Pattern / oatsy40 This tutorial builds on the capabilities we explored in the “Red Hat SSO + 3Scale API Management” series[…]
Read moreTag: Api
How To Submit Your Security Tokens to an API Provider, Pt. 2
This post was originally published as “How to Submit Tokens to an API Provider, Pt 2” on the Apigee Blog.[…]
Read moreHow To Submit Your Security Tokens to an API Provider Pt. 1
This post was originally published as “How to Submit Tokens to an API Provider, Pt 1” on the Apigee Blog.[…]
Read moreIdentity Propagation in an API Gateway Architecture
The power of end-to-end user security context with APIs This post was originally published as “Identity Propagation in an API[…]
Read moreAn Alternative to Delegated Access in the Enterprise
Extending OAuth2 and OpenID Connect as the enterprise standard for API security This post was originally published as “An Alternative[…]
Read moreThe Tools of API Management — The Full Stack
In the first three API Management posts I wrote, we discussed “What are APIs?(The Technical Perspective)”, “What is API Management?”,[…]
Read moreSAML2 vs JWT: Apigee & Azure Active Directory Integration — A JWT Story
In our next SAML2 vs JWT post, we are going to use a JWT with a very simple API that[…]
Read moreSAML v2.0 vs. JWT Series
This is a list of all the SAML2 vs JWT related posts I have written. This series explores SAML2 use[…]
Read moreAPI GOVERNANCE IN THE ENTERPRISE
This post was originally published as “API Governance in the Enterprise” on the Levvel Blog. An organization’s API management program[…]
Read moreAPI Security vs. Web Application Security: Part 2
This post was originally published as “API Security vs. Web Application Security: Part 2” on the Levvel Blog. In this[…]
Read more