HTTPS is already configured at https://api.data.gov. So, api.data.gov should make it the recommended and default protocol.
I'm sure the team here already understands the various benefits of HTTPS, and I don't mean to preach to the choir, but here are a few:
- Broader client-side compatibility. Any APIs under api.data.gov wishing to support CORS or JSONP for in-browser operation will be completely blocked on HTTPS websites, as active mixed content.
- Enhanced privacy for apps and users using APIs at api.data.gov -- HTTP headers and query string parameters (among other things) will be encrypted. For APIs accepting particularly sensitive data (like lat/long or zip), this is critical.
- The primary benefit of HTTPS: a stronger guarantee that you're speaking with the real api.data.gov.
Much of the performance hit involved in SSL can be mitigated - @igrigorik's excellent istlsfastyet.com contains many references for doing this.
There are a few ways this issue could be tackled:
- Update the documentation to always use
https:// in the examples.
- Update all links to api.data.gov to use
https://.
- Begin redirecting all
http:// requests to https:// for the main api.data.gov website.
- Begin redirecting all
http:// requests to https:// for any contained API.
- Set a HSTS header that tells clients to always use
https:// going forward.
HTTPS is already configured at https://api.data.gov. So, api.data.gov should make it the recommended and default protocol.
I'm sure the team here already understands the various benefits of HTTPS, and I don't mean to preach to the choir, but here are a few:
Much of the performance hit involved in SSL can be mitigated - @igrigorik's excellent istlsfastyet.com contains many references for doing this.
There are a few ways this issue could be tackled:
https://in the examples.https://.http://requests tohttps://for the mainapi.data.govwebsite.http://requests tohttps://for any contained API.https://going forward.