Security
- Implementation of Oauth 2.0: Client Credentials, Password, Grant Code
- Client ID enforcement
- Cross-Origin resource sharing
- Protection against content-based attacks
The publication
- Creation and configuration of API Products
Analysis of flows and traffic
Advanced features
- Hosted Targets
- Shared resources
- Exception handling
- Cache management
Detailed presentation of the policies
- Security Policies
- Mediation Policies
- Load and quota limitation policies
- Format conversion policies
- Policies for calling external functions (JWT)