This section describes the general features of the policies. For detailed information on any policy and how to configure it, please refer to the relevant policy's own page.

Entities used to define a set of rules, restrictions and transformations for the purposes of security, performance improvement and ease of use for messages coming to or returning from the API are generally referred to as policies.

The policy allows API behavior to be 'programmed' without the need for code development. It is designed to easily and reliably meet common management requirements for APIs.

It offers features such as security, rate limiting, conversion and brokerage capabilities and relieves you of the burden of writing code and maintaining these functions. Each policy works like a separate module that implements a specific function and whose behavior can be customized by configuration.

Policy Types

The policies offered on the Apinizer Platform can be roughly grouped functionally as follows:


Security and Authentication Policies


Plain-Text Authentication

Perform simple authentication with username and password.

View details

Basic (Base64) Authentication

Authenticate with Base64 encoded username and password.

View details

Digest Authentication

Authenticate with SHA1 hash encrypted password, nonce and timestamp.

View details

JWT Authentication

Perform stateless authentication with JSON Web Token, manage token generation and validation processes.

View details

OAuth2 Authentication

Perform token-based authorization with OAuth 2.0 protocol, provide secure and standard API access control.

View details


JOSE Validation

Validate JWT, JWS and JWE standards, perform signature and encryption verification.

View details

JOSE Implementation

Sign and encrypt your JSON data returned from Backend API with JOSE standards.

View details

mTLS Authentication

Perform secure authentication with mutual TLS certificate.

View details

Backend API Authentication

Automatically add credentials to Backend APIs.

View details

SAML Authentication

Perform enterprise authentication and SSO integration with SAML token.

View details


Encryption

Encrypt API messages to protect sensitive data and ensure secure transmission.

View details

Digital Signature

Guarantee data integrity and source with digital signature.

View details

Decryption

Provide secure access to original content by decrypting encrypted messages.

View details

Digital Signature Verification

Verify  your  data  integrity using digital signatures.

View details

WS-Security Encrypt

Secure SOAP messages by encrypting with WS-Security standard.

View details


WS-Security Decrypt

Decrypt encrypted SOAP messages with WS-Security protocol.

View details

WS-Security Sign Validation

Validate WS-Security signatures to ensure message authenticity and integrity.

View details

WS-Security (To Target)

Process and configure WS-Security headers in outgoing SOAP .

View details

WS-Security (From Target)

Process WS-Security headers in incoming SOAP messages.

View details

WS-Security Token

Retrieve and manage WS-Security token from Token Service.

View details

WS-Security Username

Add username token validation to SOAP messages.

View details

WS-Security Timestamp

Prevent replay attacks by adding timestamp to SOAP messages.

View details

Authorization

Control and manage resource access based on user roles.

View details


Access Control and Limiting Policies


Blocked IP Address List

Block requests from specific IP addresses.

View details

Allowed IP Address List

Allowrequests from specific IPs or ranges.

View details

Time Restriction

Control API access during specific days and time intervals.

View details

API Based Quota

Limit the number of requests sent to the API within specific periods (hour/day/month).

View details

API Based Throttling

Limit and control the rate of requests sent to the API within short time periods (second/minute).

View details

Data Manipulation Policies


JSON Message Transformation

Transform JSON data to different formats using Jolt.

View details

XML Message Transformation

Transform XML data to different formats using XSLT.

View details

Redaction

Hide sensitive data in response messages by masking or deleting.

View details

Threat Protection Policies


Content Filter

Filter messages with regex rules to detect harmful content.

View details

JSON Schema Validation

Validate JSON message schema compliance.

View details

XML Schema Validation

Validate XML message compliance with defined schema

View details

Max Message Size

Block excessively large message requests.

View details

Min Message Size

Block excessively small message requests.

View details

Other Policies


Script

Customize and process messages with JavaScript or Groovy.

View details

API Call

Call external services within API flow and process responses.

View details

Business Rule

Add, modify or delete messages based on conditions.

View details