More and more applications are built using JSON HTTP APIs for data and functionality. This workshop will walk you why you'd want to protect APIs and enumerate the options you have to protect them.

After a brief introduction to JSON HTTP APIs, you'll build a PHP based API project which allows users to retrieve Chuck Norris quotes. You'll then progressively protect the API using a variety of methods. You'll also understand why and when to use each choice, as well as the tradeoffs they provide.

At the end of this workshop, you'll have built:

* an unprotected API
* an API protected with an API key
* an API protected using a JWT generated elsewhere

Comments

Comments are closed.