FUJITSU Cloud Service K5 API Management. Function Manual. Version 1.4 FUJITSU LIMITED

Size: px
Start display at page:

Download "FUJITSU Cloud Service K5 API Management. Function Manual. Version 1.4 FUJITSU LIMITED"

Transcription

1 FUJITSU Cloud Service K5 API Management Function Manual Version 1.4 FUJITSU LIMITED

2 FUJITSU Cloud Service K5 API Management Function Manual Version 1.4 Date of issue: March 2018 All Right Reserved, Copyright FUJITSU LIMITED No reproduction or republication without written permission.

3 Revision History Version Date Description 1.0 Feb. 1st, 2016 Original version 1.1 Feb. 25th, 2016 Update of the screen image for version up. 1.2 Jul. 1st, 2016 For API Management Standard released. 1.3 Jul. 22nd, 2016 Modification to sections to improve usability 1.4 Mar. 22nd, 2018 Add description of Java Callout and API, Product and organization History.

4 Introduction This document provides an a functional explanation of FUJITSU Cloud Service K5 API Management (hereinafter referred to as APIM). The APIM Platform as a Service (PaaS), provides customers with a WebAPI management platform. Only API Managment Pro Available in the API Management Pro. Notes The contents of this manual are subject to change without notice.

5 Table of Contents 1. Introduction WebAPI Service Overview Function Overview API Services What is an API Proxy? What is a Policy? What is a Publishing API? What is a Backend Service? What is API Analytics? APIM System Constitution Diagram Dashboard What is the dashboard? API Policies List of Policies Traffic Management Security Mediation Extension API Proxy Flows What are Flows? Understanding API Resources API Development Lifecycle Trace Tool Online Trace Tool Offline Trace Tool Publish Publishing Overview Task1: Create an API product on API Management Task2: Register an app developer on API Management Task3: Register an app on API Management What is an API Product? Access API products from an app Register developers for your API API Developers About Apps Analytics Proxy Performance Traffic Average Response Time Traffic by Proxy Average Response Time by Proxy Target Performance Traffic by Target Traffic Response Time Target Errors Payload Size Cache Performance Metrics Latency Analysis...54

6 Metrics Error Analysis Error Composition Proxy Errors Target Errors Errors by Proxy Errors by Target Developer Engagement Engagement Active Developers Analyze developer engagement Metric Traffic Composition Metric By Dimension mode Dimension Traffic Composition Top 10 Monthly Composition Traffic by Dimension Business Transactions Metric MOST TRAFFIC LEAST TRAFFIC HIGHEST ERROR RATE LOWEST ERROR RATE Devices Traffic by Platform Traffic by Agent Traffic by Device Type Custom Reports Custom Report button Report Name Links Edit button Analyze buttons Admin About Users What Information Defines a User? What are Roles? User roles Predefined organization roles Managing organization users What are Organization Users? API Management Entities and Organization Users interaction API, Product, and organization history API history API product history Organization history...75

7 1. Introduction This chapter provides an overview of APIM service and its functional components that are required to use this service.

8 1.1. WebAPI Service Overview As the API centric Application architecture becomes a foundation for development of robust and scalable enterprise applications, Fujitsu K5 API management service provides customers with API governance, standardized conventions for documentation, consistent security and access control to build next generation applications. Today, a web-based application is not enough to reach all of it's customers. The customers of the application or the endpoints interacting with Application are smart devices such as iphone, mobile, tablets etc. The application architecture is moving from the web towards API architecture i.e. to expose service data to the browsers and as well as to all these smart devices. WebAPI is the great framework for exposing data and service to different devices. Moreover WebAPI is open source an ideal platform for building RESTful services. It use the full features of HTTP (like URIs, request/response headers, caching, versioning, various content formats) WebAPI enables Application developers to access various kinds of services by programing code. API users are able to utilize various functions by aggregating number of APIs. The WebAPI only exchanges data and the client side is not necessarily a browser, It can be any format provided that HTTP can be used as shown in figure below: Fujitsu K5 platform in collaboration with specialist WebAPI solution provider APIGEE is extending the APIGEE Edge platform for customers to undertake their Digital Transformation and build ecosystem for growth.

9 1.2. Function Overview APIM service includes 5 functional components as per the table below. Function API Proxy Publish Analytics Description The main function is to manage (create, edit, delete, and deploy) API Proxy. Policies and Flows can be defined to the API Proxy. API Proxy provides development lifecycle function including versioning and deployment to optimize development processes of API Proxy and trace function to debug API Proxy. This function exposes your API Proxies and make available to apps. To expose and available the API Proxy: 1. Create Products 2. Register Developers 3. Register Apps Each step and components details, see 4.1 Publishing Overview. APIM Analytics Services collects and analyzes a wealth of information that flows through APIs. This information is gathered, analyzed, and provided immediately, in real time. The information on how is API traffic trending over time? Who are top developers? When is API response time fastest? Slowest? Is it attracting more developers? Geographically where is the most API traffic? The answers to questions like these help improve APIs, attract the right app developers, troubleshoot problems, and, ultimately, make better business decisions related to API program. Dashboard Admin Analytics also provide the custom report. The custom report is a way to specify precisely what is to be measured across your API program. The APIM dashboard gives a quick overall view of API program -- patterns for API traffic, developer engagement, and developer apps. More detailed view is available for each chart and customers can select further information. An organization administrator uses the Admin function to add a global user to an existing organization with a specific role. For details, see 6 Admin. Note: If user is not organization administrator, do not show the Admin menu on screen of API Management UI.

10 1.3. API Services APIM is about creating and consuming APIs, whether building API proxies as a service provider or using APIs, SDKs, and other convenience services as an app developer. The APIM services provides an API management server tools for adding and configuring your API proxies, setting up API products, and managing app developers and client apps. It offloads many common management concerns from backend services. When adding an API proxy, policies can be applied to the API proxy for adding security, rate-limiting, mediation, caching, and so on. APIM services also supports customization of the behavior of API proxy by applying custom scripts, making calls out to third-party APIs and services, and so on. As a Node.js developer, the node.js modules can be added to APIM service instance to create APIs and API mashups, all the while leveraging the benefits API Management provides, from message transformation to security to analytics. Following diagram shows the use cases for APIM services

11 1.4. What is an API Proxy? API Proxy is like a control point which is fully aware of API content, communications patterns, and able to present the API to the external end points / users. As a server or service, sitting between the client (regardless of type of node) and as the traffic runs through it, meaningful data can be captured for immediate outcomes (block access, change the message, or respond from a cache) and later used for behavior analysis and business planning. API proxies decouple the app-facing API from backend services, shielding those apps from backend code changes. As changes are made to the backend code to enhance the services, apps continue to call the same API without any interruption. API Proxy is an important component of API Management, located between apps and backend services. In order to use the various functions of API Management, and as explained in the figure below an API Proxy is created and set of policies to flows of new API Proxy are defined. In an API proxy configuration, there are two types of endpoints: ProxyEndpoint: Defines the way client apps consume the backend APIs. The proxy endpoint also determines whether apps access the API proxy over HTTP or HTTPS. The ProxyEndpoint is configured to define the URL of the API proxy which is used by the external end points when accessing the service. The policies are attached to the ProxyEndpoint to enforce security, quota checks, and other types of access control and rate-limiting. TargetEndpoint:: Defines the way the API proxy interacts with the backend services. The TargetEndpoint is configured to forward requests to the proper backend service, including defining any security settings, HTTP or HTTPS protocol, and other connection information. Policies can be attached to the TargetEndpoint to ensure that response messages are properly formatted for the app that made the initial request

12 1.5. What is a Policy? An API policy is like a module that implements a specific, limited management function as part of the proxy request/response flow during an API message exchange. The API Policies allow API developers to modify and monitor API s behavior using out-of-the-box policies available when using APIM service. The out-of-the-box policies provide ability to augment API s with sophisticated features to control traffic, enhance performance, enforce security, and increase the utility of the APIs, without requiring to write any code or to modify any backend services. Policies are designed to let you add common types of management capabilities to an API easily and reliably. The user of Extension policies allows API developer s to implement custom logic in the form of JavaScript, Python, Java, and XSLT. As shown in the diagram below the API Policies can be applied to a Request / Response message flow. More than 30 functions can be added by configuration only without coding and the policies are divided into following categories (refer to Section 3 below): Traffic Management Allows configuration of cache policies, control traffic quotas and spikes, set concurrent rate limits, and so on. Mediation Mediation policies allow functions such as message transformation, parsing, and validation, as well as raise faults and alerts. Security Policies - Security policies allow controlled access to backend APIs with OAuth, API key validation, and other threat protection features such as JSON Threat Protection policy, LDAP policy, Regular Expression Protection policy, SAML Assertion policies, Verify API Key policy and XML Threat Protection policy Extension Policies - Extension policies allows creation of custom policy functionality, with support for such features as service callout, message data collection, and calling Java, JavaScript, and Python behavior created for an API.

13 1.6. What is a Publishing API? Publishing is the process of making APIs available to app developers for consumption. APIM service supports a flexible publishing model that gives complete control over the publishing process such as; it can disclose API based on the usage, configuring the access right and restriction of traffic after making a package as a product of API Proxy. Publishing APIs can be broadly defined by the following tasks: 1. Create the API products on API Management that bundle your APIs. 2. Register app developers on API Management. 3. Register apps on API Management. Following diagram shows the tasks covered in Publishing API and refer to Section 4 for more details on Publish function.

14 1.7. What is a Backend Service? A large group of enterprise and consumer applications can be put into the category of client-server apps.these are the applications which consist of the client-side (frontend) and the server-side (backend). The client-side is ultimately what the user sees on the screen, whether it is the screen of a mobile device or a computer monitor. The client-side is responsible for guiding the user through the workflows established by the application which ultimately is the user experience. The backend consists of two primary components: application business logic and data processing/management. APIM Services includes a backend-as-a-service (BaaS) solution that provides developers with access to a flexible data store and enables developers to quickly integrate valuable features into an app, including social graphs, user management, data storage, push notifications, performance monitoring, and more. Using API BaaS, developers can set up cloud-based data platform in minutes instead of months no server-side coding or back-end development needed. This allows app developer teams to focus on developing the rich features and user experience that truly differentiate your app, rather than on the time-consuming details of implementing core back-end services and infrastructure. By using the extension policy and Node.js, backend services can be referenced in addition to the WebAPI and mashup the data from more than one backend service. A Diagram below shows the interaction of APIM and Backend serves and how a Data Mash-up can be achieved. API Management Backend Services Node.js API Proxy EXTENSION Policy REST SOAP Web API Data Mashup CRM/ERP/DWH /SOA Apps DB/Storage SaaS Connector Connector RDB NoSQL Amazon S3 Backend Services Amazon SQS/SNS Salesforce

15 1.8. What is API Analytics? APIM service includes built in API Analytics and Monitoring capability which records a wide variety of operational and business data that flows across APIs. The metrics derived from this data are useful for operational monitoring and business monitoring. Using Analytics Services customers can, for example, determine which APIs are performing well or poorly, which developers are delivering the highest value traffic, and which apps are causing the most issues for your backend services. To help access this data easily, APIM Analytics Services exposes a RESTful API which can be used to automate certain Analytics functions, such as retrieving metrics periodically using an automation client or script. The RESTful API also allows customers to build custom visualizations in the form of custom widgets that can embed in portals or custom apps. The Analytics can also be used to build Dashboards for business decisions and operational decisions. The following diagram shows the analytics services screen shot and type of analytics data available from APIM service. Please refer to Section 5 for more details on Analytics Service

16 1.9. APIM System Constitution Diagram The use of APIM Service will require a care consideration of integration of APIM with in customer environment and following diagram represent the APIM System Constitution and various functional components that would require configuration and integration for supporting an end to end WebAPI enabled Digital Service Backend Services Web API API Management One-to-many Org Users Org Roles Organization API Service Developers Developer Apps API Proxy Policy Flow Deployment Analytics Service API Developer End user Exploration Products Trace Dashboard Apps Use Create Analyze Website Mobile App App developers Backend Services Developers Other system Users

17 2. Dashboard This chapter describe the functions of dashboard and use of Dashboards for API development, API operational management.

18 2.1. What is the dashboard? The API Management dashboard is the first thing you see when you log in to APIM service and it gives a quick overall view of API program supported by APIM -- patterns for API traffic, developer engagement, and developer apps.. This dashboard has three sections (shown below in diagram): Proxy Traffic -- Plots overall traffic for all of the APIs in an organization. See at a glance the error rate as a percentage of total traffic. Developer Engagement -- Gives a quick sense of how developers are engaged with your APIs. Developer Apps -- Breaks down API traffic by developer app. Shows you which apps are receiving the most traffic. The customers can see this dashboard anytime by selecting Dashboard from the main API Management menu.

19 Dashboard contents Proxy traffic All the API traffic for an organization over the selected period of time. Traffic, also called "throughput", represents the number of API requests and responses seen by an API organization. Developer Engagement Click the "more details" link to drill down to a more detailed view. Measures the average number of API calls for registered developers during the selected period of time. Shows you active and highly active developers (greater than 50 transactions per hour). Also shown are the total number of developers who have signed up to use your APIs. Click the "more details" link to drill down to a more detailed view. Developer Apps Note: It's possible that the Developer Engagement could reflect higher numbers for a Week timespan than for a Month. This is because engagement is calculated based on the average number of calls during a specific period of time (week/month). You could have a large number of developers register their apps, but for a period of time the apps are not generating traffic (perhaps because their apps are still in development). If traffic starts later, in the most recent week, then calculated engagement will be higher for the most recent week than over the previous month, because most of the traffic was generated in the most recent week. Traffic for your top-performing developer apps for the selected time period is displayed in this chart. Click the "more details" link to drill down to a more detailed view.

20 3. API Policies This chapter explains the various out of the box functions available within APIM service to enhance the functions of APIs.

21 3.1. List of Policies Traffic Management Traffic management policies allow API developers to configure cache, control traffic quotas and spikes, set concurrent rate limits, and so on. Below is list of Traffic Management Policies that can be applied to Request/Response messages in an API flow. Quota Spike Arrest Concurrent Rate Limit Response Cache Lookup Cache Populate Cache Invalidate Cache Reset Quota Use the Quota policy to configure the number of request messages that an API proxy allows over a period of time, such as a minute, hour, day, week, or month. The Spike Arrest policy protects against traffic spikes. It throttles the number of requests processed by an API proxy and sent to a backend, protecting against performance lags and downtime. Throttles inbound connections from your API proxies running on API Management to your backend services. Caches data from a backend resource, reducing the number of requests to the resource. As apps make requests to the same URI, you can use this policy to return cached responses instead of forwarding those requests to the backend server. The ResponseCache policy can improve your API's performance through reduced latency and network traffic. Configures how cached values should be retrieved at runtime. Configures how cached values should be written at runtime. Configures how the cached values should be purged from the cache. Use to dynamically modify the remaining number of requests allowed by the target Quota policy. You typically use this policy to decrease the current quota count of the target Quota policy rather than waiting for the quota count to reset.

22 Security Security policies allow API developers and IT managers to control access to APIs with OAuth, API key validation, and other threat protection features described in table below: Basic Authentication XML Threat Protection JSON Threat Protection Regular Expression Protection OAuth v2.0 Get OAuth v2.0 Info Set OAuth v2.0 Info Delete OAuth V2 Info OAuth v1.0a Enables you to use lightweight Basic Authentication for last-mile security. The policy takes a username and password, Base64 encodes them, and writes the resulting value to a variable. The resulting value is in the form Basic Base64EncodedString. You typically write this value to an HTTP header, such as the Authorization header. Address XML vulnerabilities and minimize attacks on your API. Optionally, detect XML payload attacks based on configured limits. Minimizes the risk posed by content-level attacks by enabling you to specify limits on various JSON structures, such as arrays and strings. Extracts information from a message (for example, URI Path, Query Param, Header, Form Param, Variable, XML Payload, or JSON Payload) and evaluates that content against predefined regular expressions. If any specified regular expressions evaluate to true, the message is considered a threat and is rejected. The heart of the API Management OAuth 2.0 implementation. It lets you configure OAuth 2.0 "operations" on API Management that generate access and refresh tokens, issue authorization codes, and validate tokens. This topic includes code samples to help illustrate how things work. Gets attributes of tokens and makes them available to policies and code executing in an API proxy. This policy type can be useful when you need to configure dynamic, conditional behavior based on a value in an access token. Updates the profile of an access token. For example, you may want to embed a tag that is unique to your business. Deletes the specified OAuth V2 authorization code or access token. OAuth 1.0a defines a standard protocol that enables app users to authorize apps to consume APIs on their behalf, without requiring app users to disclose their passwords to the app in the process. API Management enables you to protect APIs in a way that ensures that an app uses has authorized the app to consume an API. API Management also provides policy-based functionality for configuring the endpoints that app developers can use to obtain access tokens.

23 Get OAuth v1.0a Info Delete OAuth V1 Info Verify API Key Access Control LDAP Generate SAML Assetion Validate SAML Assertion Gets attributes of tokens and keys and populates flow variables with the values of those attributes. This policy type can be useful when you need to configure dynamic, conditional behavior based on a value in a token or key. Whenever token validation occurs, variables are automatically populated with the values of token attributes. However, in cases where token validation has not occurred, you can use this feature to explicitly populate variables with these attribute values. Deletes OAuth v1.0a request tokens, verifiers, and access tokens. The Verify API Key policy lets you enforce verification of API keys at runtime, letting only apps with approved API keys access your APIs. This policy ensures that API keys are valid, have not been revoked, and are approved to consume the specific resources associated with your API products. The Access Control policy lets you allow or deny access to your APIs by specific IP addresses. Use the LDAP Policy when access to protected resources should be limited to users in your LDAP provider such as your admin users, organization users, and developers especially when OAuth token access is either unnecessary or too heavyweight. The policy is also designed for retrieving DN metadata for use in API proxy flows. The SAML policy type enables API proxies to attach SAML assertions to outbound XML requests. Those assertions are then available to enable backend services to apply further security processing for authentication and authorization. The SAML policy type enables API proxies to validate SAML assertions that are attached to inbound SOAP requests. The SAML policy validates incoming messages that contain a digitally-signed SAML assertion, rejects them if they are invalid, and sets variables that allow additional policies, or the backend services itself, to further validate the information in the assertion.

24 Mediation Mediation policies allows API developers to include any message transformation, parsing, and validation, as well as raise faults and alerts as part of API development and integration. JSON to XML XML to JSON Raise Fault XSL Transform SOAP Message Validation Assign Message Extract Variables Access Entity Key Value Map Operations This policy converts messages from the JavaScript Object Notation (JSON) format to extensible markup language (XML), giving you several options for controlling how messages are converted. This policy converts messages from the extensible markup language (XML) format to JavaScript Object Notation (JSON), giving you several options for controlling how messages are converted. Generates a custom message in response to an error condition. Use Raise Fault to define a fault response that is returned to the requesting app when a specific condition arises. The XSL Transform policy applies custom Extensible stylesheet language transformations (XSLT) to XML messages, letting you transform them from XML to another format, such as XML, HTML, or plain text. The policy is often used to integrate applications that support XML, but that require different XML-formats for the same data. Validates a message against an XSD schema or WSDL definition and rejects the message if it does not conform. Creates or modifies HTTP request or response messages during an API proxy flow. Extract content from a variable. Often the source variable contains a request or response messages, including headers, URI paths, JSON/XML payloads, form parameters, and query parameters. The policy works by applying a text pattern to the message content and, upon finding a match, sets a variable with the specified message content. Retrieves entity profiles you specify from the API Management data store. The policy places the profile in a variable whose name follows the format AccessEntity.{policy_name}. Provides policy-based access to a key/value map store available in API Management. Key/value pairs can be stored, retrieved, and deleted from named existing maps by configuring KeyValueMapOperations policies that specify PUT, GET, or DELETE operations. (At least one of these operations must be performed by the policy.)

25 Extension Extension policies allow creation of custom policy functionality, with support for such features as service callout, message data collection, and JavaScript behavior to be called within API proxy flow.. JavaScript Service Callout Statistics Collector Message Logging Java Callout This policy lets you add custom JavaScript code that executes within the context of an API proxy flow. In your custom JavaScript code, you can use the objects, methods, and properties of the API Management JavaScript object model. The Service Callout policy lets you call to another service from your API proxy flow. You can make callouts to either an external service (such as an external RESTful service endpoint) or internal services (such as an API proxy in the same organization and environment). Enables you to collect statistics for data in a message, such as product ID, price, REST action, client and target URL, and message length. The data can come from flow variables predefined by API Management or custom variables that you define. One of the best ways to track down problems in the API runtime environment is to log messages. You can attach and configure a Message Logging policy on your API to log custom messages to a local disk or to syslog. Enables you to use Java to implement custom behavior that is not included out-of-the-box by API Management policies. In your Java code, you can access message properties (headers, query parameters, content) and flow variables in the proxy flow. About policy setting, please see WebAPI-Reference.pdf. Note: This policy can be used only Advanced Gateway or Backend Secure Connection services.

26 3.2. API Proxy Flows API proxies manage request and response messages using a pipeline processing mode, where the pipeline consists of a sequence of flows. The API Proxies are attached to different flows in the pipeline, depending on the type of policy and the action that is to be performed What are Flows? API proxies define request and response flows that are executed in a specific order. The order allows application of logic and behavior at specific points in the API proxy execution. The request and response flows are subdivided into proxy and target segments. Each segment is subdivided into the following flow 'stages': PreFlow: Always executes before any conditional flows. Conditional flows: One or more flows, each of which has an associated condition. Conditional flows tell API Management, "When you see this, perform this logic." For example, when an API call is a GET on the /movies resource (the condition), transform the response to JSON (through a policy attached to the conditional flow). Only one flow executes per transaction the first flow whose condition evaluates to true. In a conditional flow, the condition is evaluated in both the request and response. You cannot have separate conditions for request and response. PostFlow: Always executes after any conditional flows. PostClientFlow: An optional flow that executes after the response message has been sent to the requesting client app. (This is a specialized flow, and only MessageLogging policies can be attached to it.) The following figure shows a basic request and response exchange between an app and a backend service. In this figure, the ProxyEndpoint and TargetEndpoint have been expanded to show the flows used to process the request and response: Flows are executed in the following order in both the Proxy Endpoint and the Target endpoint, first in the request, then in the response.

27 PreFlow PreFlows always execute first, and the logic attached in the PreFlow applies to all calls made to the API proxy. They are useful to make sure that a policy or code executes before anything else happens. For example, you usually don't want an API proxy to waste any resources on an unauthenticated user. Also, you don't want to service an app that has exceeded its quota. To support these requirements, security and quota policies can be put in the PreFlow segment. That way these control policies will always execute before any other processing takes place Conditional Flow API proxy programming starts to get interesting when implementing 'branching' logic for an API. For example, you might want to convert XML to JSON only when the requesting app is running on a mobile device; or create a new HTTP response header when the /foo API resource is called; or you might want to return a targeted ad based on the data in the user's request. This can be achieved by setting up conditional flows PostFlow As with PreFlow, the logic attached to the PostFlow applies to all calls made to the API proxy. PostFlow is useful when there is requirement to log some data, send a notification that something happened, transform the message format, and so on PostClientFlow(response only) An optional PostClientFlow can be added to the ProxyEndpoint that executes after the response is returned to the requesting client app. Only MessageLogging policies can be attached to this flow. PostClientFlow reduces API proxy latency and makes information available for logging that is not calculated until after the response is sent, such as the client.send.start.time and client.send.end.time. The flow is used primarily for measuring the time interval between the start and end timestamps for the response message.

28 3.3. Understanding API Resources RESTful services are collections of API resources. An API resource is a URI path fragment that identifies some entity that developers can access by calling your API. For example, if your service provides weather reports and weather forecasts, your backend service might define two API resources: When you create an API proxy, at a minimum you're creating an alias base URL that maps to your backend service. For example: Backend base URL New/equivalent API proxy URL At this point you can make API calls to your backend using either base URL. But when you use the API proxy URL, things start to get interesting. In addition to API analytics that API Management starts to collect when you use the API proxy, proxies also let you define conditional flows that map to the resources on your backend. In essence, "If a GET call comes in to the /reports resource, API Management should do something." Backend resource GET Response: <templastyear>60f</templastyear> Conditional flow to resource GET Response: q { templastyear : 60F XML to JSON }

29 3.4. API Development Lifecycle Every organization has a unique software development lifecycle (SDLC). It is often necessary to synchronize and align API proxy deployment with the same processes that you use today for developing, testing, and deploying other applications. API Services provides tools and RESTful APIs that enable you to integrate API proxy deployment and management into your organization's SDLC. A common usage of the RESTful API is to write scripts or code that programmatically deploy API proxies, or that migrate API proxies from one environment to another, as part of a larger automated process that also deploys or migrates other applications. API Services makes no assumptions about your SDLC (or anyone else's, for that matter). Rather, it exposes atomic functions that can be coordinated by your development team to automate and optimize your API development lifecycle. Environments Every organization on API Management has two deployment environments that are available for API proxies: 'test' and 'prod'. The distinction between the two environments is arbitrary each environment is simply identified by a different set of network addresses (URLs). The goal is to provide you with a domain in which you can build and verify API proxies before the API is exposed to external developers. You can leverage these environments to synchronize API proxy development processed with your SDLC. Each environment is defined by a network address, enabling you to segregate traffic between the API proxies that you are working on, and those that are being accessed by apps at runtime. The network addresses available for each environment is defined in the set of VirtualHosts available in that environment. Inbound, server SSL is automatically enabled for each environment. Two VirtualHosts are pre-defined in each environment: default and secure. Default defines an HTTP address, while secure defines an HTTP/S address, with pre-configured server-side SSL. In an API proxy configuration, you indicate which VirtualHosts the ProxyEndpoint should listen on. When promoting to prod, you typically disable HTTP by removing the default VirtualHost from the API proxy configuration. You can see which VirtualHosts are available in an environment by selecting Environments in the API management UI main menu. Environments also provide segregation of data and resources. You can, for example, set up different caches in test and prod, which can be accessed only by API proxies executing in that environment. Additionally, API keys that are issued in the test environment are not valid in the prod environment, and vice-versa. Deploying API proxies to environments When you create an API proxy you'll need to decide which environment you'll be working in. You can choose to create a new API proxy on production, but that is not recommended as you may expose an API to developers before it's ready. In general you want to start by creating an API proxy in test which, after testing, you then 'promote' to prod. Note: Depending on your role, you may not be able to deploy to all environments. For example, the 'user' role can only deploy to the test environment. If you're an administrator you can deploy to any environment.

30 Iterative development in test As you work on an API proxy, API Services saves iterations of your configuration as revisions. When you deploy an API proxy, you choose a specific revision to deploy. Typically, you deploy the most recent revision, and, if necessary, revert to the previous revision number. You can choose where to deploy those revisions. For instance, you can promote a revision to prod to allow developers to start working with your API. At the same time, you may be iterating multiple revisions on test, where you're adding features or fine-tuning policies. Then, when you're ready, you can deploy the new revision to prod, overwriting the existing revision on that environment. Using this method, you can always have a live revision of your API available to developers while you're developing. Promotion to prod When an API proxy has been fully implemented and tested, it is ready to be promoted to 'prod'. The revision of the API proxy in test will be used to overwrite the revision of the API proxy deployed on prod. API Services provides capabilities to ensure seamless deployment of API proxies, minimizing the impact on apps and end users during the deployment procedure. Scripting deployment The API management UI enables you to deploy API proxies to prod directly from the API proxy builder. However, in many situations the requirements for security, reliability, and consistency will mandate that development teams script deployment procedures. To do so, you can write code and scripts that invoke the RESTful API exposed by API Services. Following Diagram shows the Deployment options available within APIM service

31 Environment resources For additional control during promotion, it is recommended that you only iterate on API proxies in test, and make as few changes as necessary to API proxies deployed in prod. To do so, you need to ensure that certain resources associated with each environment are configured in such a way that they can remain static in an API proxy configuration. Target URLs: It is common for API proxies to call different backend URLs during testing and production. You can use TargetServer configurations to create environment-independent TargetEndpoint configurations. Caches and Key/value maps: Both persistence resources are scoped by environment. You should ensure that naming conventions are used to enable API proxies to store data without requiring configuration changes during promotion. ServiceCallout targets: Service callouts may use different targets depending on the environment, if, for example, a ServiceCallout in the test environment consumes a demo service. To make API proxy configurations environment-independent, you can also use conditional statements. Conditional statement built with the environment.name variable can be used to evaluate the current environment before enforcing a policy or before routing to a URL on the backend.

32 3.5. Trace Tool Online Trace Tool Trace is a tool for troubleshooting and monitoring API proxies running on API Management. Trace lets you probe the details of each step through an API proxy flow. Trace is simple to use. You start a trace session, then make an API call to the API Management platform, and read the results. Following diagram shows how the Trace functionality can provide effective troubleshooting Note: One Trace session can support 20 request/response transactions. A trace session automatically stops after 10 minutes if you don't manually stop it. How to read a trace The trace tool has two main parts, the transaction map and the phase details: The transaction map uses icons to mark each notable step that occurs during an API proxy transaction, including policy execution, conditional steps, and transitions. Hover over any icon to see summary information. The request flow steps appear along the top of the transaction map and response flow steps along the bottom. The phase details section of the tool lists information about the proxy's internal processing, including variables that were set or read, request and response headers, and much more. Click any icon to see the phase details for that step.

33 Trace tool's transaction map Here's a sample trace tool map with the main proxy processing segments labeled: Transaction map legend The following table describes the intent of the icons you will see in the transaction map. These icons mark each of the notable processing steps throughout the proxy flow. Transaction map icons The client app that sends a request to the ProxyEndpoint of the API proxy. The circles mark transitional endpoints in the proxy flow. They are there when a request comes in from the client, when the request goes to the target, when the response comes back from the target, and when the response goes back to the client. The tall bars indicate the beginning of a flow segment in the API proxy flow. Flow segments are: ProxyEndpoint request, TargetEndpoint request, TargetEndpoint response, and ProxyEndpoint response. A segment includes the PreFlow, Conditional Flows, and PostFlow. Indicates that Analytics actions have occurred in the background. A conditional flow that evaluates to true. A conditional flow that evaluates to false.

34 Polices. Each type of policy has a unique icon. This one is for the AssignMessage policy. These icons let you see where policies are executed in the proper order and if they are successful or not. You can click a policy icon to see the results of its execution and if they are expected or not. For example, you can see if the message was transformed properly or if it is being cached. Note: Properly executing policies are clearly indicated by check-marks. In the case of an error, a red exclamation mark is displayed on the icon. Tip: Pay attention to the tooltip or the time line to see if any policy is taking longer than expected. Appears when the backend target is a Node.js application. The backend target called by the API proxy. The time line indicates how long (in milliseconds) that the processing time took to complete. Comparing the elapsed time segments helps you isolate the policies that are taking the longest to execute that are slowing down your API calls. The Epsilon indicates a time-span smaller than a millisecond. Disabled. Appears on a policy icon when a policy is disabled. A policy can be disabled with the public API. Error. Appears on a policy icon when the Policy Step condition evaluates to false, or on the RaiseFault policy icon whenever a RaiseFault policy executes. Skipped. Appears on a policy icon when the policy was not executed because the step condition evaluated to false.

35 Understanding the phase details The Phase Details part of the tool tells you a lot about the state of your proxy at each processing step. Here are some of the details provided in the Phase Details. Click any icon in the trace tool to see details for the selected step, or use the Next/Back buttons to move from one step to another. Phase Detail Proxy Endpoint Request Headers Request Content Properties Variables Read Variables Read and Assigned Target Endpoint Response Headers Response Content PostClientFlow Description Indicates which ProxyEndpoint flow was selected for execution. An API proxy can have multiple named proxy endpoints. Lists the HTTP request headers. Shows the HTTP request body. Properties represent the internal state of the API proxy. These are not shown by default. Lists the flow variables that were read by a policy. Lists the flow variables that were read and assigned a value by a policy. Indicates which TargetEndpoint was selected for execution. Lists the HTTP response headers. Shows the HTTP response body. Shows information about the PostClientFlow, which executes after the request is returned to the requesting client app. Only MessageLogging policies can be attached to the PostClientFlow. The PostClientFlow is currently used primarily for measuring the time interval between the start and end timestamps for the response message. Debugging with Trace Trace lets you see a lot of internal details about an API proxy. For example: You can see at a glance which policies are executing correctly or failing. Let's say you noticed through one of the Analytics dashboards that one of your APIs is experiencing an unusual decrease in performance. Now, you can use Trace to help identify where the bottleneck is occurring. Trace gives the time, in milliseconds, that it takes for each processing step to complete. If you find one step is taking too long, you can take corrective action. By looking at the phase details, you can check headers that are being sent to the backend, view variables set by policies, and so on. By verifying the base path, you can ensure that a policy is routing the message to correct server.

36 Selecting View Options Choose the view options for the trace session. Option Show Disabled Polices Show Skipped Phase Show all FlowInfos Automatically Compare Selected Phase Show Variables Show Properties Description Show any disabled policies. A policy can be disabled with the public API. Show any phases that were skipped. A skipped phase occurs when policy was not executed because the step condition evaluated to false. Represent transitions within a flow segment. Compares the selected phase to the previous one. Turn this off to see only the selected phase. Show or hide variables that were read and/or assigned a value. Properties represent the internal state of the API proxy. (Hidden by default.) Downloading trace results You can download an XML file of the trace results for viewing offline. The file shows the complete details of the listening session including the contents of all headers, variables and policies. To download raw trace output, click Download Trace Session.

37 Offline Trace Tool What is the Offline Trace tool? The Offline Trace tool lets you view and analyze trace sessions that were previously saved. A saved trace session is essentially a "recording" of a trace session, and can be useful for cases where troubleshooting and further analysis is required. The UI for the Offline Trace tool is similar to the "live" Trace tool. To learn about the Trace Tool UI and on saving trace sessions, see Online Trace Tool.

38 4. Publish This chapter explains the process of Publishing APIs within APIM service and the tasks to be completed both at API development and API Proxy definition stage before the external end points can access the API service.

39 4.1. Publishing Overview A developer builds an app that makes requests to your APIs to access your backend services. The following image shows the relationship of a developer to an app and to an API: Publishing is the process of making your APIs available to app developers for consumption. API Management supports a flexible publishing model that gives you complete control over the publishing process. Publishing API tasks can be broadly defined by the following tasks: 1. Create the API products on API Management that bundle your APIs. 2. Register app developers on API Management. 3. Register apps on API Management.

40 Task1: Create an API product on API Management The first task in publishing is to create an API product. An API product is a collection of API resources that are offered as a package to app developers for consumption. Create API products by using the API Management UI. In this figure, your API consists of two products, each containing three API resources. As an API provider, you are responsible for building the APIs and API products to handle access control, usage restrictions, and any other business requirements. For example, you might: Release a free API product that allows read-only access to its API resources. Release a second API product for a low price that allows read/write access to the same API resources as the free version but with a low access limit, such as 1000 requests per day. Release a third API product for a higher price that allows read/write access the same API resource but with a high access limit. The important thing to remember is that API Management give you the flexibility to create API products that match the business requirements of your APIs.

41 Task2: Register an app developer on API Management A developer creates the apps that consume your APIs. Developers must be registered on API Management before they can register an app and receive an API key. Through the app registration process, you control who has access to your APIs. At any time, you can delete an app developer, which invalidates all API keys associated with that developer, therefore denying that developer access to your APIs. As an API provider, you decide how to register developers. For example, you can use a manual registration process that requires a potential developer to contact your organization to register. The potential developer must supply all necessary information, such as an address, first and last name, and company name. If you approve the developer s request, you can use the API management UI to manually register the developer.

42 Task3: Register an app on API Management Before an app can access your APIs, the app must be registered on API Management. At the time of app registration, you selects one or more API products. For example, you might publish multiple API products corresponding to different types of services and pricing plans. You can then pick and choose from the list of available API products. Note: API Management does not require that you to let the developer associate multiple API products with an app. Your publishing plan can be structured such that the developer can select only a single API product. In response to registering the app on API Management, API Management assigns a unique API key to the app. The app must pass that API key as part of every request to an API resource. The key is authenticated and, if valid, the request is granted. At any time, you as the service provider can revoke the key so that the app can no longer access your APIs.

43 4.2. What is an API Product? API products are the central mechanism for authorization and access control to your APIs. In API Management, API keys are provisioned, not for APIs themselves, but for API products. In other words, API keys are provisioned for bundles of resources with an attached service plan. When an app attempts to access an API product, authorization is enforced by API Management at runtime to ensure that: The requesting app is permitted to access a particular API resource. The requesting app has not exceeded the permitted quota. If defined, the OAuth scopes defined in the API product matches those associated with the access token presented by the app. The API product is the mechanism through which your APIs are bundled and published so that developers can consume them. An API product is a collection of API resources (URIs) combined with a service plan and presented to developers as a bundle. The API product can also include some metadata specific to your business for monitoring or analytics. API products are also a good way to control access to a specific bundle of resources. For example, you can bundle resources that can only be accessed by internal developers, or bundle resources that can only be accessed by paying customers. The API resources bundled in a product can come from one or more APIs, so you can mix and match resources to create specialized feature sets as shown below

44 You can set different properties on each API product. For example, you might make available one API product with a low access limit, such as 1000 requests per day, for a bargain price. You then release another API product that provides access to the same resources, but with a much higher access limit, for a higher price. Or, you might create a free API product that allows read-only access to resources, and then sell an API product to the same resources that allows read/write access Access API products from an app Apps are how developers access your API products. When a developer registers an app, you select the API products to associate with the app, and API Management generates an API key for the app. By default, a single key provides access to all API products associated with the app. When the app makes a request, API Management first verifies that the API key is valid and fails the request if not Register developers for your API Developers build the apps that access your APIs. However, a developer must first be registered in your organization before they can register an app.

45 4.3. API Developers Developers access your APIs through apps. When the developer registers an app, they receive a single API key that allows them to access all of the API products associated with the app. However, developers must be registered before they can register an app. Developers have way of registering. In the API management UI, select Publish > Developers to open the Developers page. You can see the apps they've created and the keys assigned to the developer. From this page, you can also manage the developer's information or delete them from your org.

46 4.4. About Apps Developers register apps to access your API products. When a developer registers an app, the developer selects the API products to associate with the app and API Management generates an API key. Each app has a single API key that provides access to all API products associated with the app. Apps allow you to control who can access your APIs. You can revoke an app's key, preventing it from accessing all API products. Or you can revoke access to a single API product associated with the app. You can see all of your organization's apps in the API Management UI on the Publish > Developer Apps summary page. This page displays performance data for each app, and general information on app keys. You can select a specific app from the table to get more detailed information, including the API products that app can access and the resources those products expose. You can also see the key associated with the app.

47 5. Analytics This chapter provides details on various analytics information available about the API s supported as part of API Proxy service on APIM platform.

48 5.1. Proxy Performance The Proxy Performance dashboard helps you see API proxy traffic patterns and processing times. You can easily visualize how much traffic your APIs generate and how long it takes for API calls to be processed, from the time they are received by API Management until they are returned to the client app Traffic TOTAL TRAFFIC TRAFFIC SUCCESS TRAFFIC ERRORS AVERAGE TPS The total number of API requests received by API Management for an API environment in an organization. The total number of requests that resulted in a successful response. Error responses do not count. The total number of all API requests that are unsuccessful, that is, the request does not deliver a response as desired by the end user. The average number of API requests and resulting responses per second.

49 Average Response Time AVERAGE RESPONSE TIME The average of the Total Response Time measured for all API calls made to an API Management organization environment. The Total Response Time is the amount of time it takes for an API call to API Management to return (in milliseconds). Or, put another way, total response time is the time measured from when an entire API call is received on API Management to the time API Management begins sending a response back to the client app. AVERAGE PROXY RESPONSE TIME This chart measures the average for all proxies. For individual proxies, see the Average Response Time by Proxy chart below. This value is calculated as the average of the Total Response Time minus the Target Response Time for all API calls made to an API Management organization environment. AVERAGE TARGET RESPONSE TIME It's basically a measure of how much time the API calls spend flowing through API Management itself (in milliseconds). The average number of milliseconds that it takes from the point the last byte of a request is sent from API Management to a backend target to the time API Management receives the last byte of the response. It's basically measuring how much time the API call spends on the target system Traffic by Proxy For the specified API proxy, the number of recorded API requests and responses Average Response Time by Proxy For the specified API proxy, the average of the Total Response Time measured for all API calls made to an API Management environment. The Total Response Time is the amount of time it takes for an API call to API Management to return (in milliseconds). Hover over the graph to see the total amount of time spent on the proxy side and the target side, as well as the average

50 5.2. Target Performance Only API Managment Pro The Target Performance dashboard helps you visualize traffic patterns and performance metrics for API proxy backend targets Traffic by Target All Targets Traffic <Target name> Measures the total amount of traffic that passes from API Management to all backend targets. Measures the total amount of traffic that passes from API Management to the specified backend target Traffic TOTAL TRAFFIC ERRORS SUCCESS Measures the total amount of traffic that passes from API Management to all backend targets. Same as All Targets Traffic. The total number of requests to backend targets that resulted in an unsuccessful response. Error responses do not count. The total number of all requests to backend targets that are successful (that do not return an error).

51 Response Time AVERAGE TIME The average of the Total Response Time measured for all API calls made to an API Management organization environment. The Total Response Time is the amount of time it takes for an API call to API Management to return (in milliseconds). AVERAGE TARGET TIME Or, put another way, total response time is the time measured from when an entire API call is received on API Management to the time API Management begins sending a response back to the client app. The average number of milliseconds that it takes from the point the last byte of a request is sent from API Management to a backend target to the time API Management receives the last byte of the response. AVERAGE PROXY TIME It's basically measuring how much time the API call spends on the target system. This value is calculated as the Total Response Time minus the Target Response Time. It's basically a measure of how much time the API call spends flowing through API Management itself (in milliseconds) Target Errors TOTAL ERRORS 3XX ERRORS 4XX ERRORS 5XX ERRORS Measures the total number of errors sent from backend targets to API Management. Measures the total number of HTTP 3XX sent from backend targets to API Management. Measures the total number of HTTP 4XX errors sent from backend targets to API Management. Measures the total number of HTTP 5XX sent from backend targets to API Management.

52 Payload Size TOTAL PAYLOAD SIZE REQUEST PAYLOAD SIZE RESPONSE PAYLOAD SIZE The total payload size for all requests and responses between API Management and backend targets. The total payload size for all requests sent from API Management to backend targets. The total payload size for all responses sent from backend targets to API Management.

53 5.3. Cache Performance Only API Managment Pro The Cache Performance dashboard lets you see at a glance the value of your API Management cache. The dashboard helps you visualize the benefit of the cache in terms of lower latency and reduced load backend servers Metrics Average cache hit rate All cache hits Average time with cache Average time without cache Cache improvement Cache hits by app The rate of calls hitting the cache measured against total API traffic. The sum of calls that hit the cache. The average amount of time for an API call when it hits the cache. The average amount of time for an API call when it does not hit the cache. Compares the average time with cache and average time without cache, giving you an idea of the overall effect of the cache on API performance. Sum of calls hitting the cache broken down by developer app.

54 5.4. Latency Analysis The Latency Analysis dashboard can alert you to any latency issues your API proxies may be experiencing. It displays latency measurements down to the window of a minute, highlighting the median, 95th percentile, and 99th percentile values. The median value tells you the point at which half of your traffic is experiencing latency that is less than this value and half of your traffic is experiencing latency that is greater than this value. For example, if the median response time latency for your selected API proxy is 62 ms, it means that half of the responses from this API proxy take less than 62 ms. It also means that half of the responses from this API proxy take more than 62 ms. The 95th percentile and 99th percentile values tell you the point at which 95% and 99% of your traffic is experiencing latency that is less than these values. Or rather more importantly, it can point out outlying behavior, telling you that 5% and 1% of your traffic is experiencing latency values that are out-of-range.

55 Metrics Response Time Target Response Time Request Processing Latency Total number of milliseconds it took to respond to a call. This time includes the API Management proxy overhead and your target server time. Number of milliseconds it took your target server to respond to a call. This number tells you how your own servers are behaving. Number of milliseconds from the time when a call reaches the selected API proxy to the time when API Management sends the call to your target server. Response Processing Latency Add the request and response latencies to calculate the final overhead the API proxy added to the call. Number of milliseconds from the time when the API proxy receives your target server s response to the time when API Management sends the response to the original caller. Add the request and response latencies to calculate the final overhead the API proxy added to the call.

56 5.5. Error Analysis Only API Managment Pro The Error Analysis dashboard tells you about error rates for API proxies and targets.

57 Error Composition Total Errors Proxy Errors Target Errors The total number of errors that resulted from all requests and responses seen in an API Management organization over the specified time period. The total number of proxy errors seen in an API Management organization in the specified time period. Proxy errors are measured between the time an entire request is received by API Management from a client and the time the request is sent to the backend target. The total number of target errors seen in an API Management organization in the specified time period. Target errors are measured between the time an entire request is sent by API Management to a backend target and the time the response is returned the client app Proxy Errors Total Proxy Errors 4XX 5XX The total number of proxy errors seen in an API Management organization in the specified time period. Proxy errors are measured between the time an entire request is received by API Management from a client and the time the request is sent to the backend target. Shows the number proxy errors that resulted in HTTP 4xx errors. Shows the number API requests that resulted in HTTP 5xx errors. For a complete list of HTTP status codes, see "Status Code Definitions" in the HTTP specification Target Errors Total Target Errors 4XX 5XX The total number of target errors seen in an API Management organization in the specified time period. Target errors are measured between the time an entire request is sent by API Management to a backend target and the time the response is returned the client app. The number target errors that resulted in HTTP 4xx errors. The number target errors that resulted in HTTP 5xx errors Errors by Proxy The total number of proxy errors seen in an API Management organization in the specified time period for each individual proxy. Hover over the bars to see the number of errors that came from the each proxy request flow and from the target request flow, respectively. Proxy errors are measured between the time an entire request is received by API Management from a client and the time the request is sent to the backend target.

58 Errors by Target The total number of target errors seen in an API Management organization in the specified time for each individual target. The number of error calls that did not reach any target are listed in the Target Not Contacted column. Hover over the bars to see the number of errors that came from the each proxy response flow and from the target response flow, respectively. Target errors are measured between the time an entire request is sent by API Management to a backend target and the time the response is returned to the client app. The chart shows the number of errors that came from the proxy response flow and from the target response flow, respectively.

59 5.6. Developer Engagement Only API Managment Pro The Developer Engagement dashboard tells you which of your registered app developers are generating the most API traffic. For each of your developers, you can find out who is generating the most API traffic and the most errors. For example, if a particular developer's app is generating a lot of errors relative to other developers, you can pro-actively address the problem with that developer Engagement Total Developers The total number of developers associated with APIs deployed to an organization. Developers with Apps The total number of developers associated with apps in an organization. Active Developers The number of developers generating any amount of API traffic. Developers may exist in the organization and have apps, but if their apps aren't making any API calls, they're not active. Highly Active Developers The number of developers generating API traffic exceeding 50 transactions per hour Active Developers "Active developers" means the number of developers generating any amount of API traffic. Developers may exist in the organization and have apps, but if their apps aren't making any API calls, they're not active. App Name Proxy Name The name of the app. The name of the API proxy associated with the app.

60 Developer Product Name Traffic TPH Errors Error Rate Actions The address of the developer who registered the app. The product name associated with the app. The amount of traffic generated by the app for the selected time period. The transactions per hour generated by the app for the selected time period. The total number of errors generated by the app for the selected time period. The error percentage calculated by dividing total errors by total traffic for the selected time period. Click the Analyze button to see more details about an app Analyze developer engagement In this view, select the metric you wish to view for the selected app.

Apigee Edge Cloud - Bundles Spec Sheets

Apigee Edge Cloud - Bundles Spec Sheets Apigee Edge Cloud - Bundles Spec Sheets Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities

More information

Apigee Edge Cloud. Supported browsers:

Apigee Edge Cloud. Supported browsers: Apigee Edge Cloud Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities that include, but are

More information

SAP API Management Unit 4.4: Closer look at API Owner Policy Designer PUBLIC

SAP API Management Unit 4.4: Closer look at API Owner Policy Designer PUBLIC SAP API Management Unit 4.4: Closer look at API Owner Policy Designer PUBLIC Objectives After completing this unit, you will be able to: - Add Policies to existing API Proxies - Understand some of commonly

More information

Edge Foundational Training

Edge Foundational Training Edge Foundational Training Give your team the tools to get up and running with Edge Edge Foundational Training provides the tools and information needed to start using Edge whether in the cloud or on premises.

More information

Apigee Edge Cloud. Supported browsers:

Apigee Edge Cloud. Supported browsers: Apigee Edge Cloud Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities that include, but are

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description March 22, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

FUJITSU Cloud Service K5 - API Management Service Description

FUJITSU Cloud Service K5 - API Management Service Description FUJITSU Cloud Service K5 - API Management Service Description August 8, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided

More information

Technical Brief. A Checklist for Every API Call. Managing the Complete API Lifecycle

Technical Brief. A Checklist for Every API Call. Managing the Complete API Lifecycle Technical Brief A Checklist for Table of Contents Introduction: The API Lifecycle 2 3 Security professionals API developers Operations engineers API product or business owners Apigee Edge 7 A Checklist

More information

API Best Practices. Managing APIs holistically across the enterprise

API Best Practices. Managing APIs holistically across the enterprise API Best Practices Managing APIs holistically across the enterprise APIs are critical to evolving application architectures Public clouds Microservices Distributed apps μservice μservice μservice μservice

More information

API MANAGEMENT WITH WEBMETHODS

API MANAGEMENT WITH WEBMETHODS API MANAGEMENT WITH WEBMETHODS Subhash Ramachandran SVP, Product Management & Marketing DIGITAL TRANSFORMATION #WITHOUTCOMPROMISE 2017 Software AG. All rights reserved. WEBMETHODS API MANAGEMENT PLATFORM

More information

Build Mobile Cloud Apps Effectively Using Oracle Mobile Cloud Services (MCS)

Build Mobile Cloud Apps Effectively Using Oracle Mobile Cloud Services (MCS) Build Mobile Cloud Apps Effectively Using Oracle Mobile Cloud Services (MCS) Presented by: John Jay King Download this paper from: 1 Session Objectives Understand the need for something like Oracle Mobile

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

Introduction to Worklight Integration IBM Corporation

Introduction to Worklight Integration IBM Corporation Introduction to Worklight Integration Agenda IBM Mobile Foundation Introduction to Worklight How to Integrate Worklight Adapters WebAPI HTTP & SOAP Database (SQL) WebSphere Message Broker Cast Iron 2 IBM

More information

Apigee Edge Developer Training

Apigee Edge Developer Training Training Training DURATION: 4 or 5 days FORMAT: Instructor-led with labs DELIVERY: Public or Private class PREREQUISITES: None HOW IT WORKS: Days 1 4 cover the fundamentals of developing and securing s

More information

Managing Your APIs in a Manufacturing Environment

Managing Your APIs in a Manufacturing Environment Managing Your APIs in a Manufacturing Environment Chris Borneman Vice President Software AG Government Solutions What is an API? An API, strictly speaking, is defined as an access method to a service (or

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

StreamSets Control Hub Installation Guide

StreamSets Control Hub Installation Guide StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in

More information

API Manager Version May User Guide

API Manager Version May User Guide API Manager Version 7.5.3 8 May 2018 User Guide Copyright 2018 Axway All rights reserved. This documentation describes the following Axway software: Axway API Manager 7.5.3 No part of this publication

More information

Apigee Edge Start. Description. Key Features. Deployment. Limitations. Apigee Edge Start

Apigee Edge Start. Description. Key Features. Deployment. Limitations. Apigee Edge Start Apigee Edge Start Description Apigee Edge Start delivers core API management capabilities as a cloud service. Apigee Edge Start is an entry-level offering for developers and startups - intended for API

More information

uick Start Guide 1. Install Oracle Java SE Development Kit (JDK) version or later or 1.7.* and set the JAVA_HOME environment variable.

uick Start Guide 1. Install Oracle Java SE Development Kit (JDK) version or later or 1.7.* and set the JAVA_HOME environment variable. API Manager uick Start Guide WSO2 API Manager is a complete solution for publishing APIs, creating and managing a developer community, and for routing API traffic in a scalable manner. It leverages the

More information

Integration Service. Admin Console User Guide. On-Premises

Integration Service. Admin Console User Guide. On-Premises Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and

More information

12/05/2017. Geneva ServiceNow Security Management

12/05/2017. Geneva ServiceNow Security Management 12/05/2017 Security Management Contents... 3 Security Incident Response...3 Security Incident Response overview... 3 Get started with Security Incident Response... 6 Security incident creation... 40 Security

More information

The Now Platform Reference Guide

The Now Platform Reference Guide The Now Platform Reference Guide A tour of key features and functionality START Introducing the Now Platform Digitize your business with intelligent apps The Now Platform is an application Platform-as-a-Service

More information

Google GCP-Solution Architects Exam

Google GCP-Solution Architects Exam Volume: 90 Questions Question: 1 Regarding memcache which of the options is an ideal use case? A. Caching data that isn't accessed often B. Caching data that is written more than it's read C. Caching important

More information

Integration Service. Admin Console User Guide. On-Premises

Integration Service. Admin Console User Guide. On-Premises Kony Fabric Integration Service Admin Console User Guide On-Premises Release V8 SP1 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

A10 HARMONY CONTROLLER

A10 HARMONY CONTROLLER DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for

More information

What's New in ActiveVOS 9.0

What's New in ActiveVOS 9.0 What's New in ActiveVOS 9.0 2011 Active Endpoints Inc. ActiveVOS is a trademark of Active Endpoints, Inc. All other company and product names are the property of their respective owners. 2011 Content Overview...

More information

Developing Microsoft SharePoint Server 2013 Advanced Solutions

Developing Microsoft SharePoint Server 2013 Advanced Solutions 20489 - Developing Microsoft SharePoint Server 2013 Advanced Solutions Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This training course provides

More information

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April,

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April, Best Practices: Authentication & Authorization Infrastructure Massimo Benini HPCAC - April, 03 2019 Agenda - Common Vocabulary - Keycloak Overview - OAUTH2 and OIDC - Microservices Auth/Authz techniques

More information

Participant User Guide, Version 2.6

Participant User Guide, Version 2.6 Developers Integration Lab (DIL) Participant User Guide, Version 2.6 3/17/2013 REVISION HISTORY Author Date Description of Change 0.1 Laura Edens Mario Hyland 9/19/2011 Initial Release 1.0 Michael Brown

More information

Qualys Cloud Suite 2.30

Qualys Cloud Suite 2.30 Qualys Cloud Suite 2.30 Here s what s new in Qualys Cloud Suite 2.30! AssetView ThreatPROTECT Dynamic tag support for Amazon EC2 Metadata Search Assets by Amazon EC2 Metadata Cloud Agent Download Search

More information

What's New in ActiveVOS 7.1 Includes ActiveVOS 7.1.1

What's New in ActiveVOS 7.1 Includes ActiveVOS 7.1.1 What's New in ActiveVOS 7.1 Includes ActiveVOS 7.1.1 2010 Active Endpoints Inc. ActiveVOS is a trademark of Active Endpoints, Inc. All other company and product names are the property of their respective

More information

Monitoring the Device

Monitoring the Device The system includes dashboards and an Event Viewer that you can use to monitor the device and traffic that is passing through the device. Enable Logging to Obtain Traffic Statistics, page 1 Monitoring

More information

DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 ADVANCED SOLUTIONS. Course: 20489A; Duration: 5 Days; Instructor-led

DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 ADVANCED SOLUTIONS. Course: 20489A; Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 ADVANCED SOLUTIONS Course: 20489A; Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This course provides SharePoint

More information

IBM API Connect: Introduction to APIs, Microservices and IBM API Connect

IBM API Connect: Introduction to APIs, Microservices and IBM API Connect IBM API Connect: Introduction to APIs, Microservices and IBM API Connect Steve Lokam, Sr. Principal at OpenLogix @openlogix @stevelokam slokam@open-logix.com (248) 869-0083 What do these companies have

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

NetIQ Identity Manager Driver for REST Implementation Guide. February 2018

NetIQ Identity Manager Driver for REST Implementation Guide. February 2018 NetIQ Identity Manager Driver for REST Implementation Guide February 2018 Legal Notice For information about NetIQ trademarks, see https://www.netiq.com/company/legal/. Copyright (C) 2018 NetIQ Corporation.

More information

Il Mainframe e il paradigma dell enterprise mobility. Carlo Ferrarini zsystems Hybrid Cloud

Il Mainframe e il paradigma dell enterprise mobility. Carlo Ferrarini zsystems Hybrid Cloud Il Mainframe e il paradigma dell enterprise mobility Carlo Ferrarini carlo_ferrarini@it.ibm.com zsystems Hybrid Cloud Agenda Exposing enterprise assets in the API Economy Era Deliver natural APIs from

More information

Management Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections:

Management Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections: This chapter contains the following sections:, page 1 About the Management GUI, page 1 About the CLI, page 1 User Login Menu Options, page 2 Customizing the GUI and CLI Banners, page 3 REST API, page 3

More information

API Portal Version December User Guide

API Portal Version December User Guide API Portal Version 7.5.4 8 December 2017 User Guide Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway API Portal 7.5.4 No part of this publication

More information

1Z Oracle SOA Suite 12c Essentials Exam Summary Syllabus Questions

1Z Oracle SOA Suite 12c Essentials Exam Summary Syllabus Questions 1Z0-434 Oracle SOA Suite 12c Essentials Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-434 Exam on Oracle SOA Suite 12c Essentials... 2 Oracle 1Z0-434 Certification Details:... 2

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Snapt Accelerator Manual

Snapt Accelerator Manual Snapt Accelerator Manual Version 2.0 pg. 1 Contents Chapter 1: Introduction... 3 Chapter 2: General Usage... 3 Accelerator Dashboard... 4 Standard Configuration Default Settings... 5 Standard Configuration

More information

NetIQ Identity Manager Driver for REST Implementation Guide. February 2017

NetIQ Identity Manager Driver for REST Implementation Guide. February 2017 NetIQ Identity Manager Driver for REST Implementation Guide February 2017 Legal Notice For information about NetIQ trademarks, see https://www.netiq.com/company/legal/. Copyright (C) 2017 NetIQ Corporation.

More information

ITP 140 Mobile Technologies. Mobile Topics

ITP 140 Mobile Technologies. Mobile Topics ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users

More information

RESTful API Design APIs your consumers will love

RESTful API Design APIs your consumers will love RESTful API Design APIs your consumers will love Matthias Biehl RESTful API Design Copyright 2016 by Matthias Biehl All rights reserved, including the right to reproduce this book or portions thereof in

More information

STARCOUNTER. Technical Overview

STARCOUNTER. Technical Overview STARCOUNTER Technical Overview Summary 3 Introduction 4 Scope 5 Audience 5 Prerequisite Knowledge 5 Virtual Machine Database Management System 6 Weaver 7 Shared Memory 8 Atomicity 8 Consistency 9 Isolation

More information

Oracle SOA Suite 11g: Build Composite Applications

Oracle SOA Suite 11g: Build Composite Applications Oracle University Contact Us: Landline: +91 80 67863899 Toll Free: 0008004401672 Oracle SOA Suite 11g: Build Composite Applications Duration: 5 Days What you will learn This course teaches you to design

More information

User Guide HelpSystems Insite 1.6

User Guide HelpSystems Insite 1.6 User Guide HelpSystems Insite 1.6 Copyright Copyright HelpSystems, LLC. HelpSystems Insite, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot CLIENT, Robot CONSOLE, Robot CORRAL, Robot

More information

AppSpider Enterprise. Getting Started Guide

AppSpider Enterprise. Getting Started Guide AppSpider Enterprise Getting Started Guide Contents Contents 2 About AppSpider Enterprise 4 Getting Started (System Administrator) 5 Login 5 Client 6 Add Client 7 Cloud Engines 8 Scanner Groups 8 Account

More information

ACI Terminology. This chapter contains the following sections: ACI Terminology, on page 1. Cisco ACI Term. (Approximation)

ACI Terminology. This chapter contains the following sections: ACI Terminology, on page 1. Cisco ACI Term. (Approximation) This chapter contains the following sections:, on page 1 Alias API Inspector App Center Alias A changeable name for a given object. While the name of an object, once created, cannot be changed, the Alias

More information

WEB-APIs DRIVING DIGITAL INNOVATION

WEB-APIs DRIVING DIGITAL INNOVATION WEB-APIs DRIVING DIGITAL INNOVATION Importance of Web-APIs Simply put, Web-APIs are the medium to make a company s digital assets consumable to any channel, which has a current or latent need. It helps

More information

Project Management. Projects CHAPTER

Project Management. Projects CHAPTER CHAPTER 1 AON Version 2.4 introduces the concept of projects to partition the work performed by different development teams. A project contains all of the resources, such as policy execution plans (PEPs),

More information

Oracle API Platform Cloud Service

Oracle API Platform Cloud Service Oracle API Platform Cloud Service Oracle API Platform Cloud Service provides a foundation for Digital Transformation through the first API Management offering that comprises the Full API Lifecycle. Encompassing

More information

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany -

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany - Open XML Gateway User Guide Conventions Typographic representation: Screen text and KEYPAD Texts appearing on the screen, key pads like e.g. system messages, menu titles, - texts, or buttons are displayed

More information

Oracle Cloud Using the Eventbrite Adapter. Release 17.3

Oracle Cloud Using the Eventbrite Adapter. Release 17.3 Oracle Cloud Using the Eventbrite Adapter Release 17.3 E69235-08 September 2017 Oracle Cloud Using the Eventbrite Adapter, Release 17.3 E69235-08 Copyright 2016, 2017, Oracle and/or its affiliates. All

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Send me up to 5 good questions in your opinion, I ll use top ones Via direct message at slack. Can be a group effort. Try to add some explanation.

Send me up to 5 good questions in your opinion, I ll use top ones Via direct message at slack. Can be a group effort. Try to add some explanation. Notes Midterm reminder Second midterm next week (04/03), regular class time 20 points, more questions than midterm 1 non-comprehensive exam: no need to study modules before midterm 1 Online testing like

More information

FAQs. Business (CIP 2.2) AWS Market Place Troubleshooting and FAQ Guide

FAQs. Business (CIP 2.2) AWS Market Place Troubleshooting and FAQ Guide FAQs 1. What is the browser compatibility for logging into the TCS Connected Intelligence Data Lake for Business Portal? Please check whether you are using Mozilla Firefox 18 or above and Google Chrome

More information

Making your Application Social with the Chatter API

Making your Application Social with the Chatter API Making your Application Social with the Chatter API Logan Henriquez Product Manager @loganh Quinton Wall Developer Evangelist @quintonwall Safe Harbor Safe harbor statement under the Private Securities

More information

IP PBX for Service Oriented Architectures Communications Web Services

IP PBX for Service Oriented Architectures Communications Web Services IP PBX for Service Oriented Architectures Communications Web Services.......... Introduction Enterprise communications have traditionally been provided by closed, stand-alone PBX systems. Installed in

More information

Develop and test your Mobile App faster on AWS

Develop and test your Mobile App faster on AWS Develop and test your Mobile App faster on AWS Carlos Sanchiz, Solutions Architect @xcarlosx26 #AWSSummit 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The best mobile apps are

More information

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape Enterprise SOA Experience Workshop Module 8: Operating an enterprise SOA Landscape Agenda 1. Authentication and Authorization 2. Web Services and Security 3. Web Services and Change Management 4. Summary

More information

StorageGRID Webscale NAS Bridge Management API Guide

StorageGRID Webscale NAS Bridge Management API Guide StorageGRID Webscale NAS Bridge 2.0.3 Management API Guide January 2018 215-12414_B0 doccomments@netapp.com Table of Contents 3 Contents Understanding the NAS Bridge management API... 4 RESTful web services

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2011, Oracle and/or its affiliates. All rights Web Services and SOA Integration Options for Oracle E-Business Suite Rajesh Ghosh, Group Manager, Applications Technology Group Abhishek Verma,

More information

TIBCO Cloud Integration Security Overview

TIBCO Cloud Integration Security Overview TIBCO Cloud Integration Security Overview TIBCO Cloud Integration is secure, best-in-class Integration Platform as a Service (ipaas) software offered in a multi-tenant SaaS environment with centralized

More information

Oracle Cloud Using the Evernote Adapter. Release 17.3

Oracle Cloud Using the Evernote Adapter. Release 17.3 Oracle Cloud Using the Evernote Adapter Release 17.3 E69234-07 September 2017 Oracle Cloud Using the Evernote Adapter, Release 17.3 E69234-07 Copyright 2016, 2017, Oracle and/or its affiliates. All rights

More information

5 OAuth Essentials for API Access Control

5 OAuth Essentials for API Access Control 5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows

More information

vcloud Director Administrator's Guide

vcloud Director Administrator's Guide vcloud Director 5.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Oracle SOA Suite 11g: Build Composite Applications

Oracle SOA Suite 11g: Build Composite Applications Oracle University Contact Us: 1.800.529.0165 Oracle SOA Suite 11g: Build Composite Applications Duration: 5 Days What you will learn This course covers designing and developing SOA composite applications

More information

Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents

Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Introduction... 2 High-Level Platform Architecture Diagram... 3 Zbi Production Environment... 4 Zbi Publishing Engine...

More information

The IBM MobileFirst Platform

The IBM MobileFirst Platform The IBM MobileFirst Platform Curtis Miles IBM MobileFirst Solution Architect April 14, 2015 What is the IBM MobileFirst Platform? A modular set " of libraries, tools, and runtimes " that help you " easily

More information

Axway API Gateway. Version 7.4.1

Axway API Gateway. Version 7.4.1 C O N C E P T S G U I D E Axway API Gateway Version 7.4.1 18 September 2017 Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1

More information

Red Hat 3scale 2-saas

Red Hat 3scale 2-saas Red Hat 3scale 2-saas Product For Use with Red Hat 3scale 2-saas Last Updated: 2018-11-07 Red Hat 3scale 2-saas Product For Use with Red Hat 3scale 2-saas Legal Notice Copyright 2018 Red Hat, Inc. The

More information

General. Analytics. MCS Instance Has Predefined Storage Limit. Purge Analytics Data Before Reaching Storage Limit

General. Analytics. MCS Instance Has Predefined Storage Limit. Purge Analytics Data Before Reaching Storage Limit Oracle Cloud Mobile Cloud Service Known Issues 18.1.3 E93163-01 February 2018 General MCS Instance Has Predefined Storage Limit Each MCS instance has a set storage space that can t be changed manually.

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

Tutorial: Building the Services Ecosystem

Tutorial: Building the Services Ecosystem Tutorial: Building the Services Ecosystem GlobusWorld 2018 Steve Tuecke tuecke@globus.org What is a services ecosystem? Anybody can build services with secure REST APIs App Globus Transfer Your Service

More information

Data Breach Risk Scanning and Reporting

Data Breach Risk Scanning and Reporting Data Breach Risk Scanning and Reporting 2017. SolarWinds. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document

More information

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases An AdvOSS White Paper Latest version of this white paper can always be found at http://advoss.com/resources/whitepapers/advoss-aaa-workflows.pdf

More information

Creating a REST API which exposes an existing SOAP Service with IBM API Management

Creating a REST API which exposes an existing SOAP Service with IBM API Management Creating a REST API which exposes an existing SOAP Service with IBM API Management 4.0.0.0 2015 Copyright IBM Corporation Page 1 of 33 TABLE OF CONTENTS OBJECTIVE...3 PREREQUISITES...3 CASE STUDY...4 USER

More information

Oracle Cloud Using the Oracle Responsys Adapter. Release 17.3

Oracle Cloud Using the Oracle Responsys Adapter. Release 17.3 Oracle Cloud Using the Oracle Responsys Adapter Release 17.3 E70393-06 September 2017 Oracle Cloud Using the Oracle Responsys Adapter, Release 17.3 E70393-06 Copyright 2016, 2017, Oracle and/or its affiliates.

More information

Active Endpoints. ActiveVOS Platform Architecture Active Endpoints

Active Endpoints. ActiveVOS Platform Architecture Active Endpoints Active Endpoints ActiveVOS Platform Architecture ActiveVOS Unique process automation platforms to develop, integrate, and deploy business process applications quickly User Experience Easy to learn, use

More information

Cisco ACI Terminology ACI Terminology 2

Cisco ACI Terminology ACI Terminology 2 inology ACI Terminology 2 Revised: May 24, 2018, ACI Terminology Cisco ACI Term Alias API Inspector App Center Application Policy Infrastructure Controller (APIC) Application Profile Atomic Counters Alias

More information

IBM Security QRadar Deployment Intelligence app IBM

IBM Security QRadar Deployment Intelligence app IBM IBM Security QRadar Deployment Intelligence app IBM ii IBM Security QRadar Deployment Intelligence app Contents QRadar Deployment Intelligence app.. 1 Installing the QRadar Deployment Intelligence app.

More information

TIBCO API Exchange Concepts

TIBCO API Exchange Concepts TIBCO API Exchange Concepts Software Release 2.0 November 2013 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

How to Select the Right Marketing Cloud Edition

How to Select the Right Marketing Cloud Edition How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire

More information

Adobe Marketing Cloud Best Practices Implementing Adobe Target using Dynamic Tag Management

Adobe Marketing Cloud Best Practices Implementing Adobe Target using Dynamic Tag Management Adobe Marketing Cloud Best Practices Implementing Adobe Target using Dynamic Tag Management Contents Best Practices for Implementing Adobe Target using Dynamic Tag Management.3 Dynamic Tag Management Implementation...4

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Tenable.io User Guide. Last Revised: November 03, 2017

Tenable.io User Guide. Last Revised: November 03, 2017 Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link

More information

ArcGIS for Server: What s New. Philip Heede, Jay Theodore

ArcGIS for Server: What s New. Philip Heede, Jay Theodore ArcGIS for Server: What s New Philip Heede, Jay Theodore Agenda GIS server Web GIS: Portal for ArcGIS ArcGIS for Server Extensions - GeoEvent Extension - Production Mapping Primary target for new functionality

More information

Alteryx Technical Overview

Alteryx Technical Overview Alteryx Technical Overview v 1.5, March 2017 2017 Alteryx, Inc. v1.5, March 2017 Page 1 Contents System Overview... 3 Alteryx Designer... 3 Alteryx Engine... 3 Alteryx Service... 5 Alteryx Scheduler...

More information

Etanova Enterprise Solutions

Etanova Enterprise Solutions Etanova Enterprise Solutions Front End Development» 2018-09-23 http://www.etanova.com/technologies/front-end-development Contents HTML 5... 6 Rich Internet Applications... 6 Web Browser Hardware Acceleration...

More information

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5 CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

API Security Management with Sentinet SENTINET

API Security Management with Sentinet SENTINET API Security Management with Sentinet SENTINET Overview 1 Contents Introduction... 2 Security Mediation and Translation... 3 Security Models... 3 Authentication... 4 Authorization... 5 Bidirectional Security

More information

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 John Hohwald Slide 1 Definitions and Terminology What is SOA? SOA is an architectural style whose goal is to achieve loose coupling

More information