Securely connect with partners, developers, mobile apps and the cloud
Learn More
Layer 7 Products Overview
Make OAuth implementation simple for your organization
Learn More
A How-to Guide to OAuth & API Security
Manage the security and performance risks created by opening enterprise systems via APIs
Learn More
5 Pillars of API Management
Federate identity for SaaS, Web services, APIs, mobile applications and the Cloud
Learn More
Federated Identity & Single Sign-On Using Layer 7
Create a framework to address the complex challenges associated with implementing OAuth
Learn More
5 OAuth Essentials for API Access Control
Adopt a secure API architecture to counter API-specific threats
Learn More
5 Simple Strategies for Securing APIs
Enable seamless, secure access to API-based resources via key standards like OAuth and SAML
Learn More
Layer 7 Identity Management Products
Simplify authentication and authorization for Web and mobile APIs
Learn More
Layer 7 OAuth Toolkit
Simplify secure mobile app access to enterprise resources
Learn More
Single Sign-On for Mobile
Unify security across Web, API, mobile and cloud
Learn More
API Security with Layer 7 & CA SiteMinder
Find out how today’s authorization experts are getting maximum value from OAuth
Learn More
OAuth in the Real World featuring Webshell
Leverage mobile Single Sign-On to provide secure, seamless app access
Learn More
Mobile SSO: Give App Users a Break from Typing Passwords
Understand how emerging standards like OAuth and OpenID Connect will impact federation
Learn More
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Control API access using OAuth and existing IAM investments
Learn More
Simplifying API Access Control with OAuth featuring 451 Research
Implement OAuth as part of an enterprise-level API security solution
Learn More
A Practical Guide to API Security & OAuth for the Enterprise featuring Forrester Research, Inc.
Use Layer 7’s OpenID Connect functionality to securely share identity attributes
Learn More
OpenID Connect Made Simple Using Layer 7
Simplify OAuth implementation for authorization servers and protected resource servers
Learn More
OAuth Toolkit Demo
Use an existing identity provider to enable delegated authorization for an exposed API
Learn More
OAuth 2.0 Tutorial 1: Incorporate an Existing API & Identity Provider
Use OAuth to grant access to third-party applications without an existing trust relationship
Learn More
OAuth 2.0 Tutorial 3: The Implicit Grant Type
Define an OAuth interface that grants access based on a SAML assertion
Learn More
OAuth 2.0 Tutorial 4: The SAML Grant Type
Use CA SiteMinder session tokens to authenticate and authorize users via OAuth
Learn More
OAuth 2.0 Tutorial 5: Leverage a CA SiteMinder Session in an OAuth 2.0 Handshake
Use Layer 7’s OAuth Toolkit with the OAuth 1.0/1.0a standard for delegated authorization
Learn More
Using Layer 7 as an OAuth 1.0/1.0a Server & Client
Modify an OAuth implementation through the addition of a new parameter
Learn More
Modifying a Layer 7 OAuth 1.0a Implementation to Support Custom Requirements
Mitigate common threats to enterprise-level OAuth implementations
Learn More
API Tech Talk: Common OAuth Security Mistakes & Threat Mitigations
Provide SSO without compromising the security of apps or the APIs that power them
Learn More
API Tech Talk: SSO & OAuth for Mobile Apps
Discover whether OAuth is still relevant, following the OAuth 2.0 controversy
Learn More
Tech Talk Tuesday: OAuth 2.0 - Do We Still Need It?
Add federated authentication to OAuth-enabled systems
Learn More
Tech Talk Tuesday: OpenID Connect
Take a new identity-based approach to mobile security, strong enough for enterprise apps
Learn More
Identity in Mobile Security
Securely exchange identity across domains
Learn More
Identity Federation in Web Services
Understand the role of identity management in public sector information sharing
Learn More
Identity Management for the 21st-Century Public Sector IT Mission
Leverage the OAuth specification for effective access control with Web and mobile APIs
Learn More
Tech Talk Tuesday: OAuth Best Practices for API Access Control
Prepare your organization for a fundamental shift in IT infrastructure
Learn More
Webinar: Identity in an API Economy
Implement enterprise-level API access control using the OAuth 2.0 standard
Learn More
RSA Conference 2012: Enterprise Access Control Patterns for REST & Web APIs
1
2
3