April 2018
Intermediate to advanced
332 pages
8h 5m
English
Once our microservice to expose data has been set up, the next step is to make sure the data is secured and that only the intended applications get the access to the data.
That is where software such as Kong (https://github.com/Kong/kong), Istio (https://istio.io/), or Tyk (https://tyk.io/) take the burden away from you. They provide an entire API gateway where things related to security—authorization and authentication, rate limiting, audit, and logging—can be done quite easily at the same time as monitoring the entire API microservice layer.
This is pretty good solution in modern times, not only for IoT-related stacks.
This concludes our section on API management. In the next section, we are going to look at applications ...