Securing HTTP-Based APIs

Securing HTTP-Based APIs

This guide provides recommendations for securing HTTP-based APIs. It is aimed at technical personnel responsible for designing or building applications that provide HTTP APIs. Please note that you should perform threat modeling specific to your design to fully secure HTTP-based APIs. What is an HTTP-Based API? An HTTP-based API enables communication between different software systems … Read more

How to Organize Authorization Matters and Define Authorization Rights?

How to Organize Authorization Matters and Define Authorization Rights?

Recommended | Bian Zhihan Oral | Lei Chengshi Editor | Xu Jiasang Source | Based on the content of the public live broadcast of “From Pressure to Vitality: Decoding Huawei’s Winter Survival Strategy” Lecture 2 01 Organizing the authorization matters from two dimensions: Organizational dimension, Process dimension First, authorize from the organizational dimension. What kind … Read more