Prepare for the next wave of challenges in enterprise security.
This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange.
Exposing functionality is convenient, but of course comes with a risk of exploitation.
Enterprise APIs have become the common way of exposing business functions to the outside world.
Learn to better protect, monitor, and manage your public and private APIs.
Prepare for the next wave of challenges in enterprise security