We review the 3 main methods used for security and authentication control in the realm of APIs - HTTP Basic Authentication, API Keys, and OAuth| Nordic APIs
What are the basic ingredients a developer needs to consume an API? We've boiled down API usability into 7 key elements that must be present (and spotlighted) on every web API documentation, regardless of function or form.| Nordic APIs
Input-constrained browserless environments require a special OAuth recipe. In this article we describe authorization for an example living room streaming app, advocating for the new OAuth Device Flow for ultimate API security.| Nordic APIs