What are the best practices for the microservices architecture? Where does it miss? Where could it make your app more scalable?| Nordic APIs
API metrics analysis can be used to amplify success within the API space. This piece covers API metrics types, demonstrate applications, and uses two real-life examples of success and failure arising from differing metric analysis methodologies.| Nordic APIs
OAuth can be paired with OpenID Connect to perform delegation of user identity across microservices for secure and replicable control of access management.| Nordic APIs
API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain keys can be decompiled to extract keys, or deobfuscated from on-device storage, plaintext files can be stolen for unapproved use, and password managers are susceptible to security risks as with any application. In this piece we outline the disadvantages of solely relying on API keys to secure the proper access to your data.| Nordic APIs
Helper libraries, SDKs, bindings, wrappers - important to extend your API to specific programming languages. But how do you figure out which to support?| Nordic APIs