Skip to main content
  • Book
  • © 2020

Advanced API Security

OAuth 2.0 and Beyond

Apress
  • Defines best practices in designing, developing, and deploying APIs securely
  • Provides hands-on tutorials covering key aspects in API security
  • Helps you choose between the available standards for securing APIs

Buy it now

Buying options

eBook USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 chapters)

  1. Front Matter

    Pages i-xix
  2. APIs Rule!

    • Prabath Siriwardena
    Pages 1-32
  3. Designing Security for APIs

    • Prabath Siriwardena
    Pages 33-67
  4. Securing APIs with Transport Layer Security (TLS)

    • Prabath Siriwardena
    Pages 69-79
  5. OAuth 2.0 Fundamentals

    • Prabath Siriwardena
    Pages 81-101
  6. Edge Security with an API Gateway

    • Prabath Siriwardena
    Pages 103-127
  7. OpenID Connect (OIDC)

    • Prabath Siriwardena
    Pages 129-155
  8. Message-Level Security with JSON Web Signature

    • Prabath Siriwardena
    Pages 157-184
  9. Message-Level Security with JSON Web Encryption

    • Prabath Siriwardena
    Pages 185-210
  10. OAuth 2.0 Profiles

    • Prabath Siriwardena
    Pages 211-226
  11. Accessing APIs via Native Mobile Apps

    • Prabath Siriwardena
    Pages 227-241
  12. OAuth 2.0 Token Binding

    • Prabath Siriwardena
    Pages 243-255
  13. Federating Access to APIs

    • Prabath Siriwardena
    Pages 257-276
  14. User-Managed Access

    • Prabath Siriwardena
    Pages 277-286
  15. OAuth 2.0 Security

    • Prabath Siriwardena
    Pages 287-304
  16. Patterns and Practices

    • Prabath Siriwardena
    Pages 305-319
  17. The Evolution of Identity Delegation

    • Prabath Siriwardena
    Pages 321-330
  18. OAuth 1.0

    • Prabath Siriwardena
    Pages 331-354
  19. How Transport Layer Security Works?

    • Prabath Siriwardena
    Pages 355-376
  20. UMA Evolution

    • Prabath Siriwardena
    Pages 377-396

About this book

Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. 


Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. 


Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for standards, and this book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitation and attack. 




What You Will Learn
  • Securely design, develop, and deploy enterprise APIs
  • Pick security standards and protocols to match business needs
  • Mitigate security exploits by understanding the OAuth 2.0 threat landscape
  • Federate identities to expand business APIs beyond the corporate firewall
  • Protect microservices at the edge by securing their APIs
  • Develop native mobile applications to access APIs securely
  • Integrate applications with SaaS APIs protected with OAuth 2.0



Who This Book Is For



Enterprise security architects who are interested in best practices around designing APIs. The book is also for developers who are building enterprise APIs and integrating with internal and external applications. 




Authors and Affiliations

  • San Jose, USA

    Prabath Siriwardena

About the author

Prabath Siriwardena is an identity evangelist, author, blogger, and VP of Identity Management and Security at WSO2. He has more than 11 years of industry experience in designing and building critical identity and access management (IAM) infrastructure for global enterprises, including many Fortune 100/500 companies. As a technology evangelist, Prabath has published five books. He blogs on various topics from blockchain, PSD2, GDPR, and IAM to microservices security. He also runs a YouTube channel. Prabath has spoken at many conferences, including RSAConference, Identiverse, European Identity Conference, Consumer Identity World USA, API World, API Strategy and Practice Con, QCon, OSCON, and WSO2Con. He has traveled the world conducting workshops and meetups to evangelize IAM communities. He is the founder of the Silicon Valley IAM User Group, which is the largest IAM meetup in the San Francisco Bay Area.

Bibliographic Information

Buy it now

Buying options

eBook USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access