Security
The Orchestration SDKs are built from the ground up to use best practices for securing token material and data.
Security is a very broad subject, and every environment is different. Readers are expected to do their own research and complement the information found in these topics.
Tokens and keys
Learn how the Orchestration SDKs secure your session and OAuth 2.0-related tokens, and the encryption used.
Authentication
Discover the protocols the Orchestration SDKs use when your app authenticates your users.
Data
What data do the Orchestration SDKs use, and what security measures help to protect it.
OAuth 2.0
See how the Orchestration SDKs use Proof Key for Code Exchange (PKCE) to mitigate the risks of an OAuth 2.0 attack.