
Автор: Gary Archer, Judith Kahrer, Michał Trojanowski
Издательство: O’Reilly Media, Inc.
Год: 2025
Страниц: 418
Язык: английский
Формат: epub
Размер: 10.1 MB
With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth, a powerful framework for API security, offers tools to protect sensitive business data and enforce dynamic access controls. But to harness its full potential, you need more than standards—you need strategies for adapting to evolving security demands.
Designed for developers, architects, and security professionals, this guide provides everything you need to secure APIs in the cloud native era—ensuring your business data stays protected. You'll learn how to combine OAuth's token-based model with cloud native platforms like Kubernetes to build a scalable, zero trust security architecture. With OAuth, you can go beyond simple allow/deny rules and create security policies that align with business needs, while Kubernetes provides best-in-class deployment patterns to keep systems secure and efficient.
We supplement the book’s theory with code examples that you can download from the book’s GitHub repository. Each code example provides an end-to-end solution that you can run without restrictions on a Windows, macOS, or Linux development workstation. When applicable, you can also deploy examples to a local Kubernetes cluster. Example APIs and clients follow current best practices at the time of writing. Most code examples and code snippets use TypeScript, as a simple yet expressive language. On mobile platforms we use languages specific to the platform, namely Kotlin and Swift. You can implement the same patterns in alternative technology stacks.
Understand why user identity must be part of your cloud native security stack
Discover how to integrate user identity into APIs
Learn to externalize security and secure data access using OAuth
Uncover methods for running security components in a Kubernetes cluster
Get the latest security best practices for client applications and APIs
Who This Book Is For:
The content is aimed at any developer, architect, or site reliability engineer interested in API security. You may work with APIs that already have some basic security but want to learn how to update to a zero trust architecture. Preferably, you have an intermediate-level knowledge of APIs and API security. We use Docker and Kubernetes to provide examples that implement our security designs. Thus, if you are familiar with containers, you will get a more hands-on experience from the book. However, you can apply the concepts we describe to any cloud native platform. The book is detailed in places, so you should be prepared to absorb a considerable amount of content on identity topics. Above all, you should be willing to adopt a separation-of-concerns approach to software engineering.
Скачать Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture
