Our physical and digital worlds are colliding. A new web epoch approaches — an era called the Internet of Things (IoT). In this realm, home devices, city sensors, smart cars, wearables, and every other device we use is connected to the Internet.| Nordic APIs
In this article we offer both practical tips on technical implementation, and more philosophical considerations on complexity when designing an API.| Nordic APIs
We review the 3 main methods used for security and authentication control in the realm of APIs - HTTP Basic Authentication, API Keys, and OAuth| Nordic APIs
Standardized banking APIs are the new trend for the FinTech industry, opening data to enable in-app marketplaces and new financial themed user experiences.| Nordic APIs
What does it take to be a software evangelist? An API evangelist? Developer community outreach is no small feat. Learn what the job entails to see if you're up for the challenge.| Nordic APIs
It seems that a limitation has been reached as open transparency becomes a barrier to profitability amongst public social APIs like Instagram API, Twitter API, and others.| Nordic APIs
3rd party API changes can hit you like a freight train! Here are techniques to stay updated with new versions in your dependencies with continuous testing.| Nordic APIs
The IoT is coming, and OAuth 2.0 is the way to secure it. We define OAuth 2.0, what it accomplishes, and why Jacob Ideskog sees it as key to IoT security.| Nordic APIs
How do you handle a batch process using OAuth? We describe a flow for creating long-lived access tokens bound to the request to secure API identity control.| Nordic APIs
In this post we'll see why APIs and microservices should decouple user identity from their designs, and how to go about this implementation using scopes.| Nordic APIs
API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain keys can be decompiled to extract keys, or deobfuscated from on-device storage, plaintext files can be stolen for unapproved use, and password managers are susceptible to security risks as with any application. In this piece we outline the disadvantages of solely relying on API keys to secure the proper access to your data.| Nordic APIs
PSD2 is an EU regulation that will regulate open banking across Europe, enabling third parties to create new FinTech apps and fostering API economy growth.| Nordic APIs
Don't overlook these HTTP features in your API or web app: Cache-control, Keep Alive, Request pipe-lining, compression, and serving partial content.| Nordic APIs
Input-constrained browserless environments require a special OAuth recipe. In this article we describe authorization for an example living room streaming app, advocating for the new OAuth Device Flow for ultimate API security.| Nordic APIs