Blog

Understanding ACR and AMR Claims in Authentication: Practical Use Cases

Learn about two important claims in authentication - ACR (Authentication Context Class Reference) and AMR (Authentication Methods Reference) and their role in ensuring secure and reliable authentication in various use cases, including Open Banking, Energy and Healthcare.

Learn more

Featured Posts

Latest Posts

Understanding ACR and AMR Claims in Authentication: Practical Use Cases

Learn more

Sender-Constrained Access Tokens MTLS vs DPoP

Learn more

Testing Authorizers in SaaS Production Environment

Learn more

Reap Benefits of Multitenancy Model in Cloudentity for Your Organization

MOAR TENANTS, MOAR!

Helm Chart Testing Tools Overview

Learn more

Exploring the OAuth Authorization Code Flow: Improve Security of Data Sharing

Learn more

Create Open Banking Client App in Node.js for FDX

Learn more

Test Automation for OpenID Foundation Certification Process

Learn more

How Cloudentity Takes Care of Your Data?

Learn more

Introducing OAuth2c: A Powerful Command-Line Tool for OAuth2

Learn more

Using Service Level Objectives to Improve Site Reliability at Cloudentity

Learn more

Smoke Tests in Cloudentity

Learn more

Test Automation for OpenID

Learn more

Integration With the Kusk API Gateway

Learn more

Authorization and Security for Financial Data Aggregators, Payment Platforms, and Other Financial Intermediaries

Learn more

Apply Branding for Business Partners

Learn more

Protect API Using Role-Based Access Control (RBAC) With Identity Pools Pt. 2

Control Access

Protect API Using Role-Based Access Control (RBAC) With Identity Pools Pt. 1

Control Access

Improve Single Page Application Token Security With Lightweight OAuth Proxy

Read more

Authenticate Client Application Using OAuth 2.0 Token Exchange On-Behalf-of (Delegation) Flow

Exchange Tokens

Authorization for Apps Easier to Apply and More Transparent Than Ever Before

Learn more

Securing Partner API Integrations With OAuth MTLS

Discover more

Build a GraphQL Client Application to Consumer Protected GraphQL API Resources Part 3

Build a GraphQL client

Build a GraphQL Client Application to Consumer Protected GraphQL API Resources Part 2

Protect GraphQL APIs

Build a GraphQL Client Application to Consumer Protected GraphQL API Resources Part 1

Explore authorization for GraphQL
Updated: Jun 10, 2022