Skip to main content
DI

API Security

Secure your APIs with modern authentication and authorization patterns. Covers OAuth 2.0 for APIs, token management, rate limiting, API gateways, and securing microservices architectures.

9 terms7 books1 comparisons

Key Terms

OAuth 2.0

Trending

An authorization framework that enables third-party applications to obtain limited access to a web service on behalf of a resource owner, without exposing credentials.

intermediateAuthorizationStandards & Protocols

OpenID Connect

Trending

OIDC

An identity layer built on top of OAuth 2.0 that allows clients to verify the identity of an end-user and obtain basic profile information using an ID Token.

intermediateAuthenticationStandards & Protocols

JSON Web Token

JWT

A compact, URL-safe token format that encodes claims as a JSON object, digitally signed for integrity verification, commonly used to transmit authentication and authorization information between parties.

intermediateStandards & ProtocolsAuthentication

Token-Based Authentication

An authentication method where a server generates an encrypted token upon successful login that the client includes in subsequent requests, eliminating the need to send credentials with every request.

beginnerAuthenticationAPI Security

Session Management

The process of securely handling user sessions after authentication, including session creation, tracking, timeout, invalidation, and protection against session hijacking and fixation attacks.

intermediateAuthenticationAPI Security

API Security

The practices, patterns, and technologies used to protect application programming interfaces from unauthorized access, data breaches, and abuse, including authentication, authorization, rate limiting, and input validation.

intermediateAPI SecurityAuthorization

OAuth Scopes

A mechanism in OAuth 2.0 that limits the access granted to a client application, defining specific permissions the client can request and the resource owner can approve.

intermediateAuthorizationAPI Security

Authorization Code Flow

An OAuth 2.0 grant type where the client receives an authorization code from the authorization server and exchanges it for access and refresh tokens via a back-channel request, providing the most secure flow for server-side applications.

intermediateAuthorizationStandards & Protocols

Proof Key for Code Exchange

PKCE

An extension to the OAuth 2.0 Authorization Code flow that protects against authorization code interception attacks by requiring the client to create a cryptographic code verifier and challenge.

intermediateAuthorizationStandards & Protocols

Recommended Books

OAuth 2 in Action

Justin Richer

OAuth 2 in Action

Justin Richer, Antonio Sanso

4.5

OAuth 2 in Action teaches you the practical use and deployment of OAuth 2 from the perspective of a client, authorization server, and resource server. You'll learn how to build an OAuth 2 ecosystem from scratch, understand the security implications, and implement it correctly in real-world scenarios.

intermediateAuthenticationAuthorization

OAuth 2.0 Simplified

Aaron Parecki

OAuth 2.0 Simplified

Aaron Parecki

4.6

OAuth 2.0 Simplified is a guide to building OAuth 2.0 servers and clients. Written by the author of oauth.com, it covers the OAuth 2.0 framework in clear, approachable language with practical examples for web and mobile applications.

beginnerAuthenticationAuthorization

OpenID Connect in Action

Prabath Siriwardena

OpenID Connect in Action

Prabath Siriwardena

4.3

OpenID Connect in Action provides a comprehensive, hands-on guide to the OpenID Connect protocol. It covers the core specification, discovery, dynamic registration, session management, and practical integration patterns for securing modern web and mobile applications.

intermediateAuthenticationAuthorization

API Security in Action

Neil Madden

API Security in Action

Neil Madden

4.7

API Security in Action teaches you how to create secure APIs for any situation. It covers authentication, authorization, audit logging, rate limiting, and encryption for REST, gRPC, and message-based APIs. The book uses practical Java examples but the principles apply to any language.

intermediateAPI SecurityAuthentication

Advanced API Security

Prabath Siriwardena

Advanced API Security

Prabath Siriwardena

4.1

Advanced API Security covers cutting-edge API security patterns including OAuth 2.0 extensions, OpenID Connect, UMA, token binding, and mutual TLS. It explores advanced topics like API gateways, service mesh security, and securing microservices architectures.

advancedAPI SecurityAuthentication

Real-World Cryptography

David Wong

Real-World Cryptography

David Wong

4.7

Real-World Cryptography teaches you applied cryptographic techniques for securing systems. It covers symmetric and asymmetric encryption, digital signatures, hash functions, key exchange, TLS, and advanced topics like secure messaging, post-quantum cryptography, and zero-knowledge proofs.

advancedCryptographyCybersecurity

Comparisons