Tagged articles
8 articles
Page 1 of 1
Top Architect
Top Architect
Apr 17, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention

This article presents a comprehensive design for securing third‑party APIs by using Access Key/Secret Key pairs, timestamp and nonce validation, signature generation, token handling, HTTPS, rate limiting, logging, idempotency, versioning, standardized response formats and practical Java code examples to prevent tampering and replay attacks.

API SecurityAccess KeyAuthentication
0 likes · 32 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention
Architect's Guide
Architect's Guide
Mar 31, 2025 · Information Security

Design and Security Practices for Third‑Party API Authentication and Signing

This article presents a comprehensive design scheme for third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, secure API endpoint design, anti‑replay mechanisms, token handling, TLS encryption, database schema, and implementation examples in Java.

API SecurityAccess KeyAuthentication
0 likes · 30 min read
Design and Security Practices for Third‑Party API Authentication and Signing
Architect
Architect
Dec 3, 2024 · Information Security

How to Secure Third‑Party APIs with AK/SK, Signatures, and Token Strategies

This guide presents a comprehensive design for securing third‑party API calls, covering Access Key/Secret Key generation, permission granularity, timestamp and nonce based replay protection, signature creation and verification, token handling, TLS encryption, rate limiting, logging, and practical Java code examples.

API SecurityAccess KeyJava
0 likes · 28 min read
How to Secure Third‑Party APIs with AK/SK, Signatures, and Token Strategies
Architect
Architect
May 25, 2024 · Information Security

Design and Implementation of Secure Third‑Party API Authentication Using Access Key/Secret Key, Signatures, and Tokens

This article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, implementing request signing with timestamps and nonces, managing token‑based authentication, defining permission granularity, and providing concrete Java and SQL code examples along with best‑practice recommendations for HTTPS, rate limiting, logging, and idempotency.

Access KeyToken
0 likes · 31 min read
Design and Implementation of Secure Third‑Party API Authentication Using Access Key/Secret Key, Signatures, and Tokens
Top Architect
Top Architect
May 6, 2024 · Information Security

Designing Secure Third‑Party API Interfaces: Authentication, Signature, Token and Permission Management

This article presents a comprehensive design for secure third‑party API interfaces, covering API key generation (Access Key/Secret Key), request signing with timestamps and nonces, token handling, permission granularity, anti‑replay measures, HTTPS encryption, and practical RESTful endpoint examples with code snippets.

Access KeyBackendsignature
0 likes · 30 min read
Designing Secure Third‑Party API Interfaces: Authentication, Signature, Token and Permission Management
Architecture Digest
Architecture Digest
Apr 24, 2024 · Information Security

Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce

The article presents a comprehensive guide to designing secure third‑party APIs, covering access‑key/secret‑key generation, token management, signature algorithms, timestamp and nonce anti‑replay mechanisms, permission granularity, request logging, rate limiting, and example Java and SQL implementations.

Access KeySecret KeyToken
0 likes · 28 min read
Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce