Index

A

access_token
Amazon Alexa
Apache Tomcat
API consumer
API Developers
API Key
API Management
API Proxy
Application programming interfaces (APIs)
Application server
Architecture
Artifacts
Attribute
Auditing
Authentication
Authorization
Authorization server (AS)
Automatization

B

Backend
Base64
Basic Authentication
Bluetooth
Business-to-business (B2B)
Business-to-consumer (B2C)

C

C
C#
CA API Gateway
CA certificate
Caching
Central processing unit (CPU)
Certificate signing request (CSR)
Certificates
Classes
Client
Code stubs
Common Object Request Broker Architecture (CORBA)
Compiler
Components
Configurability
Consent
Container
Content-Type
Continuous integration/continuous delivery (CI/CD)
Contract First
Cookies
CSRF

D

Database
Datasets
Demilitarized zone (DMZ)
Deployability
Design pattern
Desktop
Developer
Device
DevOps
Docker
Docker-compose
Docker image

E

Ecosystem
Encryption
Enterprise service bus (ESB)
Entity
Ephemeral (Docker/container)
Escalations
Extensible Markup Language (XML)
Extensible Stylesheet Language (XSL)

F

Federal Information Processing Standard (FIPS)
Federation
File transfer protocol (FTP)
Financial API (FAPI)
Firewall
Framework
Function

G

Geo-Location
GET
Git
GitHub
Google Home
Google Maps

H

HTTP
HTTP header
HTTP status

I

IBM Datapower
Identity Provider (IDP)
If this, then that (IFTTT)
Impersonation
Implementation
Implicit (OAuth)
Instance (container)
Integration
Internet content adaptation protocol (ICAP)
Internet Identity Workshop (IIW)
IP Address

J, K

Java
JavaScript
JBoss
JSON
JSON Web Encryption (JWE)
JSON Web Key Set (JWKS)
JSON Web Signature (JWS)
JSON Web Token (JWT)

L

Latency
Let’s Encrypt
Lightweight Directory Access Protocol (LDAP)
Load balancer
Logging

M

Machine-readable documentation
Mainframe
Martin Fowler
Message confidentiality
Message integrity
Microservice
Microservices architecture
Microsoft Azure for Docker
Microsoft OpenID Connect
Minimum viable product (MVP)
Mobile apps
Mobile first
Mock service
Monetization

N

National Institute of Standards and Technology (NIST)
Near-Field Communication (NFC)
Netgear Arlo
Network traffic
Notifications

O

OAuth
OAuth 2.0
Omnipresence
One-time password (OTP)
Online services
On-Prem
OpenID Connect
OpenID Foundation
OpenID Provider (OP)

P

Parameters
Password
Payload
Payment Card Industry (PCI)
Payment Service Directive 2 (PSD2)
Performance
Persist
Philips Hue
PHP
Pipe
Pipeline (CI/CD)
Platform
Poll
Port
POST
Product Owners
Programming languages
Proprietary
Protocol
Provider
Pseudo Code

Q

QR Code
Quality assurance (QA)

R

Rate limit
Red Hat OpenShift
Redundancy
Reliability
Relying Party (RP)
Remote cache
Replay
Request
Request For Comments (RFC)
RequestIDs
Requirements
Resource server (RS)
Resource owner (RO)
Resources (memory)
Response
RESTFul
Roadmap
Roles
Runbooks

S

Scalability
SCOPE (OAuth)
Script
Security architects
Security Assertion Markup Language (SAML)
Server
Service-level agreement (SLA)
Signatures
Simple object access protocol (SOAP)
SOAPUI
Social-Login
Social-Platform
Software Architects
Software development kit (SDK)
Statelessness
Step-up authentication
Swagger
System

T

Tenant
Testing tool
Threat protection
Transaction
Transmission control protocol (TCP)
Transparence
Transport Layer Security (TLS)
Twitter

U

Upgradability
URL encoded
URL fragment
URL Path
User interface (UI)
Username

V

Version-ability
Version control system (VCS)

W

Web Application Description Language (WADL)
Web application firewall (WAF)
Web applications
Web Server
Web services description language (WSDL)
WeChat
WhatsApp
Windows

X

x.509
XML
SeeExtensible Markup Language (XML)
XML namespace
XML schema
Xpath
XSL
SeeExtensible Stylesheet Language (XSL)

Y, Z

YAML Ain’t Markup Language (YAML)
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
35.170.81.33