Application Security, Technology

(In)Secure Authentication schemes in REST APIs

To make authenticated REST API calls in applications, several authentication schemes are used by developers. Some of them use HTTP Basic Authentication scheme, and others, as per their needs(or wants), use custom authentication schemes. Now, it's good to experiment but not at the cost of security. In this blog, we will look into the...

by Nikhit Kumar
Tag: vulnerable APIs
29-Feb-2016