Systems | Development | Analytics | API | Testing

API

Authorizing Microservice APIs With OPA and Kuma

Many companies are leveraging DevOps, microservices, automation, self-service, cloud and CI/CD pipelines. These megatrends are changing how companies are building and running software. One thing that often slips through the cracks is security. With microservices, there’s an increase in the number of APIs companies have to protect. YouTube An error occurred. Try watching this video on www.youtube.com, or enable JavaScript if it is disabled in your browser.

Launching API Programs in Non API-First Companies

Ep. 11: Jeannie Hawrysz, leader of API Programs at SAS Joining us is Jeannie Hawrysz, the Lead API Architect at SAS, a 22,000 person business analytics company. Before that she was an 18-year veteran at IBM and was the Technical Development Manager for IBM’s API Connect Micro Gateway. In our podcast she shares how to successfully launch API programs in non API-first companies.

Multi-layer API security with Apigee and Google Cloud Armor

Information security has become headline news on a daily basis. You have probably heard of security risks ranging from malicious bots used in schemes both big and small, to all-out "software supply chain attacks" that involve large-name enterprises and their customers, and that ultimately affect numerous governments, organizations, and people.

Introducing DreamFactory's MQTT Service

MQTT is a communication protocol for the publish-subscribe architecture. You can use DreamFactory as a MQTT client for your IoT projects. It’s easy to connect to any MQTT-based message broker using DreamFactory and easily publish and subscribe to any topic. DreamFactory’s MQTT client service is native to the platform, supporting role-based access controls, live API documentation, and more.

Kong Mesh 1.2 Is Here With Embedded OPA Support, FIPS 140-2 Compliance and Multi-Zone Authentication

We are truly excited to release Kong Mesh 1.2 today and introduce three new security capabilities that make it the most secure enterprise service mesh available today. Kong Mesh is built on open source Kuma which Kong created in 2019 and has since donated it to the CNCF. Kuma is a universal control plane for service mesh that is based on Envoy.

4 Excellent API Tools That Will Improve Your Integrations

Developers need excellent API tools that help them improve the quality of integrations and at the same time, reduce the time required to develop these integrations. Ideally, API tools should reduce the risk of integration and performance issues when developing new applications and should provide an effective means of accessing data that is often locked up in a variety of organisational databases.

How to Use Kong Gateway OAuth2 Plugin

Learn how to add OAuth 2.0 authorization and authentication to your service by integrating Kong Gateway and its OAuth 2.0 plugin. What Does the Kong Gateway OAuth2 Plugin Do? As Kong Gateway sits in front of a resource server, the OAuth 2.0 plugin adds authorization server functionality to that resource server — handling authorization requests, inspecting and refreshing tokens, and permitting or forbidding access to resources.

4 Steps to Authorizing Services With the Kong Gateway OAuth2 Plugin

In this tutorial, I’m going to walk through adding OAuth2 authorization and authentication to your service with the Kong Gateway OAuth2 plugin. First, I’ll cover the fundamentals. If you’re already familiar with how Kong Gateway and OAuth2 work, skip ahead to the tutorial. Interconnected. Shared. That’s the norm for today’s applications, networks and data.

Creating Read Only APIs with DreamFactory

As a best practice, you should take care to provide clients with the minimal API access privileges required to successfully complete their tasks. DreamFactory's role based access control manager ensures administrators never leave your data sources unnecessarily vulnerable, offering a point-and-click interface for quickly defining and reviewing privileges. In this video we'll walk through the configuration of a role-based access control, demonstrating how a client's API access privileges can be easily updated so as to allow only read access to a select set of API endpoints.