Our physical and digital worlds are colliding. A new web epoch approaches — an era called the Internet of Things (IoT). In this realm, home devices, city sensors, smart cars, wearables, and every other device we use is connected to the Internet.| Nordic APIs
API metrics analysis can be used to amplify success within the API space. This piece covers API metrics types, demonstrate applications, and uses two real-life examples of success and failure arising from differing metric analysis methodologies.| Nordic APIs
Think you know your target audience? As diversity increases in the API economy, we reconsider API user segmentation, defining specific traits that make up today’s unique API consumer.| Nordic APIs
To kick off a series of blog posts on the API lifecycle, we’ll define what we mean by this term and explore it from a high level. In subsequent posts we’ll dig into the details, so be on the lookout for those!| Nordic APIs
This article aims to bolster your defenses by defining the four foundations of API security: Authentication, Authorization, Federation, and Delegation.| Nordic APIs
We define the three general approaches to API licensing and availability, comparing Public, Partner, and Private APIs to Leather, Chain, and Plate armor. Expose only what needs to be exposed.| Nordic APIs
In this article we offer both practical tips on technical implementation, and more philosophical considerations on complexity when designing an API.| Nordic APIs
Ping Identity’s Paul Madsen explains how OpenID Connect can be used for Native SSO, Mobile Identity Management & secure Internet of Things applications| Nordic APIs
OAuth 2 and OpenID Connect are fundamental to gold standard API security. Learn the details of these protocols, so you can secure your APIs!| Nordic APIs
OAuth can be paired with OpenID Connect to perform delegation of user identity across microservices for secure and replicable control of access management.| Nordic APIs