Systems | Development | Analytics | API | Testing

Authorizing Microservice APIs With OPA and Kuma

Many companies are leveraging DevOps, microservices, automation, self-service, cloud and CI/CD pipelines. These megatrends are changing how companies are building and running software. One thing that often slips through the cracks is security. With microservices, there’s an increase in the number of APIs companies have to protect. YouTube An error occurred. Try watching this video on www.youtube.com, or enable JavaScript if it is disabled in your browser.

Tutorial to Set Up Usage-Based API Billing with Moesif and Chargebee

Modern API businesses are migrating towards usage-based billing models which enables automatic expansion revenue while removing barriers to adopting a new API. With Moesif you can integrate with subscription management solutions like Recurly and Chargebee to quickly add advanced usage-based billing in a few minutes. In this guide, we’ll walk through integrating Moesif with Chargbee and some recommendations for usage-based billing.

New to APIs? Here's How To Start

As technology invades nearly every facet of our lives, businesses need to keep up. Digital transformation is a new normal for today’s business strategy, but you’ll need a solid foundation to work with. The solution to that is a solid application programming interface – or API for short. Did you know you can create an API in minutes without writing a line of code? Let DreamFactory show you how. Our 14-day free trial comes with a guided tour. Sign up today!

Launching API Programs in Non API-First Companies

Ep. 11: Jeannie Hawrysz, leader of API Programs at SAS Joining us is Jeannie Hawrysz, the Lead API Architect at SAS, a 22,000 person business analytics company. Before that she was an 18-year veteran at IBM and was the Technical Development Manager for IBM’s API Connect Micro Gateway. In our podcast she shares how to successfully launch API programs in non API-first companies.

Multi-layer API security with Apigee and Google Cloud Armor

Information security has become headline news on a daily basis. You have probably heard of security risks ranging from malicious bots used in schemes both big and small, to all-out "software supply chain attacks" that involve large-name enterprises and their customers, and that ultimately affect numerous governments, organizations, and people.

Introducing DreamFactory's MQTT Service

MQTT is a communication protocol for the publish-subscribe architecture. You can use DreamFactory as a MQTT client for your IoT projects. It’s easy to connect to any MQTT-based message broker using DreamFactory and easily publish and subscribe to any topic. DreamFactory’s MQTT client service is native to the platform, supporting role-based access controls, live API documentation, and more.

Kong Mesh 1.2 Is Here With Embedded OPA Support, FIPS 140-2 Compliance and Multi-Zone Authentication

We are truly excited to release Kong Mesh 1.2 today and introduce three new security capabilities that make it the most secure enterprise service mesh available today. Kong Mesh is built on open source Kuma which Kong created in 2019 and has since donated it to the CNCF. Kuma is a universal control plane for service mesh that is based on Envoy.

4 Excellent API Tools That Will Improve Your Integrations

Developers need excellent API tools that help them improve the quality of integrations and at the same time, reduce the time required to develop these integrations. Ideally, API tools should reduce the risk of integration and performance issues when developing new applications and should provide an effective means of accessing data that is often locked up in a variety of organisational databases.

How to Use Kong Gateway OAuth2 Plugin

Learn how to add OAuth 2.0 authorization and authentication to your service by integrating Kong Gateway and its OAuth 2.0 plugin. What Does the Kong Gateway OAuth2 Plugin Do? As Kong Gateway sits in front of a resource server, the OAuth 2.0 plugin adds authorization server functionality to that resource server — handling authorization requests, inspecting and refreshing tokens, and permitting or forbidding access to resources.