Kafka messaging busses are becoming more prevalent in today’s enterprises. In this video, I briefly discuss why, and then demonstrate integration with an API management solution (using Layer7 as the example – if you use a different API management solution, this will likely have differences).
Category: For API Developers
The Most Common API Authentication Methods
Unless your API is a public feed of read-only data, you likely need authentication. There are many options you could choose, which may vary depending on your use case. However, it’s unlikely you’ll need to go out and create your own authentication method. Whenever possible, use a standard that is widely implemented. Otherwise, developers will…
API Metrics with a Time Series Database
This blog examines the different ways to collect metrics on your APIs, and shows the value of Apache Druid as a time series database option.
Three API Governance Patterns and How to Choose One
Most organizations maintain dozens or even hundreds of APIs. Maintaining consistency and avoiding redundancy quickly becomes a major issue. API governance helps organizations declare and adhere to guidelines for new and existing APIs. There are different approaches to encourage conformity in API design, including governance review and automated restrictions. In this post, we’ll explore both…
The Longest Stage of the API Lifecycle
Right now someone is powering up an original iPhone. On their home screen, they’re tapping the icon for a 10 year old app. As it loads, it calls an endpoint that a development team would rather not maintain. For many APIs, a life of suspended animation is a big part of their story. In API…
API Security in a Multi-Cloud Environment
In today’s app economy, more and more client interactions and transactions are occurring via the web and mobile applications, where predominantly APIs are been used for Information Exchange. Which enables modern enterprise to break the traditional barriers and expose their on-premises and cloud-based digital assets and applications to the outside world in a secure manner….
API Security Architect Certification
The new certification course for API Security Architect is now available. This is an in-depth, self-paced course, and by completing this course, you will be able to: Explain the unique security risks of APIs and identify typical areas of API vulnerabilities Explain the purpose of OAuth 2.0 as a framework for authorization Describe the current…
How-to: View Rich Analytics for GraphQL APIs and Back-ends Using Euclid
After you publish your API, one of the first questions you may be asked or ask yourself is probably “who is using it?”, followed quickly by “is it working?”. Over time you’ll want to see all sorts of data about your API traffic. In the past, you may have spent months updating your endpoints to…
TechTalk: A Panel Discussion on OWASP Top 10/API Top 10
June 2020’s TechTalk had Joe Krull from Aite Group and API Academy’s own Jay Thorne join hosts Aran and Bill on a discussion around OWASP Top 10 and the newer API Top 10 and how enterprises can address common security issues around these problem areas. They also discussed the relationship between app developers and security…
A Solid Investment – Don’t Skimp on Security Training for Developers
Over the past months in API Academy blogs I’ve provided my observations and recommendations on the importance of event and access logging and the compelling reasons why you want to avoid security misconfigurations. This month, I’ll focus on security training for developers and why you should make this investment. To remind, I’m a bit of…