Blogs tagged apigee
-
It has been a very long time since my last blog on SCN and even if I left SAP I’m still very close to the SAP ecosystem. Today I would like to share with you my experience in Application modernization with Google Cloud Platform and in this... Read More »3Comments5Likes -
Kyma project “Kyma” enables you to extend applications in a cloud-native fashion using side-by-side extensibility. Mostly those extensions can be implemented using lambdas in Kyma using Javascript as the programming... Read More »0Comments2Likes -
Dear API Management community, On September 8 Google has entered into a definitive agreement to acquire Apigee, a leader in API Management software. In mid-2014, SAP and Apigee entered into a partnership for SAP to include Apigee technology as... Read More »3Comments10Likes -
SAP API Management Introduction The following ten documents form an introduction to API Management Part 1 – Introduction to API Management Part 2 – Overview of SAP API Management Tools Part 3 – Preparing HCP Destinations for Use... Read More »1Comment10Likes -
Recap of Part 9 In Part 9 of this document series, we looked at how the “Verify API Key” policy can be assigned to the inbound PreFlow stage of the ProxyEndpoint segment. That’s all very technical language for saying that... Read More »8Comments19Likes -
Recap of Part 8 In Part 8 of this document series, we looked at the fact that the graphical editor known as the Policy Designer shows you only the API Policies that have been assigned to a single processing stage of the selected segment. Now that... Read More »1Comment10Likes -
Recap of Part 7 We finished Part 7 of this document series by looking at the different processing segments and stages into which API Management divides the request/response cycle. This is very important to understand because when we now look at... Read More »0Comments9Likes -
Recap of Part 6 In Part 6 of this document series, we were introduced to the idea of API Policies. An API Policy is a container for some specific unit of functionality such as a Quota Check, or a Spike Arrest (prevents a Denial of Service attack)... Read More »9Comments15Likes -
Recap The first 5 parts of this document series have focussed on the features and functions of API Management at a fairly high level. Now we will start to look into the details of building an API Proxy that contains some real life... Read More »1Comment8Likes -
Recap of Parts 3 & 4 In Part 4, we saw how a special security token known as the “API Key” or “Application Key” must often be sent as part of the request to invoke an API Proxy. We also saw how to identify whether... Read More »2Comments6Likes