Systems | Development | Analytics | API | Testing

May 2022

Validate WSO2 API Manager gateway request with open policy agent

Open policy agent (OPA) enables you to write security and compliance policies as code, or call any external policies using the OPA standard. WSO2 API manager uses this capability to offload policy decisions of API gateway requests to this policy engine. By decoupling the policy enforcement from evaluation, API policymakers now have the opportunity to write dynamic and reusable policies for ever-changing requirements. You can then reuse an OPA policy like any other policy in the API Manager by graphically dragging and dropping it into a policy pipeline. This video explains how it works and gives a demo.

API Security: Tips and Practices to Keep Your System Safe

As more and more businesses move to API-driven architectures, the need for strong API security increases. If your business relies on APIs to connect different parts of your infrastructure, you need to make sure your APIs are adequately secured. This article will discuss API security best practices to protect your data.

What Are The Main Advantages to API Testing?

In the world of application development, Application Programming Interfaces (APIs) enables the communication and exchange of data between software. Testing your API is essential to the proper integration and delivery of quality software and product. Unlike UI testing, API automation testing is designed to withstand the short release cycles and frequent changes that occur while using best practices for software development and IT operations. API testing is more important than ever.

Advantages of Using a Mock API to Accelerate Development

Mocking APIs is an increasingly popular trend, with more and more developers seeing the advantages of mocking dependencies rather than spinning up actual duplicates of resources. On a high-level, a mock API means that you have a service that returns static data, which in turn is based on a real API.

How APIs and Businesses Work to Enable Business Agility

APIs and businesses. Ever wonder what do APIs do in businesses? A better question is: what don’t they do? We’re living in the API economy — one where APIs rule business capabilities and open new revenue streams. Companies that leverage API technology innovate and respond to changes faster, providing value to customers and employees alike.

Using Moesif and Stripe for Pay-As-You-Go API Billing

Offering customers a variety of ways to pay for your product allows for flexibility and ease. In general, there are two ways for customers to pay for usage: Post-paid and pre-paid. Pre-paid is sometimes also referred to as PAYG, or Pay-As-You-Go. Post-paid usage can sometimes lead customers to have billing surprises if they are not tracking their usage closely. This can cause headaches for these users and can also cause issues for the service provider.

End-to-End API Monetization with Kong, Stripe, and Moesif

Many API developers and companies struggle to find ways to easily set up systems to monetize their APIs. Some are simple but not customizable, some are complex and require massive engineering effort to actually get it all running. To make things easier, Moesif created a feature a few months ago called Billing Meters which gives massive customizability but with a minimal amount of code and engineering effort.

One-Time Authorization Code for REST APIs in WSO2 Identity Server

WSO2 Identity Server provides many identity management workflows and password management workflows out of the box, e.g., self-registration, user invitations, password recovery, etc. However, it is not unusual to come across a situation where the workflow capabilities provided out of the box in the product, is not sufficient to fulfill your business requirement.

Re-issue Existing Password Recovery Confirmation Code in Followed Recovery or Resend Requests

Photo by Micah Williams on Unsplash This article discusses a new feature which will be released for the public distribution of WSO2 Identity Server 5.12.0. This feature was developed to overcome the following scenario: You can refer to the following diagram for a deeper understanding of the above flow. This scenario can be experienced by anyone. As such, we introduced a new way to handle this scenario (as shown below) for the notification based password recovery flow.

Kong Builders - May 25 - How to install and run Kuma on AWS ECS

Kong Builders is the livestream series that takes our developer-focused toolsets and puts them on display in the best venue possible – building applications and connecting workloads. In this week's Livestream, Kat Morgan will walk through how to install and run Kuma on AWS ECS See upcoming and past episodes at Konghq.com/kong-builders
Sponsored Post

How to Test Microservices in Kubernetes

In this article, you will learn about some of the tools to test microservices running in a Kubernetes cluster. In particular, we will compare the Speedscale CLI tool with other tools and the main benefits of using Speedscale CLI. In the last few years, software companies have been shifting from building monolith applications to utilizing smaller microservices. In a microservices architecture, you operate with decentralized applications. This means that there's a separation in which each service is responsible for a specific component of your application.

The API Mandate: How a mythical memo from Jeff Bezos changed software forever

You would think in the Internet age, primary sources for a widely discussed event — one that’s helped define cloud computing and today’s cascading digital transformation of enterprises — would be easy to track down. The original footprint must be somewhere. But that’s not so in the case of the arresting “API Mandate,” perhaps better thought of now as the API Mandate or API-First Mandate.

The Complete Guide to API Portals in the New API Economy

A key part of the API ecosystem, API portals are critically important to enable companies to make the most of APIs, or Application Programming Interfaces. In this post, we’ll detail API portals and their uses and functionality, as well as the new API economy and how you can get started optimizing APIs.

Generic Connection to the Microsoft Graph API

Resources Sample File: MicrosoftGraphTemplate.lsoz (65.8 KB) (download) API Reference: More information on the specifics of authentication can be found in the Microsoft Graph API reference documentation. Microsoft offers a RESTful web service named Microsoft Graph API. This tutorial shows you how to integrate with the Microsoft Graph API and Linx, a low-code development tool.

How to call SOAP Services using REST

SOAP, being a mature technology, has an extensive and often differently interpreted standard set. This makes it an excellent tool for corporate users to manipulate data into their precise requirements and technology stack. However, for public consumption, this causes issues that sometimes are difficult or impossible to solve without changing code. A good example here is that SOAP is allowed to define the same type in some standard interpretations in different XSD files.

SaaS integration strategy: Key approaches, trends and challenges

If you’re a SaaS company, it is impossible not to tackle the topic of integration. Whether you’re a small software business or a large, established tech enterprise with several SaaS products, every commercial conversation is highly likely to involve the question “Will I be able to sync data from your application with my CRM / ERP / Finance / Marketing” – you name it.

5 Low-Risk Digital Transformation Strategies

APIs or application programming interfaces make sure data is able to travel to and from specific destinations and sources with ease. Data isn’t the only thing that needs to travel safely, which is why APIs in the transportation industry are so popular for everything from booking an Uber to getting a shipment of goods delivered. APIs help websites, servers, and apps integrate efficiently and effectively by allowing different software endpoints to communicate with each other.

How to Plug an Existing User Store into WSO2 Identity Server?

Are you someone who already has a legacy system in place and wants to migrate to a modern authentication system with Identity and Access Management (IAM) features? The first thing you need to consider is how you can use the existing legacy user store with this new system. Keep in mind that if the legacy user store uses an old security mechanism to store your data, we would recommend that you migrate to the WSO2 JDBC user store format or Active Directory (AD).

API monetization: Technical best practices

Jason Cumberland, CPO and co-founder of API and data monetization platform HyperCurrent, contributed to this post. In our last article on how to get started with API monetization, we laid out how to build your API monetization strategy and avoid common pitfalls that occur when trying to get to your first minimum viable product release.

Continuous Performance Testing in CI Pipelines: CircleCI

With over 50,000 active organizations and 250 million workflows, CircleCI is one of the most popular networked CI platforms. When getting started with CI pipelines, teams typically want to ensure that code will compile, pass unit tests, and build a container image. After catching these low hanging fruit of syntax errors, engineering teams need to dig much further to find business logic and scalability errors.

How To Define an API Integration To Support Business Agility

API integrations are foundational to the innovation and agility companies need to remain competitive. Using APIs lets companies connect systems to build new capabilities to extend their services and provide enhanced customer experiences. This guide discusses API integrations and shows you how to define an API integration to start building your API ecosystem.

Proof of possession for OAuth2 tokens(DPoP) with WSO2 Identity Server #Identityin15

In today's episode, we will discuss how you can secure OAuth2 Tokens with DPoP using the WSO2 Identity Server. DPoP (Demonstrating-Proof-of-Possession) is an additional security mechanism for the token generation which overcomes the issue of bearer token which will not validate between who is requested token and who is actually using the token for the access of a particular resource. The following is the outline for today's session.

Kong Inc. supports the newly announced Envoy Gateway project to reduce fragmentation in the Envoy ecosystem

Today, the Envoy community has introduced Envoy Gateway, a new project to better support Kubernetes deployments via the new Kubernetes Gateway API, which is the next generation Ingress specification in Kubernetes world. Kong has been deeply invested in the success of Envoy since we started developing Kuma in 2019 – now used in Kong Mesh (built on top of Kuma).

The Best Business Digital Transformation Software

Whether you’re a new business or a well-established company, in the 21st-century business world, data reigns king. To stay relevant in the current age, every business must invest in some form of digital transformation. The best business transformation software can help your business’s transformation. If your company isn’t incorporating digital technologies into your business strategy, you’ll soon be left in the dust of your competitors.

What Are the Benefits of Snowflake for Your Organization?

In January 2022, Snowflake revealed it had over 5,900 customers, including 241 companies in the 2021 Fortune 500, making it one of the most popular cloud-based data warehouses on the planet. In short, the platform provides a single source of truth (SSOT) for all data that flows in and out of your organization, enabling you to run that data through business intelligence (BI) tools for deep data analysis.

Tech Talk: Day Zero Service Mesh

In this session, Viktor Gamov walks you through how to easily set up #servicemesh across multiple environments and automatically enable #security and #observability on any network. About this Webinar Service mesh is the future of application connectivity. It delivers immediate value to any architecture by increasing application traffic’s security, reliability and observability. At the same time, it can be challenging to understand and deploy service mesh in production—but it doesn’t have to be this way.

How We Improved Table Performance in AppSignal - Back-end Changes

In our last development cycle, we spent time improving our table performance in AppSignal. As customers stay around for longer, data starts piling up. A view with just 10 items in the beginning gathers hundreds of items, and keeps growing. Besides filtering data in the front-end to reduce the returned data, we wanted to ensure our data could keep growing without timeouts in our GraphQL API or slow-loading pages in our app.

7 Reasons to Use an API for Video Delivery

Video delivery is more complex than ever. OTT providers need to ensure a quality experience for their customers while also delivering video that meets the expectations of advertisers. This can be a challenge, but using an API for video delivery can help make it easier. An API for video delivery can help you manage your content more effectively and deliver it to the right people at the right time. It can also help you keep track of who is watching your video and how they are interacting with it.

API monetization: How to get started

One of the most common questions we’re asked by prospective customers is “what’s the right way to get started with API monetization?” In this article, we’ll do our best to lay out what we’ve seen work most frequently — and call out a few common pitfalls as well. What we can say with certainty is that, “Build it and they will come,” doesn’t work as an API monetization strategy.

Kong and AWS partnership facilitates Open Banking

Open Banking is a key digital transformation initiative in many countries. Its aim is to provide end users with more control of their financial data and to enable companies involved in banking, financial services, and insurance (BFSI) to quickly offer new services. The Kong-AWS partnership provides the right technology enabling these financial institutions to transform and meet the key requirements of Open Banking.

How to Customize Your Profile View Experience in Moesif

At Moesif, we’ve put a lot of work into improving viewing details and trends for specific users and companies. This includes our recent addition of adding profile dashboards to add individual and reusable charts to user and company profiles Now, we’ve added even further functionality by allowing users to customize what each individual user and companies profile view looks like.

Performance optimization techniques used in Asgardeo - Part 02

This is the second installment of the series. As a result, if you haven't yet completed Part 01 of the series, it is highly urged that you do so first. According to the official website, Asgardeo is an IDaaS that allows developers to create seamless login experiences in minutes. Let's concentrate on the performance optimization approaches utilized in react and webpack in this article.

API Meetup: Venture Capitalist Steve Forte on How to Build Winning Developer-First Companies

In a fireside chat, with VC Steve Forte of Fresco Capital, Moesif's CMO, Lawrence Ebringer, discusses how to master developer marketing and build a billion-dollar company. In somewhat of a wide-ranging discussion, Steve shares his perspectives on.

Ep #14: Erik Wilde on Focusing on the Business Case for your API

Eric Wilde is a prolific YouTuber, author, standards contributor and Catalyst at Axway. He's been working in web technologies and APIs for most of his career. And has just finished the second edition of his book Continuous API Management. Eric shares his perspectives on the business aspects of APIs, specifically.

Kong Builders - Kubernetes Ingress Controller: Expose TCP services with Kong

This week, Viktor Gamov will show you how to expose TCP services using Kong #Kubernetes Ingress Controller. Kong Builders is a livestream series that takes our developer-focused toolsets and puts them on display in the best venue possible – building applications and connecting workloads. We’re taking a hands-on, practitioner-focused approach to exploring Kong’s tools. We’ll build from the ground up - debugging/troubleshooting as we run into problems.

REST API Best Practices for Parameter and Query String Usage

Over the last ten years, APIs have grown in popularity and utilization. They've evolved into critical components of application infrastructure, and as businesses continue to use and build them, good API architecture will become increasingly important. A smart API design helps performance and the overall developer experience, whether they're public or internal. The most common APIs employ HTTP requests to access and use data and follow a RESTful architecture.

Audit Logging for Micro-Integrator

When you are running a micro-integrator on a microservices environment, administrators who have admin access to the micro-integrator are able to change its configurations via admin services API. When someone needs to debug the system and find out which person did what change, then the micro-integrator needs to keep a log of activities performed on the micro-integrator. Audit logs are simply a set of logs that let you find what are the changes performed on the micro-integrator instance. Audit logs feature support from the APIM 4.1.0 onward.

Performance optimization techniques used in Asgardeo - Part 01

This post explains the approaches we used to improve performance in our application. This knowledge will also assist you in applying these strategies to your projects as required. Please keep in mind that this post series focuses solely on the front end. According to the official website, Asgardeo is an IDaaS that allows developers to create seamless login experiences in minutes.

Composing Effective Consumer Onboarding Workflows, Part 1

Consumer onboarding is one of the, if not the most, important functions of a customer identity and access management (CIAM) solution. An overly complicated onboarding workflow significantly detracts from the consumer experience. Providing an effective, engaging and efficient onboarding workflow without compromising security has always been a challenge among security and risk professionals.

Composing Effective Consumer Onboarding Workflows, Part 2

In part 1 of this series, we introduced the three most common abstract workflows based on the method in which they are initiated. But what makes an abstract workflow a concrete workflow are the different types of components that make up the workflow. In this article, we will take a look at these components.

APIs and Logistics: How APIs Are Changing the Face of the Logistics Industry

Companies of all sizes and industries are unlocking new possibilities thanks to APIs (application programming interfaces). There are many common uses of APIs, from driving business agility to improving the customer experience. However, there are few sectors where APIs have so much potential as the logistics industry. From giant e-commerce retailers like Amazon to small mom-and-pop businesses, shippers, couriers, and delivery services can all benefit from using a logistics API.

API Rate Limiting: How to avoid hitting rate limits in API integration

When talking about API integration, the matter of API rate limiting is unavoidable. Researching what the rate limits of the APIs you’re going to ‘consume’ in your integrations are should be part of your overall preparation for the development of your project scope. It is also a crucial detail to know when you will be designing your integrations; rate limits will define early on what mechanism you need to implement to avoid hitting them in the first place.

Per API Logging Support for WSO2 API Manager

APIM per API logging support lets you enable logging request details per API basis. This will significantly impact APIM performance when you need to collect logs that come in to and out of the APIM instance. Users are able to enable or disable logging for each API by using the APIM REST API. WSO2 APIM logging gives you multiple log levels that let you log information in different levels.

The Future of Passwordless Authentication

Do you recall what your first password was? It was probably something easy that you could remember easily, such as your birthdate or the name of your pet. However, as you created additional online accounts, your passwords grew more complex and difficult to remember. It's a problem that many people face. As a result, many of us tend to reuse passwords across many accounts, exposing our personal information to theft.

Using gRPC with Golang

In this tutorial, you will learn how to work with the gRPC Golang library for microservice communication by creating a simple note-taking application. APIs and service-to-service communication are what make modern microservice architecture possible. REST is generally the preferred implementation pattern, but if you only use REST, you could miss out on the significant performance gains that gRPC can offer. gRPC can provide better speed and efficiency than REST APIs.

GraphQL vs REST API: Which is better for API Observability?

API providers need to observe their APIs to get meaningful data about whether and how they are consumed in practice. API observability is a form of monitoring that passively logs API traffic to an observability service. Different from traditional API monitoring, with API observability you: Monitor interactions to improve developer experience Understand how customers use your API Troubleshoot your API Observing REST APIs is well understood and supported, but not every API is a REST API.