners. Business partners are… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/piam-overview/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>Best Practices - OAuth and XSS Prevention</title>
      <link>https://curity.io/resources/learn/oauth-xss-prevention/</link>
      <guid>https://curity.io/resources/learn/oauth-xss-prevention/</guid>
      <pubDate>Fri, 20 Jun 2025 00:00:00 GMT</pubDate>
      <content:encoded>When you run an OAuth architecture, APIs manage access control and the authorization server implements user authentication. On the web side of the architecture, injection is the main security concern. In particular, you must protect against the threat of malicious JavaScript… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/oauth-xss-prevention/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>Mutual TLS Sender Constrained Access Tokens</title>
      <link>https://curity.io/resources/learn/oauth-certificate-bound-access-token/</link>
      <guid>https://curity.io/resources/learn/oauth-certificate-bound-access-token/</guid>
      <pubDate>Tue, 17 Jun 2025 00:00:00 GMT</pubDate>
      <content:encoded>Mutual TLS Sender Constrained Access Tokens provide a robust method for enhancing the security of OAuth 2.0-based authorization by binding the access token to the client's TLS certificate. This prevents unauthorized use of access tokens even if they are leaked or intercepted. In… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/oauth-certificate-bound-access-token/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>Mutual TLS Client Authentication</title>
      <link>https://curity.io/resources/learn/oauth-client-authentication-mutual-tls/</link>
      <guid>https://curity.io/resources/learn/oauth-client-authentication-mutual-tls/</guid>
      <pubDate>Tue, 17 Jun 2025 00:00:00 GMT</pubDate>
      <content:encoded>What is Mutual TLS? The Transport Layer Security (TLS) is a protocol designed to provide secure communication over the Internet and includes authentication, confidentiality and integrity. When a TLS connection is established the server provides a certificate that the client… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/oauth-client-authentication-mutual-tls/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>The Split Token Approach</title>
      <link>https://curity.io/resources/learn/split-token-pattern/</link>
      <guid>https://curity.io/resources/learn/split-token-pattern/</guid>
      <pubDate>Wed, 11 Jun 2025 00:00:00 GMT</pubDate>
      <content:encoded>You might have read before about the , which is a privacy-preserving token usage pattern for securing APIs and microservices that combines the security of opaque tokens with the convenience of JWTs. The Phantom Token approach takes the burden of token… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/split-token-pattern/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
    <item>
      <title>The API Security Maturity Model</title>
      <link>https://curity.io/resources/learn/the-api-security-maturity-model/</link>
      <guid>https://curity.io/resources/learn/the-api-security-maturity-model/</guid>
      <pubDate>Tue, 10 Jun 2025 00:00:00 GMT</pubDate>
      <content:encoded>API security has become a forefront issue for modern enterprises. As API attacks grow in frequency and sophistication, organizations need a structured way to evaluate and improve their security posture. Too often, APIs only adopt HTTP basic authentication, API keys, or token… &lt;br/&gt;&lt;a href="https://curity.io/resources/learn/the-api-security-maturity-model/"&gt;Read the full article on curity.io&lt;/a&gt;</content:encoded>
    </item>
  </channel>
</rss>