API Security by Joe
API Security by Joe
API Security by Joe
Nordic APIs
http://leanpub.com/securing-the-api-stronghold
feedback, pivot until you have the right book and build
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . i
Security . . . . . . . . . . . . . . . . . . . . . 6
Resources . . . . . . . . . . . . . . . . . 14
CONTENTS
Approaches to Provisioning . . . . . . . . . . . 22
3.6 Conclusion . . . . . . . . . . . . . . . . . . . 30
to Mitigate . . . . . . . . . . . . . . . . . . . . . . 32
4.7 Conclusion . . . . . . . . . . . . . . . . . . . 41
5.5 Scopes . . . . . . . . . . . . . . . . . . . . . . 46
5.13 Conclusion . . . . . . . . . . . . . . . . . . . 56
CONTENTS
Connect . . . . . . . . . . . . . . . . . . . . . . . . 58
of Things . . . . . . . . . . . . . . . . . . . . 62
. . . . . . . . . . . . . . . . . . . . . . . . . . 64
Ownership . . . . . . . . . . . . . . . . 75
. . . . . . . . . . . . . . . . . . . . . . . 78
8.6 Review: . . . . . . . . . . . . . . . . . . . . . 80
. . . . . . . . . . . . . . . . . . . . . . . . . . 82
CONTENTS
9.8 Conclusion . . . . . . . . . . . . . . . . . . . 90
. . . . . . . . . . . . . . . . . . . . . . . . . 91
Architecture . . . . . . . . . . . . . . . . 92
10.5 Conclusion . . . . . . . . . . . . . . . . . . . 97
Availability . . . . . . . . . . . . . . . 100
Resources . . . . . . . . . . . . . . . . . . . . . . . . . 108
API Themed Events . . . . . . . . . . . . . . . . . 108
Endnotes . . . . . . . . . . . . . . . . . . . . . . . . . 110
Preface
OpenID Connect.
availability
Preface ii
organization
And more
Please read on, share, and enjoy the 5th free eBook from
Concepts
Dopter
concern.
1
Security
API security isnt just about the API itself, but also about
intrusion detection?
individual. Only when you know who is at this core will you
be accessing it.
access
into XACML)
to the RS
summarize:
may also send back a refresh token which will allow the
once.
the client and the resource owner and what path they
took, what client they are using, and who is the end user.
Developers
They are like SAML tokens, but are less expressive, more
instead of XML.
For one, API keys are not API security. API keys are
the place, giving anyone with the key access to the API.
mobile security.
information.
via an API. One weak link can break the whole chain.
Stronghold
Given that these four terms are what the entire concept
secret code.
what access level the user has with the system. [Image: CC-BYSA-3.0
should be granted.
allow him in, the guard steps back and checks his Ye Olde
Book of Permissiones to make sure Lancelot has the right
access.
because they need access to the API for their systems, setting
access.
Spreading Resources
is enforceable.
called a federation.
The end result is that a STS hands a token to the user after