This post was originally published as “Nissan LEAF, API Security, Who Owns API Security, and How Much Security Is Enough?”[…]
Read moreCategory: Uncategorized
The Anatomy of an API Management Solution
This post was originally published as “The Anatomy of an API Management Solution” on the Levvel Blog. In my last[…]
Read moreWhat is API Management?
This post was originally published as “What is API Management?” on the Levvel Blog. In my last post, I explored[…]
Read moreWhat are APIs? (The Technology Perspective)
This post was originally published as “What are APIs? (The Technology Perspective)” on the Levvel Blog. The term, API (Application[…]
Read moreModernizing SOA with APIs
This post was originally published as “Modernizing SOA with APIs” on the Levvel Blog. On January 21, 2016, I did[…]
Read moreProtecting Server Resources Hosting Unauthenticated APIs
This post was originally published as “Protecting Server Resources Hosting Unauthenticated APIs” on the Levvel Blog. In this article, I[…]
Read moreConvert an X509v3 Binary Security Token to PEM Format
This tutorial describes how to convert a Binary Security Token extracted from a SOAP message into a valid PEM format[…]
Read moreWS-Security Integrity (XML Digital Signature)
This post continues exploring the use of XML Digital Signature; this time we look at WS-Security Integrity (use of XML[…]
Read moreXML Digital Signature (an Example)
In the last post, we looked at the steps involved in generating a digital signature using the XML Digital Signature[…]
Read moreXML Digital Signatures
The XML DSig specification is used to provide digital signature functionality to XML Documents. It is is used by numerous[…]
Read more