Uncategorized

Developers Aren’t the Users of Your API

Hang around the API community long enough and you’ll hear about design, developer experience, and ways to appeal to someone integrating with your programming interface. That may lead you to think of developers as the users of your API. While an important audience, developers are a conduit for the actual end users of the software […]

The Challenging Times of Delivering on OpenBanking, Part 1

The terms, OpenBanking and PSD-2 (Payment Services Directive-2) are largely used interchangeably nowadays to summarise the very significant challenges that are being experienced by the Global financial and Banking sector today. As a response to global financial crisis of 2006, the European Banking Association, 4000+ member banks were mandated, under the regulation, PSD-2, to empower […]

Why APIs are Critical Today

APIs are more important than ever in these challenging times where everything is being operated remotely. APIs make it easy to provide access to information and keep businesses running smoothly. They can also create new challenges and risks if they are not properly managed.  First, security is paramount to ensure only those that are allowed […]

API Academy Hits a Birthday

As we approach the eighth anniversary of the founding of API Academy, I look back at the beginning and how far we’ve come.  From the very beginning, the original API Academy team focused on agnostic best practices for API strategy and design – creating TechTalks, videos, and blogs, as well as going out around the […]

Gateway Secure Deployment Architecture

In today’s digital world, API gateways are often the first interaction of incoming requests from the outside world. In most scenarios, enterprises place the gateways in DMZ strategically to secure, protect and throttle their internal digital assets. Hence, security for these gateways becomes crucial and they need to be properly configured and hardened.  Whether it […]

How-to: OpenID Connect Authentication for OAuth

As we know by now, the OAuth 2.0 protocol was built for authorization, not authentication. It excels at delegated authorization. Log in with Google?  Sure. The OAuth protected API endpoint never sees your Google username and password. It doesn’t need to know who you are. In fact, like a discreet bouncer at an exclusive club, […]