Skip to content
Open
Show file tree
Hide file tree
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions API-strategie-modules/access-control/access-control.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,9 @@ With the registration and onboarding of organizations and users representing the

When a user issues a client requests to a resource via a REST API, access must be verified at runtime. An **API Gateway** acts as the gatekeeper, checking whether the provided **access token** is valid. These tokens are typically issued through standards like **OAuth 2.0 / OpenID Connect** or **SAML 2.0**. Only after successful validation will the request be forwarded to the backend service, ensuring secure and consistent runtime access to protected resources.

![GetTokenUseToken image](/media/GetTokenUseToken.png)
Comment thread
Fdeutekom marked this conversation as resolved.
Outdated
*step 1 get token, step 2 use token in request, step 3 gateway verifies token, step 4 resource accessed*
Comment thread
Fdeutekom marked this conversation as resolved.
Outdated

#### HTTPS (TLS) configuration

When a client communicates with a REST API, the connection itself must be protected. **HTTPS** provides this by encrypting all traffic between client and server using **PKI certificates**. These certificates, issued by trusted authorities, verify the server’s identity and ensure that data cannot be intercepted or modified in transit. By enforcing HTTPS, APIs provide a baseline for both **confidentiality** and **integrity** of network communications, forming the foundation of secure runtime interactions.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PKI is niet exact hier. Zeker binnen eigen netwerken kan de 'P' hier onuist zijn, precieser zou zijn dat het om X509 certificates gaat, waarbij (inderdaad zoals beschreven) de validity onderschreven is door een trusted authority (maar dat kan ook een eigen signer zijn).

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In allerlei situaties kan natuurlijk ook de client op die manier geverifieerd worden dmv Mtls.

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

'One must follow the latest NCSC guidelines for TLS' also is not 100% correct. Various ministries are more strict for their services (based on context).

Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.