• Complain

Travis Spencer - Securing the API Stronghold: The Ultimate Guide to API Security

Here you can read online Travis Spencer - Securing the API Stronghold: The Ultimate Guide to API Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2015, publisher: Nordic APIs AB, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Travis Spencer Securing the API Stronghold: The Ultimate Guide to API Security

Securing the API Stronghold: The Ultimate Guide to API Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Securing the API Stronghold: The Ultimate Guide to API Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Introducing the most comprehensive dive into the core tenants of modern web API security. Learn the techniques and technologies required to evolve into an API stronghold. As digital security is more and more a pressing concern throughout the API, IoT, & microservice space, the proper access management needs to be seriously addressed to ensure your digital assets are securely distributed. We outline security stacks and workflows using modern technologies such as OAuth2, OpenID Connect, and more.

Travis Spencer: author's other books


Who wrote Securing the API Stronghold: The Ultimate Guide to API Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

Securing the API Stronghold: The Ultimate Guide to API Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Securing the API Stronghold: The Ultimate Guide to API Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Securing The API Stronghold
The Ultimate Guide to API Security
Nordic APIs
2015 Nordic APIs AB
Table of Contents
Guide
Preface

As the world becomes more and more connected, digital security becomes an increasing concern. Especially in the Internet of Things (IoT), Application Programming Interface (API), and microservice spaces, the proper access management needs to be seriously addressed to ensure web assets are securely distributed.

During the Nordic APIs World Tour - a five day international conference we held in May 2015 - our speakers consistently reiterated the importance of API security. So, to help providers secure their systems, we at Nordic APIs have collated our most helpful advice on API security into this eBook; a single tomb that introduces important terms, outlines proven API security stacks, and describes workflows using modern technologies such as OAuth and OpenID Connect.

Founded on insights from identity experts and security specialists, this knowledge is crucial for most web service platforms that needs to properly authenticate, control access, delegate authority, and federate credentials across a system.

Following an overview of basic concepts, well dive into specific considerations such as:

  • Vulnerabilities and what whitehackers look for
  • How to implement a secure versioning strategy
  • The three distinct approaches to API licensing and availability
  • Performing delegation of user identity across microservices and IoT devices
  • Using the Neo-Security stack to handle identity and access control with OAuth 2.0 and OpenID workflows
  • Differentiating Authentication, Authorization, Federation, and Delegation, and the importance of each
  • Using OpenID Connect for Native Single Sign On (SSO) and Mobile Identity Management (MIM)
  • Ways to introduce a culture of security into your organization
  • Securing your data stream at the point-to-point level
  • And more

Please read on, share, and enjoy the 5th free eBook from the Nordic APIs team!

Bill Doerrfeld, Editor in Chief, Nordic APIs

Connect with Nordic APIs:

Facebook | Twitter | Linkedin | Google+ | YouTube

Introducing API Security Concepts

Knowing who has the right to do what with your API is key to success - Andreas Krohn, Dopter

Design all API security with public access in mind- Phillipp Schne, Axway

Application Programming Interfaces or APIs are not only an extension of the social web, but continue to seriously disrupt entire industries, change how Business-to-business (B2B) communication is throttled, spark innovation, and even inspire social change. Simply put by TechCrunch, APIs fuel the software thats eating the world.

Within this vibrant and quickly expanding economy, an increasing amount of data is being funneled through systems not designed with the scale of protection that is necessary. The risk of cyber threat is now the highest it has ever been, and it wont stop anytime soon. To combat this threat we must take the smart precautions to arm our systems. We build with the assumption that even private APIs will sooner or later become exposed to the public, and embrace proper security implementation as a top concern.

1.1 Identity is at the Forefront of API Security

API security isnt just about the API itself, but also about the security of entire organizations and mobile products when they intersect with APIs.

When developing an API, the security of the mobile device matters just as much as the security of the API. Does it have anti-virus software installed? Is it enrolled in a mobile device management solution (MDM)? Does it have mobile application management software (MAM) installed? You also need to worry about enterprise security. Are the servers secure? Do your machines have intrusion detection?

At this junction of APIs, business, and mobile, lies the individual. Only when you know who is at this core will you know what they should be accessing and how they should be accessing it.

1.2 Neo-Security Stack

When we start to expose high-value information and resources, we need to have high-level assurance of who is accessing them. API security is comprised of a number of protocols, which Twobo Technologies refers to as the Neo-Security stack. This standards-based cloud security suite is usually comprised of these protocols and technologies:

  • OAuth 2: The open standard for secure, delegated access
  • OpenID Connect: For federation which allows for the secure exchange of user authentication data
  • JSON Identity Suite: The collection of JSON-based protocols for representing the identity of users
  • SCIM: System for Cross-domain Identity Management for user account provisioning and deprovisioning
  • U2F: Universal 2-factor authentication for asymmetrically identifying users with a high degree of confidence that they really are who they say they are
  • ALFA: For defining fine-grained authorization rules in a JSON-like policy language (which compiles down into XACML)

While the Neo-Security stack creates a comprehensive security solution for mobility, it is a great challenge for API developers to manage a myriad of specifications themselves.

1.3 OAuth Basics

As the risk associated with an individuals online identity increases, we need to ask permission before exposing identity and any vulnerable resources with an API. OAuth is a framework used to build API security solutions - a framework or meta-protocol under which we create other protocols to define how tokens are handled. Despite its name, OAuth is not for authentication, federation, or even authorization; it helps delegate access, ie. giving an app access to your data or service. A benefit of using OAuth is that somebody else authenticates users.

These following factors make up OAuth2 Protocols:

  • Client: The web or mobile application involved
  • Authorization Server (AS): The security token service, which issues credentials and tokens that represent the resource owner
  • Resource Owner (RO): Authorizes or delegates access to the RS
  • Resource Server (RS): Often the API itself, a collection of libraries and web applications

How these four OAuth2 actors work together varies with each integration. Well dive into the processes behind common OAuth server flows in future chapters, but to summarize:

OAuth Web Server Flow

A three-legged OAuth process occurs when an end user specifies that he or she wants to delegate access to a third-party application for use within the client application. The client application then redirects this request to the AS, which requires authentication for identification. The AS then authorizes that client and the RO is redirected back to the web app with a single-use access code.

The single-use access code is sent back to the AS, which then converts it into an access token that the end user may use to access the server. At the same time, the AS may also send back a refresh token which will allow the end user to use the same OAuth to access more than once.

Essentially, the access token allows a user to call the API. In return, the API gains access to information about both the client and the resource owner and what path they took, what client they are using, and who is the end user. With this information, you are able to create much more complete web access control decisions that improve API security. Everything is built right into OAuth2, limiting human-designed security errors.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Securing the API Stronghold: The Ultimate Guide to API Security»

Look at similar books to Securing the API Stronghold: The Ultimate Guide to API Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Securing the API Stronghold: The Ultimate Guide to API Security»

Discussion, reviews of the book Securing the API Stronghold: The Ultimate Guide to API Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.