...
European Identity & Cloud Conference 2013
14.05. – 17.05.2013, Munich/Germany

Moderator:

The emerging API Economy is presenting significant challenges to all industry participants. These participants include all constituents such as technology providers, integrators, customers, governments, educational institutions, developers and so on. There is not a constituency that will not be impacted in some way because of The API Economy.

KuppingerCole has an inclusive set of sessions, workshops and vendor participants that are designed to help organization better understand details of the API Economy and its potential short term and long term impact.

This section covers the status of the industry relative to The API Economy and the challenges that are facing customers now and in the future.

The API Economy�Understanding the API Ecosystem

16.05.2013 10:30-11:30

The API Economy�Understanding the API Ecosystem

In theis session, the API Ecosystem is explained, different vendors and customers providing for the ecosystem and using the ecosystem participate in explaining their views.

Identity Minting Architecture for the API Economy

What does it take to make an API economy real? Well the first thing you need is to set up a mint. Using OAuth and OpenID Connect together, the API economy can serve both web and mobile masters, providing the right level of identity validation for varied API uses, with a minimal level of training and understanding needed for either API resource server operators or client developers. Pamela Dingle will run through a working system, talking not just about the standards but about the rest of the work necessary to stand up a token architecture that can enable developers, resource owners, web application owners and IT to interact securely and smoothly

API Security

16.05.2013 11:30-12:30

Using and Abusing APIs: an Examination of the API Attack Surface

The good news is that we now have powerful standards and frameworks that promise to protect valuable resources and identities in the API space. But, what implementation details need to be considered and what damage can be done if we aren’t careful? In this session we will consider known attack vectors, speculate on future risks and investigate the challenges that security architects face in our API driven world.

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.