How-To: Create a Private Key for Signing JWT ID Tokens

Feel free to jot this down: RFC1721. We all have our favourite IETF standards, don’t we?  Something we read again and again in front of the roaring fireplace with our slippers on. Something to chuckle at in darker times, to ponder over, and oh yes, to shed a tear for, whilst contemplating the sheer brilliance of it all. …

TechTalks Are Back!

After a hiatus, API Academy TechTalks are back! Hosted by Aran White and myself, our January session had guest Jay Thorne discussing how to build API aware service meshes. In our February session, on February 26 at 9am pst, Aran and I welcomed Michael Skolik from Enterprise Studios by HCL. He discussed challenges for Docker and high performance…

How To: Validate Your OAuth Implementation

Is my Layer7 OAuth Toolkit (OTK) installation working? Valid question. Now that you’ve installed OTK on your API Gateway, and have access to OTK-specific policies and assertions in Policy Manager, it’s time to see OAuth in action. The quickest way to do this is through the pre-configured OAuth test clients and OAuth Manager.You can access the OAuth test…

How To: OTK Solution Kit Installation

This is the second post in the blog series focusing on the OAuth Toolkit (OTK) kit. The first video was a more academic overview of the OAuth protocol and workflow.  This time we take a look at how to install the OTK solution kit, and how the OTK integrates with the API Gateway to provide easy implementation of OAuth security for API endpoints.  The…

How-To: OAuth Overview

Today we’re going to take a look at the Layer 7 API Management OAuth toolkit or OTK. For most customers, the OTK is not an optional Gateway add-on. It is an essential product used in the API management lifecycle for securing client authorization and authentication. The OTK implements security using a combination of the OAuth 2.0 (authorization) and…

Tutorial: The New Enterprise Topology

Learn how big data and mobile devices are redefining the topology of enterprise IT The three-tier topology popularized by Web applications is changing. Big Data and mobile devices are shifting the borders of enterprise IT and the API has become the new perimeter for organizations, exposing their business and data services for external consumption. This video from the…

Scroll to top