The key difference between Authentication and Authorization: Authentication proves who you say you are, whereas Authorization asks if you are allowed to perform an action.| Nordic APIs
In this article, we dig into how to create outstanding developer experiences for our APIs. Featuring insights from expert speakers from our upcoming Austin API Summit.| Nordic APIs
There are ten top security vulnerabilities for APIs. Here's how to test your services for them, along with helpful tools to avoid these most common flaws.| Nordic APIs
Far different than traditional software versioning, API versioning can have complex implications for the products using it downstream. In this article we cover the most widely used approaches in the API space, including traditional URI versioning, using the Accept Header, continuous versioning, and more.| Nordic APIs
A break down of the various factors at play when developing and running your API product.| Nordic APIs
An "open everything" movement is happening. And it's global. Banking, healthcare, government, AI, energy, and other sectors are opening their data.| Nordic APIs
Learn about the importance of FIDO2 and biometric authentication in enhancing security and user experiences for mobile and handheld devices.| Nordic APIs
Crafting an internal API style guide is great when a company has a suite of various APIs, or is outsourcing API development. Your style guide should include these essential points.| Nordic APIs
Ensuring design and style consistency across an API platform can boost developer usability. Here we dive into four areas you may want to check out.| Nordic APIs
The 2002 Bezos API Mandate helped Amazon scale their business, and formed much of the modern thought around APIs and microservices. But was this memo real, or just myth?| Nordic APIs