Kesha Williams discusses securing web services to ensure that only authorized users and systems have access.
- When allowing access to data via web services,…security is very important.…We want to limit who can view…or even update data.…Only trusted individuals should have access.…So, how does web service security work?…Let's use a cell phone as an example.…In order to call your friend,…you have to unlock your phone…by entering a passcode.…This passcode is like the key or the token…used to secure a web service.…Let's say your friend will not answer calls…from random numbers,…and she only answers your call…because she knows it's you.…
You were able to call her…because you have the key or token…to unlock your phone.…Web services that are secure…behave in a similar manner.…If an unsecured request is made…to a web service to retrieve data,…if that request lacks the proper key or API token,…that request is rejected.…Let's discuss a few common web service security principles:…authentication and authorization.…Authentication is about validating…the identity of a client…that is attempting to call a web service…that accesses secure data.…
- What is a web service?
- Securing web services
- Consuming and creating a RESTful API
- Documenting an API
- Creating a web service
- Consuming a SOAP web service
- Developing APIs using GraphQL
Skill Level Beginner
HTTP Essential Trainingwith Morten Rand-Hendriksen50m 18s Beginner
What you should know1m 12s
1. Understanding Web Services
2. Using RESTful APIs and HATEOAS
3. Using SOAP-Based Web Services
4. Developing APIs Using GraphQL
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.