This post was originally published as “How to Submit Tokens to an API Provider, Pt 2” on the Apigee Blog.[…]
Read moreTag: APIs
How To Submit Your Security Tokens to an API Provider Pt. 1
This post was originally published as “How to Submit Tokens to an API Provider, Pt 1” on the Apigee Blog.[…]
Read moreIdentity Propagation in an API Gateway Architecture
The power of end-to-end user security context with APIs This post was originally published as “Identity Propagation in an API[…]
Read moreDesign Principles for Seamless User Authentication
This post was originally published as “Design Principles for Seamless User Authentication” on the Apigee Blog. In a previous post,[…]
Read moreKeeping Your APIs Secure for Multiple User Types
This post was originally published as “Keeping Your APIs Secure for Multiple User Types” on the Apigee Blog. In an[…]
Read moreAPI MANAGEMENT AND PERIMETER SECURITY FOR COTS APPLICATIONS
This post was originally published as “API Management and Perimeter Security for COTS Applications” on the Levvel Blog. Kronos provides[…]
Read moreAPI Security vs. Web Application Security Part 1: A Brief History of Web Application Architecture
This post was originally published as “API Security vs. Web Application Security Part 1: A Brief History of Web Application[…]
Read moreWhat is API Management?
This post was originally published as “What is API Management?” on the Levvel Blog. In my last post, I explored[…]
Read moreWhat are APIs? (The Technology Perspective)
This post was originally published as “What are APIs? (The Technology Perspective)” on the Levvel Blog. The term, API (Application[…]
Read more