Link Details

Link 900383 thumbnail
User 160815 avatar

By rossmason
via blogs.mulesoft.org
Published: Jan 04 2013 / 08:32

We tackle an increasingly important question in the world of APIs: Presume that you would like to create a remote API (which perhaps exposes some API is protected in such a way that: A) Only clients that you trust can access them; B) Those clients can access your API through the explicit authorization of their end-users; and C) The end-users can be authenticated with a central entity, *withouth* having to share their credentials with your API’s clients.
  • 8
  • 0
  • 1232
  • 963

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (7)



Voters Against This Link (0)



    Apache Hadoop
    Written by: Piotr Krewski
    Featured Refcardz: Top Refcardz:
    1. Play
    2. Akka
    3. Design Patterns
    4. OO JS
    5. Cont. Delivery
    1. Play
    2. Java Performance
    3. Akka
    4. REST
    5. Java