The API Management Playbook

API Academy See 13 essential use cases and discover key capabilities for effective API Management To execute ideas quickly and seize new opportunities, it is critical for digital businesses to create and manage APIs effectively. But what is effective API Management? The API Management Playbook from CA Technologies provides a great reference guide for: Winning at digital transformation by using…

Continuous API Management

Mehdi Medjaoui, Erik Wilde, Ronnie Mitra & Mike Amundsen Making the Right Decisions in an Evolving Landscape A lot of work is required to release an API, but the effort doesn’t always pay off. Overplanning before an API matures is a wasted investment, while underplanning can lead to disaster. This practical guide provides maturity models for individual APIs…

Should Your APIs be Open?

Dive into the pros and cons of implementing open APIs Show Notes In the third episode of our new podcast series, Erik Wilde , Mike Amundsen, Matt McLarty and Ronnie Mitra dive into the pros and cons of implementing open APIs—exploring how offering a public API might impact your organization, from a business and strategy perspective.

API Management 302: Using an API Gateway in Microservice Architecture

Get to grips with the specifics of deploying an API gateway in a microservice architecture In  Lesson 304: API Design for Microservices, we describe the essential role APIs play in microservice architectures. In Lesson 101: API Management Basics, we explain why an API gateway is essential to ensuring API security, usability, scalability and reliability. Here, we focus on the specifics of…

TechTalk: Common OAuth Security Mistakes and Threat Mitigations

With vulnerabilities recently surfacing in the OAuth implementations of popular service providers like Yammer, Instagram and Facebook, it’s hard to blame anyone for getting the impression that there are fundamental security flaws in the OAuth protocol. Francois Lascelles, Chief Architect at Layer7, answered OAuth questions live, discussed the common security mistakes made in OAuth implementations and explain how…

API Management 301: OAuth-Based Access Control

Learn how OAuth provides standard patterns upon which you can deliver API access control In API Management Lesson 201: API Security, we examine typical areas of API vulnerability and share best practices for addressing these vulnerabilities – including the use of OAuth as an access control mechanism. In this lesson, we describe how OAuth provides standard patterns upon which…

API Management 201: API Security

Identify typical areas of API vulnerability and learn best practices for securing APIs In Lesson 103: Choosing a Solution, we discuss the importance of considering functional and operational security characteristics when choosing an API Management solution. Regardless of the solution, understanding the risk profile of APIs is vital to protecting an API against attack. In this lesson, we examine…

API Management 102: Architectural Components

To architect an effective API Management infrastructure, it is necessary to adopt and deploy some new technology components. In this lesson, we look into specific requirements and features associated with the components of an effective API Management architecture, including security, performance, data transformation and developer management. In Lesson 101: API Management Basics, we give an overview of two integrated…

Scroll to top