A look on different token sharing approaches in the Service Mesh.
What you should consider when using JWTs in your applications.
A variation of the phantom token approach, which does need the introspection step.
A write-up of the top API security vulnerabilities according to OWASP and mitigating approaches.
Securing APIs and Microservices using tokens.
There is a spectrum of API security implementations, and not all of them are effective.
API security encompasses the practices, processes, and products used to ensure APIs are secure, data can be transferred safely, and malicious attacks are prevented. APIs power the connectivity of the digital world. They offer faster integrations and increased freedom of choice when it comes to products. Keeping APIs, and the data provided through them, safe and only available to the intended user is a must. In this section we have gathered information covering the most important aspects of securing APIs and microservices.