API Authentication Best Practices
In this post, we’ll explore authentication methods, how to keep tokens safe, and what comes next.
In this post, we’ll explore authentication methods, how to keep tokens safe, and what comes next.
In today’s app economy, more and more client interactions and transactions are occurring via the web and mobile applications, where predominantly APIs are been used for Information Exchange. Which enables modern enterprise to break the traditional barriers and expose their on-premises and cloud-based digital assets and applications to the outside world in a secure manner. […]
The new certification course for API Security Architect is now available. This is an in-depth, self-paced course, and by completing this course, you will be able to: Explain the unique security risks of APIs and identify typical areas of API vulnerabilities Explain the purpose of OAuth 2.0 as a framework for authorization Describe the current […]
After you publish your API, one of the first questions you may be asked or ask yourself is probably “who is using it?â€, followed quickly by “is it working?â€. Over time you’ll want to see all sorts of data about your API traffic. In the past, you may have spent months updating your endpoints to […]
June 2020’s TechTalk had Joe Krull from Aite Group and API Academy’s own Jay Thorne join hosts Aran and Bill on a discussion around OWASP Top 10 and the newer API Top 10 and how enterprises can address common security issues around these problem areas. They also discussed the relationship between app developers and security […]
Over the past months in API Academy blogs I’ve provided my observations and recommendations on the importance of event and access logging and the compelling reasons why you want to avoid security misconfigurations. This month, I’ll focus on security training for developers and why you should make this investment. To remind, I’m a bit of […]
Which came first, APIs or DevOps? Though the two are complementary, the answer here is clear. There are major benefits of DevOps in your API lifecycle, but APIs are likely responsible for the growth in DevOps methodologies. The Cloud, modern code reviews, and continuous integration all depend on APIs. APIs Cause Cloud Formations Plenty has […]
So you’ve been using and getting all the benefits that GraphQL has to offer with the Arvata GraphQL server for a while now, and you keep hearing about these concepts with an API developer portal involving client→API mappings and account/API plans. What are these concepts and how can you benefit from them? Client → API […]
And Together, They Need to have Business Context The industry and our customers have expressed a great interest in Istio and service mesh over the past couple of months. I find this interesting because the tool represents the next evolutionary step, but is not without a few downsides. My focus in API management has sharpened […]
Last month in my API Academy blog I provided my observations and recommendations about the importance of logging and monitoring from a cybersecurity perspective. This month, I’ll focus on the importance of avoiding security misconfigurations when building and updating applications. As I noted last month, I’m a bit of an old salt in security, having […]