Cloud Computing Patterns, Mechanisms > Cloud Service and Storage Security Patterns > Secure Cloud Interfaces and APIs
Secure Cloud Interfaces and APIs (Cope, Erl)
How can APIs be secured against unauthorized access?
On-premise and cloud-based resource interfaces and APIs are, by default, vulnerable to attacks through a number of vectors and methods.
A cloud identity and access management (IAM) system is instituted to differentiate intruders from legitimate consumers.
An authentication gateway service (AGS) and an IAM system are implemented to identify and authenticate legitimate consumers and grant them access, while denying access to intruders.
Burst In, Burst Out to Private Cloud, Burst Out to Public Cloud, Cloud Authentication, Cloud Balancing, Elastic Environment, Infrastructure-as-a-Service (IaaS), Isolated Trust Boundary, Multitenant Environment, Platform-as-a-Service (PaaS), Private Cloud, Public Cloud, Resilient Environment, Resource Workload Management, Secure Burst Out to Private Cloud/Public Cloud, Software-as-a-Service (SaaS)
The AGS authenticates cloud consumers for access to APIs.