SlideShare a Scribd company logo
1 of 20
Download to read offline
Securing	Your	APIs:		
How,	What,	Why	and	When	
Dulanja	Liyanage	
Technical	Lead,	WSO2	
dulanja@wso2.com
A:ributes	of	a	secured	design	
Authen>ca>on	 Only	legi>mate	users	can	access	the	system	
Authoriza>on	 The	system	won’t	allow	users	to	do	anything	
more	than	what	they	are	supposed	to	do	
Confiden>ality	 Confiden>al	data	can	only	be	seen	by	the	
intended	recipients,	nobody	else	
Integrity	 Integrity	of	the	transac>ons	are	protected	
Non-repudia>on	 An	en>ty	cannot	deny	its	ac>ons	
Audi>ng	 All	anomalies	are	recorded	
Availability	 The	system	is	available	for	legi>mate	users	to	
access,	all	the	>me
HTTP	Basic	Authen?ca?on	
•  Crea?ng	a	GitHub	repository	
	
				curl	-I	
	-u	$GitHubUserName:$GitHubPassword			
	-X	POST	-H	'Content-Type:	applica>on/x-www-form-urlencoded’	
	-d	'{"name":	"my_github_repo"}'		
	hYps://api.github.com/user/repos	
	
Authorization: Basic QWxhZGRpbjpPcGVuU2VzYW1l
HTTP	Digest	Authen?ca?on	
curl	-k	--digest	--u	username:password	-v	hYps://localhost:8443/recipe	
	
	
	
	
	
Authorization: Digest username="prabath", realm="cute-
cupcakes.com",
nonce="1390781967182:c2db4ebb26207f6ed38bb08eeffc7422", uri="/
recipe", cnonce="MTM5MDc4", nc=00000001, qop="auth",
response="f5bfb64ba8596d1b9ad1514702f5a062",
opaque="F5288F4526B8EAFFC4AC79F04CA8A6ED"
HTTP/1.1 401 Unauthorized
WWW-Authenticate: Digest realm="cute-cupcakes.com", qop="auth”,
nonce="1390781967182:c2db4ebb26207f6ed38bb08eeffc7422",
opaque="F5288F4526B8EAFFC4AC79F04CA8A6ED"
HTTP	Basic	vs.	Digest	Authen?ca?on	
Basic	Authen?ca?on	 Digest	Authen?ca?on	
Sends	creden>als	in	clear	text	 Creden>als	never	sent	in	clear	text.	A	
digest	derived	is	sent		
Must	be	used	with	a	transport	level	
security	like	TLS	
Does	not	depend	on	transport	level	
security	
Only	performs	authen>ca>on	 Can	perform	authen>ca>on	and	
integrity	protec>on	(with	qop=auth-int)	
User	store	can	store	password	as	a	
salted	hash	
User	store	should	store	password	in	
cleartext	or	store	the	hash	value	of	
username:password:realm
TLS	Mutual	Authen?ca?on	
curl		-k	--cert	client.pem		h:ps://localhost:8443/recipe	
	
•  Gateway	itself	does	the	cer>ficate	valida>on	
•  Fine-grained	access	valida>ons	can	be	done	by	the	authoriza>on	server
OAuth
•  Allows	applica?ons	to	act	on	behalf	of	end	users	without	sharing	
creden?als	
	
•  Three-legged	OAuth	
–  Client,	Resource	Server	and	User	(Resource	Owner)	
•  Two-legged	OAuth	
–  Client	(Resource	Owner)	and	Resource	Server	
•  OAuth	1.0a	
–  Restric>ve,	cumbersome,	involves	signatures	
–  Only	twiYer	uses	it	
•  OAuth	2.0	
–  Depends	on	SSL	
–  A	framework	rather	than	a	concrete	standard	
–  Could	cater	many	use	cases	-	via	grant	types
Authoriza?on	Code	Grant	
Suitable	for	web	applica>ons.	
Implicit	Grant	
Suitable	for	mobile,	SPA	and	untrusted	public	apps	where	client	secret	cannot	be	
kept	private.	
Resource	Owner	Creden?als	Grant	
Suitable	for	apps	trusted	by	Authz	Server.	e.g.	official	FB	app.	
Client	Creden?als	Grant	
Suitable	to	retrieve	data	not	specific	to	end	users	-	e.g.	Weather/Stocks	-	and	for	
machine-to-machine	communica>ons.	
OAuth	2.0
OAuth	2.0	-	Authoriza?on	Code	Grant
OAuth	2.0	- Decoupling	End	User	Authen?ca?on	from	
the	Authoriza?on	Server
OAuth	2.0	-	SAML	Grant	Type
OAuth	2.0	-	JWT	Grant	Type
OAuth	2.0	-	NTLM	Grant	Type
OAuth	2.0	-	Chained	Grant	Type
Token	Introspec?on	
			
	
POST /introspection HTTP/1.1
Accept: application/x-www-form-urlencoded
Host: server.example.com
Authorization: Basic czZCaGRSa3F0Mzo3RmpmcDBaQnIxS3REUmJuZlZkbUl3
token=X3241Affw.4233-99JXJ&resource_id=…
{
"active": true,
"client_id":"s6BhdRkqt3",
"scope": "read write dolphin",
"sub": "2309fj32kl",
"aud": http://example.org/protected-resource/*
}
Standardiza>on	of	Resource	Server	->	Authoriza>on	Server	communica>on	
for	token	valida>on
Fine-grained	Authoriza?on	with	XACML
User-Managed	Access	(UMA)	
•  OAuth	2.0	solves	Person-to-Client	delega>on	
	
•  UMA	tries	to	solve/standardize	Person-to-Person	
delega>on	
e.g.	Luke	sharing	a	doc	on	Google	Drive	with	‘edit’	
rights	to	John	and	‘view’	rights	to	Peter	
•  Introduces	an	en>ty	named	“Reques>ng	Party”	
	
•  IoT	have	quite	interes>ng	scenarios	UMA	could	solve.
User-Managed	Access	(UMA)
Confiden?ality:		
•  TLS,	JWE	
	
Integrity:		
•  TLS,	JWS	
	
Non-repudia?on:		
•  JWS	
	
Audi?ng:	
•  Audit	logs	
•  Analy>cs	for	fraud/threat	detec>on		
	
Availability:		
•  Network	level	measures	
•  ThroYling: Client	level, User	level
Thank	You!	
#WSO2ConEU	
Share	your	feedback	for	this	session	
wso2con.com/app

More Related Content

What's hot

OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
Apigee | Google Cloud
 
[WSO2Con Asia 2014] Accelerating Mobile App Development with MBaaS
[WSO2Con Asia 2014] Accelerating Mobile App Development with MBaaS[WSO2Con Asia 2014] Accelerating Mobile App Development with MBaaS
[WSO2Con Asia 2014] Accelerating Mobile App Development with MBaaS
Afkham Azeez
 

What's hot (20)

Azure security guidelines for developers
Azure security guidelines for developers Azure security guidelines for developers
Azure security guidelines for developers
 
Data-driven Security: Protect APIs from Adaptive Threats
Data-driven Security: Protect APIs from Adaptive ThreatsData-driven Security: Protect APIs from Adaptive Threats
Data-driven Security: Protect APIs from Adaptive Threats
 
Protecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond OauthProtecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond Oauth
 
Spring security
Spring securitySpring security
Spring security
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
API Security in a Microservices World
API Security in a Microservices WorldAPI Security in a Microservices World
API Security in a Microservices World
 
Web application firewall advanced
Web application firewall advancedWeb application firewall advanced
Web application firewall advanced
 
Data-driven API Security
Data-driven API SecurityData-driven API Security
Data-driven API Security
 
API Security and Management Best Practices
API Security and Management Best PracticesAPI Security and Management Best Practices
API Security and Management Best Practices
 
Securing Microservices with Spring Cloud Security
Securing Microservices with Spring Cloud SecuritySecuring Microservices with Spring Cloud Security
Securing Microservices with Spring Cloud Security
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
 
Spring Boot Authentication...and More!
Spring Boot Authentication...and More! Spring Boot Authentication...and More!
Spring Boot Authentication...and More!
 
Security in mulesoft
Security in mulesoftSecurity in mulesoft
Security in mulesoft
 
Firewall seguro, proteção para aplicações
Firewall seguro, proteção para aplicaçõesFirewall seguro, proteção para aplicações
Firewall seguro, proteção para aplicações
 
Programming with Azure Active Directory
Programming with Azure Active DirectoryProgramming with Azure Active Directory
Programming with Azure Active Directory
 
apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...
apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...
apidays LIVE New York 2021 - OWASP cautions against “insufficient logging & m...
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
 
Security components in mule esb
Security components in mule esbSecurity components in mule esb
Security components in mule esb
 
[WSO2Con Asia 2014] Accelerating Mobile App Development with MBaaS
[WSO2Con Asia 2014] Accelerating Mobile App Development with MBaaS[WSO2Con Asia 2014] Accelerating Mobile App Development with MBaaS
[WSO2Con Asia 2014] Accelerating Mobile App Development with MBaaS
 
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsCSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web Apps
 

Viewers also liked

WSO2Con Asia 2014 - Connected Business and the API Economy: Challenges & Oppo...
WSO2Con Asia 2014 - Connected Business and the API Economy: Challenges & Oppo...WSO2Con Asia 2014 - Connected Business and the API Economy: Challenges & Oppo...
WSO2Con Asia 2014 - Connected Business and the API Economy: Challenges & Oppo...
WSO2
 

Viewers also liked (10)

WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise  with Security ArchitecturesWSO2Con EU 2016: Reinforcing Your Enterprise  with Security Architectures
WSO2Con EU 2016: Reinforcing Your Enterprise with Security Architectures
 
WSO2Con ASIA 2016: Getting Started with App Cloud and API Cloud for SMEs
WSO2Con ASIA 2016: Getting Started with App Cloud and API Cloud for SMEsWSO2Con ASIA 2016: Getting Started with App Cloud and API Cloud for SMEs
WSO2Con ASIA 2016: Getting Started with App Cloud and API Cloud for SMEs
 
WSO2Con ASIA 2016: Introduction to the All New WSO2 Governance Center
WSO2Con ASIA 2016: Introduction to the All New WSO2 Governance CenterWSO2Con ASIA 2016: Introduction to the All New WSO2 Governance Center
WSO2Con ASIA 2016: Introduction to the All New WSO2 Governance Center
 
WSO2Con USA 2015: Implementing SSO Across our Science-as-­a-­Service Web and ...
WSO2Con USA 2015: Implementing SSO Across our Science-as-­a-­Service Web and ...WSO2Con USA 2015: Implementing SSO Across our Science-as-­a-­Service Web and ...
WSO2Con USA 2015: Implementing SSO Across our Science-as-­a-­Service Web and ...
 
WSO2Con Asia 2014 - Connected Business and the API Economy: Challenges & Oppo...
WSO2Con Asia 2014 - Connected Business and the API Economy: Challenges & Oppo...WSO2Con Asia 2014 - Connected Business and the API Economy: Challenges & Oppo...
WSO2Con Asia 2014 - Connected Business and the API Economy: Challenges & Oppo...
 
WSO2Con USA 2015: Cross Section of an API Program: The NEXEN API Program at B...
WSO2Con USA 2015: Cross Section of an API Program: The NEXEN API Program at B...WSO2Con USA 2015: Cross Section of an API Program: The NEXEN API Program at B...
WSO2Con USA 2015: Cross Section of an API Program: The NEXEN API Program at B...
 
WSO2Con USA 2015: Optimizing Service Platforms with SOA Governance
WSO2Con USA 2015: Optimizing Service Platforms with SOA GovernanceWSO2Con USA 2015: Optimizing Service Platforms with SOA Governance
WSO2Con USA 2015: Optimizing Service Platforms with SOA Governance
 
WSO2Con ASIA 2016: Service Governance Meets API Governance: A Case Study
WSO2Con ASIA 2016: Service Governance Meets API Governance: A Case StudyWSO2Con ASIA 2016: Service Governance Meets API Governance: A Case Study
WSO2Con ASIA 2016: Service Governance Meets API Governance: A Case Study
 
WSO2Con EU 2016: On the dot – Deliveries When You Want Them
WSO2Con EU 2016: On the dot – Deliveries When You Want ThemWSO2Con EU 2016: On the dot – Deliveries When You Want Them
WSO2Con EU 2016: On the dot – Deliveries When You Want Them
 
WSO2Con USA 2015: End-to-end Microservice Architecture with WSO2 Identity Ser...
WSO2Con USA 2015: End-to-end Microservice Architecture with WSO2 Identity Ser...WSO2Con USA 2015: End-to-end Microservice Architecture with WSO2 Identity Ser...
WSO2Con USA 2015: End-to-end Microservice Architecture with WSO2 Identity Ser...
 

Similar to WSO2Con EU 2016: Securing APIs: How, What, Why, When

Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
bhumika2108
 
Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0
Adam Lewis
 

Similar to WSO2Con EU 2016: Securing APIs: How, What, Why, When (20)

FIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT Devices
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
 
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
 
Authentication and authorization in res tful infrastructures
Authentication and authorization in res tful infrastructuresAuthentication and authorization in res tful infrastructures
Authentication and authorization in res tful infrastructures
 
OAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID ConnectOAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID Connect
 
Adding Identity Management and Access Control to your Application
Adding Identity Management and Access Control to your ApplicationAdding Identity Management and Access Control to your Application
Adding Identity Management and Access Control to your Application
 
Implementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteImplementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking Site
 
OAuth and OEmbed
OAuth and OEmbedOAuth and OEmbed
OAuth and OEmbed
 
Growing HashiCorp Vault at Hootsuite
Growing HashiCorp Vault at HootsuiteGrowing HashiCorp Vault at Hootsuite
Growing HashiCorp Vault at Hootsuite
 
Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0
 
Adding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your AppAdding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your App
 
Some OAuth love
Some OAuth loveSome OAuth love
Some OAuth love
 
OAuth Base Camp
OAuth Base CampOAuth Base Camp
OAuth Base Camp
 
Securing application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environmentsSecuring application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environments
 
OAuth in the Wild
OAuth in the WildOAuth in the Wild
OAuth in the Wild
 
Tizen Web Application Checker
Tizen Web Application CheckerTizen Web Application Checker
Tizen Web Application Checker
 
Adding identity management and access control to your app
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your app
 
OpenID and OAuth
OpenID and OAuthOpenID and OAuth
OpenID and OAuth
 
Developing apps using Perl
Developing apps using PerlDeveloping apps using Perl
Developing apps using Perl
 
FIware Identity Manager
FIware Identity ManagerFIware Identity Manager
FIware Identity Manager
 

More from WSO2

More from WSO2 (20)

Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

WSO2Con EU 2016: Securing APIs: How, What, Why, When