-
Notifications
You must be signed in to change notification settings - Fork 39
plaatje api access layers #681
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from 4 commits
3237455
f70c420
5241e08
59c50e5
c130ba3
7d883ce
4769905
c207667
168c698
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -29,6 +29,9 @@ With the registration and onboarding of organizations and users representing the | |
|
|
||
| When a user issues a client requests to a resource via a REST API, access must be verified at runtime. An **API Gateway** acts as the gatekeeper, checking whether the provided **access token** is valid. These tokens are typically issued through standards like **OAuth 2.0 / OpenID Connect** or **SAML 2.0**. Only after successful validation will the request be forwarded to the backend service, ensuring secure and consistent runtime access to protected resources. | ||
|
|
||
|  | ||
| *step 1 get token, step 2 use token in request, step 3 gateway verifies token, step 4 resource accessed* | ||
|
Fdeutekom marked this conversation as resolved.
Outdated
|
||
|
|
||
| #### HTTPS (TLS) configuration | ||
|
|
||
| When a client communicates with a REST API, the connection itself must be protected. **HTTPS** provides this by encrypting all traffic between client and server using **PKI certificates**. These certificates, issued by trusted authorities, verify the server’s identity and ensure that data cannot be intercepted or modified in transit. By enforcing HTTPS, APIs provide a baseline for both **confidentiality** and **integrity** of network communications, forming the foundation of secure runtime interactions. | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. PKI is niet exact hier. Zeker binnen eigen netwerken kan de 'P' hier onuist zijn, precieser zou zijn dat het om X509 certificates gaat, waarbij (inderdaad zoals beschreven) de validity onderschreven is door een trusted authority (maar dat kan ook een eigen signer zijn). There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. In allerlei situaties kan natuurlijk ook de client op die manier geverifieerd worden dmv Mtls. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 'One must follow the latest NCSC guidelines for TLS' also is not 100% correct. Various ministries are more strict for their services (based on context). |
||
|
|
||
Uh oh!
There was an error while loading. Please reload this page.