Home > Design Patterns > Secure Cloud Interfaces and APIs

Secure Cloud Interfaces and APIs (Cope, Erl)

How can APIs be secured against unauthorized access?

Secure Cloud Interfaces and APIs

Problem

On-premise and cloud-based resource interfaces and APIs are, by default, vulnerable to attacks through a number of vectors and methods.

Solution

A cloud identity and access management (IAM) system is instituted to differentiate intruders from legitimate consumers.

Application

An authentication gateway service (AGS) and an IAM system are implemented to identify and authenticate legitimate consumers and grant them access, while denying access to intruders.
Secure Cloud Interfaces and APIs: The AGS authenticates cloud consumers for access to APIs.

The AGS authenticates cloud consumers for access to APIs.