SlideShare a Scribd company logo
Who is Accessing My API?
Who is Accessing My API?
Chris Haddad
Who is accessing my API?
Not this guy again!
Copyright © 2015 Cloud Identity Summit. All rights reserved. 3
For a Session: Focus Less On Building an API
Fortress
Copyright © 2015 Cloud Identity Summit . All rights reserved.
5
Think About
Identity Driving
The API Economy!
http://wso2.com/landing/enabling-the-connected-business
Increase Revenue Opportunities
© Mathias Rosenthal - Fotolia.com
Copyright © 2015 Cloud Identity Summit . All rights reserved.
7
Enhance Customer Intimacy
Copyright © 2015 Cloud Identity Summit . All rights reserved.
8
Extend Your Business Reach
Step One: Know Your API Consumer
• User
• Application
• Device
• Location
Copyright © 2015 Cloud Identity Summit. All rights reserved. 9
Identifying the User
• SAML Grant Type for Oauth
Copyright © 2015 Cloud Identity Summit. All rights reserved. 10
Identifying the Application
• Oauth 2.0 Bearer Token
Copyright © 2015 Cloud Identity Summit. All rights reserved. 11
Identifying the Device
• What you know?
• Universal device identifier
• What you have?
• Certificate
Copyright © 2015 Cloud Identity Summit. All rights reserved. 12
Identifying the Location
• Mobile Connect Discovery API
• GSMA OneAPI
Copyright © 2015 Cloud Identity Summit. All rights reserved. 13
Action Item: Externalize Identity (as an API)
Copyright © 2015 Cloud Identity Summit. All rights reserved. 14
Step Two: Know what your API Consumer Wants!
http://www.amazon.com/The-Intention-Economy-Customers-Charge/dp/1422158527
Step 3: Understand Context
• Your Brand
• Social Context
• Customer,
Location
• Environment
Step 4: Blend Context with Intent
{incidents: [
{impacting: false,
eventCode: 0,
iconURL: "http://...",
lat: 38.743999,
shortDesc: "Exit ramp closed on I
95...",
type: 1,
severity: 0,
fullDesc: "In NEWINGTON exit
ramp closed on I-95 ...",
startTime: "2010-02-21T00:14:
07",
lng: -77.188004,
id: "368598263",
endTime: "2010-02-27T05:04:19"
},
Image source: http://www.directoryofnewyorkcity.com/blog/2009/05/how-to-find-parking-in-new-york-city/
Real-time traffic map: http://www.mapquestapi.com/traffic/
Action Item: Make API Analytics Identity Aware
http://wso2.com/landing/enabling-the-connected-business
© adam121 - Fotolia.com
Copyright © 2015 Cloud Identity Summit . All rights reserved.
19
Step 5: Monetize
APIs
• Membership service levels
• Monetization rates and discounts
• Business processes and rules for stores
and ecosystem
With Identity, Your API can
• Responsively interact in the serendipitous, contextual
moment
• Virally connect ecosystem participants
• Drive helpful and relevant decisions
• Deliver a compelling end-to-end user experience
Copyright © 2015 Cloud Identity Summit. All rights reserved. 20

More Related Content

PPTX
Kondo-ing API Authorization
PDF
apidays LIVE Jakarta - E5 ways to make your integration more resilient by Je...
PDF
Is Your API Being Abused – And Would You Even Notice If It Was?
PPTX
API Management: Rise of the Planet of the Apps (2016 09-26 - Porto.Data)
PPTX
Test and Protect Your API
PPTX
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
apidays LIVE Hong Kong - API Abuse - Comprehension and Prevention by David St...
Kondo-ing API Authorization
apidays LIVE Jakarta - E5 ways to make your integration more resilient by Je...
Is Your API Being Abused – And Would You Even Notice If It Was?
API Management: Rise of the Planet of the Apps (2016 09-26 - Porto.Data)
Test and Protect Your API
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
apidays LIVE Hong Kong - API Abuse - Comprehension and Prevention by David St...

What's hot (11)

PPTX
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
PPTX
Confronting API Security in the Brave New Open Banking Era
PPTX
Securing Insecure
PDF
APIs of Enterprise mBaaS Platforms
PPTX
Deconstructing API Security
PDF
CIS 2015 Extreme OAuth - Paul Meyer
PPTX
apidays LIVE Hong Kong - Art and Science of Rate Limits for APIs by Shahnawaz...
PPTX
Deep-Dive: API Security in the Digital Age
PPTX
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
PPTX
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
PPTX
apidays LIVE Paris - Microservices, up and running by Irakli Nadareishvili
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Confronting API Security in the Brave New Open Banking Era
Securing Insecure
APIs of Enterprise mBaaS Platforms
Deconstructing API Security
CIS 2015 Extreme OAuth - Paul Meyer
apidays LIVE Hong Kong - Art and Science of Rate Limits for APIs by Shahnawaz...
Deep-Dive: API Security in the Digital Age
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
apidays LIVE Paris - Microservices, up and running by Irakli Nadareishvili
Ad

Viewers also liked (20)

PPTX
High Productivity Platform
PPTX
Bring N-Tier Apps to containers 2015 ContainerCon
PPTX
Lightweight ESB Alternatives
PPTX
Spreadsheets To API
PPTX
Steampunk App Servers in
PPT
Cloaking Devices, CyberPersonas, and Neutral Zones
PDF
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
PPTX
Eight Miles High: Build Cloud-native and Cloud-aware Systems
PDF
Enabling cloud-native, complex enterprise development and deployment in the C...
PPTX
Siddhi CEP 1st presentation
PPT
Mule connectors
PPT
Debug Program in Mule
PPTX
Developer’s viewpoint on swift programming language
PPT
Siddhi CEP 2nd sideshow presentation
PDF
Administration and Management with UltraESB
PPTX
ESB 4.9.0 extension points, Connectors and Inbound Endpoints
PDF
Enterprise Integration made easy with WSO2 ESB
PDF
WSO2 ESB and SOA
PDF
Magento 2.0 - eCommerce Web Portal Solutions | Case Study
High Productivity Platform
Bring N-Tier Apps to containers 2015 ContainerCon
Lightweight ESB Alternatives
Spreadsheets To API
Steampunk App Servers in
Cloaking Devices, CyberPersonas, and Neutral Zones
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
Eight Miles High: Build Cloud-native and Cloud-aware Systems
Enabling cloud-native, complex enterprise development and deployment in the C...
Siddhi CEP 1st presentation
Mule connectors
Debug Program in Mule
Developer’s viewpoint on swift programming language
Siddhi CEP 2nd sideshow presentation
Administration and Management with UltraESB
ESB 4.9.0 extension points, Connectors and Inbound Endpoints
Enterprise Integration made easy with WSO2 ESB
WSO2 ESB and SOA
Magento 2.0 - eCommerce Web Portal Solutions | Case Study
Ad

Similar to Who is Accessing My API? (20)

PDF
Delivering on Personalization with the Power of APIs
PDF
The API Opportunity: Crossing the Digital Divide
PPTX
API Management Platform Technical Evaluation Framework
PPTX
API Strategy Introduction
PPT
Six Steps To Build A Successful API
PPT
Six Steps to Build Successful APIs
PDF
Api security-present
PPT
Iag api management architect presentation
PPTX
Digital transformation
PDF
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIs
PDF
CA API Management: A DevOps Enabler
PDF
2022 APIsecure_Harnessing the Speed of Innovation
PDF
Creating a Successful API Program to Drive Digital Transformation
PPTX
Platform for Secure Digital Business
PDF
[WSO2 Summit Sydney 2019] Building a Successful API Strategy from Scratch and...
PDF
WSO2 API Platform: Vision and Roadmap
PPTX
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
PPTX
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
PDF
Gluecon2014 - Building an API strategy at Enterprise Scale
PDF
IBM API management Philip Little
Delivering on Personalization with the Power of APIs
The API Opportunity: Crossing the Digital Divide
API Management Platform Technical Evaluation Framework
API Strategy Introduction
Six Steps To Build A Successful API
Six Steps to Build Successful APIs
Api security-present
Iag api management architect presentation
Digital transformation
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIs
CA API Management: A DevOps Enabler
2022 APIsecure_Harnessing the Speed of Innovation
Creating a Successful API Program to Drive Digital Transformation
Platform for Secure Digital Business
[WSO2 Summit Sydney 2019] Building a Successful API Strategy from Scratch and...
WSO2 API Platform: Vision and Roadmap
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
Gluecon2014 - Building an API strategy at Enterprise Scale
IBM API management Philip Little

More from Chris Haddad (20)

PPTX
Deploy at scale with CoreOS Kubernetes and Apache Stratos
PPT
Merging microservices architecture with SOA practices
PPT
Connected Architecture Fabric Creating a Connected World
PPTX
Establishing SOA Focused Enterprise Architecture
PPTX
Java PaaS Apache Stratos
PPTX
Shadow IT Risk and Reward
PPTX
Gaining Startup Speed with DevOps PaaS
PPT
Business driven IT design
PPT
SOA and API Convergence Strategy and Tactics
PPT
Responsive IT and Connected Business
PPT
Big data streams, Internet of Things, and Complex Event Processing Improve So...
PPT
Why Reshape Reference Architecture
PPT
What reference architecture models to adopt
PPT
How to reshape reference architecture
PPTX
Promote Your API Brand and Extend Your API Reach
PPTX
Stratos AppFactory in the Cloud tampa meetup-2013-09
PPTX
Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...
PDF
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
PPT
Bridging IaaS With PaaS To Deliver The Service-Oriented Data Center
PPTX
New IT Plan
Deploy at scale with CoreOS Kubernetes and Apache Stratos
Merging microservices architecture with SOA practices
Connected Architecture Fabric Creating a Connected World
Establishing SOA Focused Enterprise Architecture
Java PaaS Apache Stratos
Shadow IT Risk and Reward
Gaining Startup Speed with DevOps PaaS
Business driven IT design
SOA and API Convergence Strategy and Tactics
Responsive IT and Connected Business
Big data streams, Internet of Things, and Complex Event Processing Improve So...
Why Reshape Reference Architecture
What reference architecture models to adopt
How to reshape reference architecture
Promote Your API Brand and Extend Your API Reach
Stratos AppFactory in the Cloud tampa meetup-2013-09
Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Bridging IaaS With PaaS To Deliver The Service-Oriented Data Center
New IT Plan

Recently uploaded (20)

PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPT
tcp ip networks nd ip layering assotred slides
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
innovation process that make everything different.pptx
PPTX
artificial intelligence overview of it and more
PDF
Testing WebRTC applications at scale.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Introduction to Information and Communication Technology
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
QR Codes Qr codecodecodecodecocodedecodecode
SASE Traffic Flow - ZTNA Connector-1.pdf
tcp ip networks nd ip layering assotred slides
presentation_pfe-universite-molay-seltan.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Paper PDF World Game (s) Great Redesign.pdf
Decoding a Decade: 10 Years of Applied CTI Discipline
Sims 4 Historia para lo sims 4 para jugar
innovation process that make everything different.pptx
artificial intelligence overview of it and more
Testing WebRTC applications at scale.pdf
international classification of diseases ICD-10 review PPT.pptx
Introduction to Information and Communication Technology
Job_Card_System_Styled_lorem_ipsum_.pptx
Introuction about WHO-FIC in ICD-10.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Triggering QUIC, presented by Geoff Huston at IETF 123
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
522797556-Unit-2-Temperature-measurement-1-1.pptx

Who is Accessing My API?

  • 2. Who is Accessing My API? Chris Haddad
  • 3. Who is accessing my API? Not this guy again! Copyright © 2015 Cloud Identity Summit. All rights reserved. 3
  • 4. For a Session: Focus Less On Building an API Fortress
  • 5. Copyright © 2015 Cloud Identity Summit . All rights reserved. 5 Think About Identity Driving The API Economy!
  • 7. Copyright © 2015 Cloud Identity Summit . All rights reserved. 7 Enhance Customer Intimacy
  • 8. Copyright © 2015 Cloud Identity Summit . All rights reserved. 8 Extend Your Business Reach
  • 9. Step One: Know Your API Consumer • User • Application • Device • Location Copyright © 2015 Cloud Identity Summit. All rights reserved. 9
  • 10. Identifying the User • SAML Grant Type for Oauth Copyright © 2015 Cloud Identity Summit. All rights reserved. 10
  • 11. Identifying the Application • Oauth 2.0 Bearer Token Copyright © 2015 Cloud Identity Summit. All rights reserved. 11
  • 12. Identifying the Device • What you know? • Universal device identifier • What you have? • Certificate Copyright © 2015 Cloud Identity Summit. All rights reserved. 12
  • 13. Identifying the Location • Mobile Connect Discovery API • GSMA OneAPI Copyright © 2015 Cloud Identity Summit. All rights reserved. 13
  • 14. Action Item: Externalize Identity (as an API) Copyright © 2015 Cloud Identity Summit. All rights reserved. 14
  • 15. Step Two: Know what your API Consumer Wants! http://www.amazon.com/The-Intention-Economy-Customers-Charge/dp/1422158527
  • 16. Step 3: Understand Context • Your Brand • Social Context • Customer, Location • Environment
  • 17. Step 4: Blend Context with Intent {incidents: [ {impacting: false, eventCode: 0, iconURL: "http://...", lat: 38.743999, shortDesc: "Exit ramp closed on I 95...", type: 1, severity: 0, fullDesc: "In NEWINGTON exit ramp closed on I-95 ...", startTime: "2010-02-21T00:14: 07", lng: -77.188004, id: "368598263", endTime: "2010-02-27T05:04:19" }, Image source: http://www.directoryofnewyorkcity.com/blog/2009/05/how-to-find-parking-in-new-york-city/ Real-time traffic map: http://www.mapquestapi.com/traffic/
  • 18. Action Item: Make API Analytics Identity Aware http://wso2.com/landing/enabling-the-connected-business © adam121 - Fotolia.com
  • 19. Copyright © 2015 Cloud Identity Summit . All rights reserved. 19 Step 5: Monetize APIs • Membership service levels • Monetization rates and discounts • Business processes and rules for stores and ecosystem
  • 20. With Identity, Your API can • Responsively interact in the serendipitous, contextual moment • Virally connect ecosystem participants • Drive helpful and relevant decisions • Deliver a compelling end-to-end user experience Copyright © 2015 Cloud Identity Summit. All rights reserved. 20