Are there strategies for discovering REST services using HATEOAS?
When building a REST service with the HATEOAS constraint, it’s very easy to advertise the existence of resources through linking. You make a GET
to the root of my site and I respond with the root document listing all the first-tier resources:
REST API concepts
I have three questions about REST API design that I’m hoping someone can shed some light on. I’ve searched relentlessly for many hours but haven’t found answers to my questions anywhere (maybe I just don’t know what to search for?).
REST API concepts
I have three questions about REST API design that I’m hoping someone can shed some light on. I’ve searched relentlessly for many hours but haven’t found answers to my questions anywhere (maybe I just don’t know what to search for?).
REST API concepts
I have three questions about REST API design that I’m hoping someone can shed some light on. I’ve searched relentlessly for many hours but haven’t found answers to my questions anywhere (maybe I just don’t know what to search for?).
Where to Perform Authentication in REST API Server?
I am working on a set of REST APIs that needs to be secured so that only authenticated calls will be performed. There will be multiple web apps to service these APIs. Is there a best-practice approach as to where the authentication should occur?
Where to Perform Authentication in REST API Server?
I am working on a set of REST APIs that needs to be secured so that only authenticated calls will be performed. There will be multiple web apps to service these APIs. Is there a best-practice approach as to where the authentication should occur?
Where to Perform Authentication in REST API Server?
I am working on a set of REST APIs that needs to be secured so that only authenticated calls will be performed. There will be multiple web apps to service these APIs. Is there a best-practice approach as to where the authentication should occur?
Where to Perform Authentication in REST API Server?
I am working on a set of REST APIs that needs to be secured so that only authenticated calls will be performed. There will be multiple web apps to service these APIs. Is there a best-practice approach as to where the authentication should occur?
Rest API Architecture from Rest in Practice book
We maintain an API that as part of its purpose makes a call to an external API. This external API takes a few seconds to fulfil the request we make to it. With our current architecture the request is made synchronously, meaning that the http response we return to the user request is blocked until our service get the response from the external API.
Rest API Architecture from Rest in Practice book
We maintain an API that as part of its purpose makes a call to an external API. This external API takes a few seconds to fulfil the request we make to it. With our current architecture the request is made synchronously, meaning that the http response we return to the user request is blocked until our service get the response from the external API.