Systems | Development | Analytics | API | Testing

API

What the heck is DPoP? | IAM Community Meetups - 2022

An Application-level proof-of-possession protections for access and refresh tokens. DPoP (Demonstrating-Proof-of-Possession) is an additional security mechanism for the token generation which overcomes the issue of bearer token which will not validate between who is requested token and who is actually using the token for the access of a particular resource. In DPoP, this will be avoided by validating the client who requested the token is the one who is actually using the token using the Signed JWT tokens known as DPoP Proof.

How to Migrate from the Open Source WSO2 Identity Server to the Subscription Version?

WSO2 Identity Server is the most popular open-source CIAM system on the market, and it is widely used by educational institutions and government agencies as an on-premise CIAM solution. Single sign-on/sign-out (SSO), identity federation, strong authentication, identity administration, account management, identity provisioning, fine-grained access control, API security, monitoring, reporting, and auditing are all possible with WSO2 Identity Server's seamless integration capabilities.

Best Big Data API Management Platforms

Every time someone uses an app, information travels from a database to the user via an API. Single instances may not seem very important. As long as they perform the required task, people don’t think too much about how applications work. From a business perspective, the big data flowing through APIs could unlock important knowledge that helps tap into emerging trends and target customers better. To get the best results, companies need the best big data API management.

Parameter Binding: Native API/Native Code vs SourcePro DB

In the previous article, we walked through an example of how to query and retrieve data from a MySQL database using the native MySQL C API and then compared that to the clean simplicity of using the SourcePro DB API. In this article, we are going to take that a step further and look at input parameter binding. Building off the system we discussed previously that manages the accounts for a credit card system, we are now going to implement a simple application that can add transactions to an account.

7 Habits of Effective API and Service Management

Organizations face many challenges every day, and every day new challenges emerge. You have the day-to-day obstacles to overcome and then there is new twist. Today, the biggest challenge emerging on the market is how to adopt and implement effective API and service management habits. The number of APIs and services a company uses is growing exponentially every day, managing them individually or with a corporate wiki is just not possible.

What is Artifact Review?

Quality software starts with code review, but quality doesn’t begin and end with code. Documents and artifacts need proper attention to make sure nothing slips through the cracks. To ensure quality software, it's essential to review the software artifacts left behind from the code review process. If code review is the unglamorous task of eating your vegetables, artifact review might as well be getting your 10,000 steps in. Both can be downright boring, but they're good for you.

Load test WordPress + nginx on Kubernetes

Why this combination you ask? Load testing is my passion, and I am partial to Kubernetes. I challenged myself to share a use case that many could relate to, focused on a business critical application. Websites came to mind and WordPress is the world’s most popular website management system. Of course, nginx is the most popular web server so let’s throw that into the mix. And Kubernetes? With more than 50% of corporations adopting Kubernetes in 2021, what better system to run in.