![]() ![]() Both these are discussed below, but it is essential to understand the impact of this approach on the overall scalability aspect of the architecture. Two such implementations are Basic Authentication and API-Key based authentication. The most common approach that might come to one’s mind would be to have the actual API / Web Service perform authentication based on some information passed during the API call. However, to prevent getting lost in all the moving parts around securing APIs and web applications, this blog post strictly explains how tokens can be used for authenticating API calls. Do note that it takes much more than just a token to secure the APIs completely. Although the concepts can be applied to both internal-facing and external-facing APIs, the perspective maintained in this blog post is the latter, just to help you maintain a consistent frame of mind. This blog post will focus on using the upcoming JSON Web Tokens (JWT) standard ( RFC 7519) to protect your APIs. And that’s where API security comes into play. However, such APIs must be restricted to authorized users or members, typically external consumers. For instance, by leveraging APIs from your choice of a payment processor, a developer can easily enable PCI-compliant online payment capability on its app or website. ![]() Frontend applications or backend services can request real-time data via APIs and either presents them on a user interface or process them via backend services to support a business process. The most common approach to sharing such data is via APIs. For example, targeted product details, pricing, customer reviews, etc., can be seamlessly provided to prospective customers via multiple interfaces such as mobile notifications, web pages, mobile apps, intelligent assistants, etc. Rich enterprise datasets can also be used to create headless content management systems (CMS), which enable a rich user experience. Point-of-Sales (POS) datasets from retail stores and e-commerce platforms are utilized to identify upsell opportunities. For example, coded medical records are of immense value to hospitals as it helps them identify effective clinical pathways to treat their patients. Consumption-ready data is valuable and can be shared in exchange for value. Michael indicated that just like crude oil, data has no intrinsic value early on until it gets cleaned and refined, which makes it ready for consumption (Palmer, 2006). Michael Palmer described the similarities between oil and data. The phrase, “Data is the new oil,” quickly resonated with the masses when British mathematician Clive Humbly first coined it in 2006.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |