Securing microservice APIs: sustainable and scalable access control
There are several techniques for controlling access to web APIs in microservice architectures, ranging from network controls to cryptographic methods and platform-based capabilities. This short ebook introduces an API access control model that you can implement on a single platform or across multipl...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media
2018
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781492027140/?ar |
Zusammenfassung: | There are several techniques for controlling access to web APIs in microservice architectures, ranging from network controls to cryptographic methods and platform-based capabilities. This short ebook introduces an API access control model that you can implement on a single platform or across multiple platforms to provide cohesive security across your network of microservices. Until now, speed of delivery rather than security has motivated organizations to adopt a microservices architecture. Authors Matt McLarty and Rob Wilson propose a vocabulary and model for logical and physical systems of microservices, review current practices for web API access control in a microservice architecture, and present DHARMA--a comprehensive, platform independent approach to API access control. This ebook is ideal for architects, product owners, development leaders, platform teams, and operational managers. This ebook includes: A platform-neutral overview of the microservices landscape Current network-, trust-, and platform-based security technologies and solutions that apply to microservice APIs The proposed DHARMA cross-platform model for securing microservice API access control A word on the future direction of microservice API security. |
Beschreibung: | Online resource; title from title page (viewed January 10, 2019) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047626488 | ||
003 | DE-627-1 | ||
005 | 20240228120629.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)047626488 | ||
035 | |a (DE-599)KEP047626488 | ||
035 | |a (ORHE)9781492027140 | ||
035 | |a (DE-627-1)047626488 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a McLarty, Matt |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Securing microservice APIs |b sustainable and scalable access control |c Matt McLarty, Rob Wilson, and Scott Morrison |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c 2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title page (viewed January 10, 2019) | ||
520 | |a There are several techniques for controlling access to web APIs in microservice architectures, ranging from network controls to cryptographic methods and platform-based capabilities. This short ebook introduces an API access control model that you can implement on a single platform or across multiple platforms to provide cohesive security across your network of microservices. Until now, speed of delivery rather than security has motivated organizations to adopt a microservices architecture. Authors Matt McLarty and Rob Wilson propose a vocabulary and model for logical and physical systems of microservices, review current practices for web API access control in a microservice architecture, and present DHARMA--a comprehensive, platform independent approach to API access control. This ebook is ideal for architects, product owners, development leaders, platform teams, and operational managers. This ebook includes: A platform-neutral overview of the microservices landscape Current network-, trust-, and platform-based security technologies and solutions that apply to microservice APIs The proposed DHARMA cross-platform model for securing microservice API access control A word on the future direction of microservice API security. | ||
650 | 0 | |a Application program interfaces (Computer software) | |
650 | 0 | |a Application software |x Development | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Business |x Data processing |x Security measures | |
650 | 0 | |a Software architecture | |
650 | 4 | |a Interfaces de programmation d'applications | |
650 | 4 | |a Logiciels d'application ; Développement | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Gestion ; Informatique ; Sécurité ; Mesures | |
650 | 4 | |a Architecture logicielle | |
650 | 4 | |a APIs (interfaces) | |
650 | 4 | |a Application program interfaces (Computer software) | |
650 | 4 | |a Application software ; Development | |
650 | 4 | |a Business ; Data processing ; Security measures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Software architecture | |
700 | 1 | |a Wilson, Rob |e VerfasserIn |4 aut | |
700 | 1 | |a Morrison, Scott |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781492027140/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047626488 |
---|---|
_version_ | 1821494871295262720 |
adam_text | |
any_adam_object | |
author | McLarty, Matt Wilson, Rob Morrison, Scott |
author_facet | McLarty, Matt Wilson, Rob Morrison, Scott |
author_role | aut aut aut |
author_sort | McLarty, Matt |
author_variant | m m mm r w rw s m sm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047626488 (DE-599)KEP047626488 (ORHE)9781492027140 |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03324cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-047626488</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120629.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047626488</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047626488</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781492027140</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047626488</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">McLarty, Matt</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing microservice APIs</subfield><subfield code="b">sustainable and scalable access control</subfield><subfield code="c">Matt McLarty, Rob Wilson, and Scott Morrison</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (viewed January 10, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">There are several techniques for controlling access to web APIs in microservice architectures, ranging from network controls to cryptographic methods and platform-based capabilities. This short ebook introduces an API access control model that you can implement on a single platform or across multiple platforms to provide cohesive security across your network of microservices. Until now, speed of delivery rather than security has motivated organizations to adopt a microservices architecture. Authors Matt McLarty and Rob Wilson propose a vocabulary and model for logical and physical systems of microservices, review current practices for web API access control in a microservice architecture, and present DHARMA--a comprehensive, platform independent approach to API access control. This ebook is ideal for architects, product owners, development leaders, platform teams, and operational managers. This ebook includes: A platform-neutral overview of the microservices landscape Current network-, trust-, and platform-based security technologies and solutions that apply to microservice APIs The proposed DHARMA cross-platform model for securing microservice API access control A word on the future direction of microservice API security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application program interfaces (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Interfaces de programmation d'applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Développement</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion ; Informatique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture logicielle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">APIs (interfaces)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application program interfaces (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business ; Data processing ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software architecture</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wilson, Rob</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morrison, Scott</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781492027140/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047626488 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:16Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | O'Reilly Media |
record_format | marc |
spelling | McLarty, Matt VerfasserIn aut Securing microservice APIs sustainable and scalable access control Matt McLarty, Rob Wilson, and Scott Morrison First edition. Sebastopol, CA O'Reilly Media 2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title page (viewed January 10, 2019) There are several techniques for controlling access to web APIs in microservice architectures, ranging from network controls to cryptographic methods and platform-based capabilities. This short ebook introduces an API access control model that you can implement on a single platform or across multiple platforms to provide cohesive security across your network of microservices. Until now, speed of delivery rather than security has motivated organizations to adopt a microservices architecture. Authors Matt McLarty and Rob Wilson propose a vocabulary and model for logical and physical systems of microservices, review current practices for web API access control in a microservice architecture, and present DHARMA--a comprehensive, platform independent approach to API access control. This ebook is ideal for architects, product owners, development leaders, platform teams, and operational managers. This ebook includes: A platform-neutral overview of the microservices landscape Current network-, trust-, and platform-based security technologies and solutions that apply to microservice APIs The proposed DHARMA cross-platform model for securing microservice API access control A word on the future direction of microservice API security. Application program interfaces (Computer software) Application software Development Computer networks Security measures Business Data processing Security measures Software architecture Interfaces de programmation d'applications Logiciels d'application ; Développement Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Architecture logicielle APIs (interfaces) Application software ; Development Business ; Data processing ; Security measures Computer networks ; Security measures Wilson, Rob VerfasserIn aut Morrison, Scott VerfasserIn aut |
spellingShingle | McLarty, Matt Wilson, Rob Morrison, Scott Securing microservice APIs sustainable and scalable access control Application program interfaces (Computer software) Application software Development Computer networks Security measures Business Data processing Security measures Software architecture Interfaces de programmation d'applications Logiciels d'application ; Développement Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Architecture logicielle APIs (interfaces) Application software ; Development Business ; Data processing ; Security measures Computer networks ; Security measures |
title | Securing microservice APIs sustainable and scalable access control |
title_auth | Securing microservice APIs sustainable and scalable access control |
title_exact_search | Securing microservice APIs sustainable and scalable access control |
title_full | Securing microservice APIs sustainable and scalable access control Matt McLarty, Rob Wilson, and Scott Morrison |
title_fullStr | Securing microservice APIs sustainable and scalable access control Matt McLarty, Rob Wilson, and Scott Morrison |
title_full_unstemmed | Securing microservice APIs sustainable and scalable access control Matt McLarty, Rob Wilson, and Scott Morrison |
title_short | Securing microservice APIs |
title_sort | securing microservice apis sustainable and scalable access control |
title_sub | sustainable and scalable access control |
topic | Application program interfaces (Computer software) Application software Development Computer networks Security measures Business Data processing Security measures Software architecture Interfaces de programmation d'applications Logiciels d'application ; Développement Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Architecture logicielle APIs (interfaces) Application software ; Development Business ; Data processing ; Security measures Computer networks ; Security measures |
topic_facet | Application program interfaces (Computer software) Application software Development Computer networks Security measures Business Data processing Security measures Software architecture Interfaces de programmation d'applications Logiciels d'application ; Développement Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion ; Informatique ; Sécurité ; Mesures Architecture logicielle APIs (interfaces) Application software ; Development Business ; Data processing ; Security measures Computer networks ; Security measures |
work_keys_str_mv | AT mclartymatt securingmicroserviceapissustainableandscalableaccesscontrol AT wilsonrob securingmicroserviceapissustainableandscalableaccesscontrol AT morrisonscott securingmicroserviceapissustainableandscalableaccesscontrol |