SAP API Management already provides an additional security layer to your infrastructure. However, this isn’t where security stops when it comes to APIs.
In addition to out-of-the-box security in SAP API Management, it’s possible to implement security on an API proxy level. In other words, you can use security policies (see figure below) in your API proxy to implement API-specific security.
Let’s take a brief look at each of the security policies:
The classic basic authentication works with username and password. More specifically, the policy allows you to store user credentials in a variable or extract it from a header. In both cases, it uses Base64 for the encoding or decoding. Basic authentication is especially important if you want to create an authorization header for access to a backend server or to a service that requires basic authentication.
Basic authentication is not implemented for the API proxy. It just helps you deal with scenarios in which basic authentication is required.
Sometimes, the security risk lies within the content itself. JSON threat protection helps you reduce the risk of such content-level attacks for JSON by defining specific limitations to JSON structures.
SAP API Management allows you to deal with OAuth 2.0. The handling of OAuth and OAuth tokens from within your API proxy is supported by three policies:
As mentioned before, sometimes the threat to your security lies in the content you have to deal with. Regular expression protection helps you identify those threats.
Using the regular expression policy, you can extract information from messages and then use regular expressions on the content that are defined in the policy. If the expressions match, that is, come back true, a threat is to be expected.
SAP API Management allows you to use Security Assertion Markup Language (SAML). The handling of SAML and SAML assertions from within your API proxy is supported by two policies:
You may know that the verify API key policy allows you to require an API key for the usage of your API. In SAP API Management, the API key is generated in the developer portal as soon as a developer subscribes to an associated product. In the verify API key policy, you can define where this API key needs to be stored so that it’s considered (e.g., in the header information or a variable).
This is another policy that allows you to reduce the threat through content-level attacks. XML threat protection allows you to minimize any risks posed by XML content by using the following approach:
There are many security considerations when utilizing APIs. With SAP API Management, there are seven security policies provided for you to take advantage of. Which ones do you use in your business?
Editor’s note: This post has been adapted from a section of the book SAP API Management by Carsten Bönnen, Harsh Jegadeesan, Divya Mary, and Shilpa Vij