API security

– API calls occur in the background during web browsing, rendering customised pages.

– Server-side API calls may involve multiple micro-services communicating via internal APIs.

– Users can only access their own messages and send messages to friends.

– Users are seeking better authentication than HTTP Basic due to CPU overhead from password hashing.

– Token-based authentication allows users to log in once and be trusted for an hour.

– A random token is generated upon login and used for subsequent requests.

– Tokens are stored in a database and deleted upon logout or expiration.

– Transition to token-based authentication involves a new login endpoint.

– The login endpoint verifies credentials and issues a time-limited token.

– The API endpoint authenticates requests using a shared token store.

– Key security measures:

– Identify user, client, date, time, request type, resource, and success.

– Note simultaneous requests.

– Remove unused APIs (Zombie APIs).

– Ensure data encryption in transit and at rest.

– Use secure tokens and API gateways for authentication and authorisation.

– Conduct regular security scans to identify and fix vulnerabilities.

Leave a comment