Using OpenAM as a Trusted File Authorization Engine

Protect OAuth2 Access Tokens Using Proof of Possession

Blockchain for Identity: Access Request Management

Delegated RBAC CRUD Via Workflow

Workflow Approval Via Encrypted Email Links

Federated Authorization Using 3rd Party JWTs

In flight Authorization Management

Set Top Box Emulator and OAuth2 Device Flow