Securing an API by using OAuth 2.0 Created byJuliette Chalant Devlesaver|Updated27 July 2024In this tutorial by IBM, you will learn how to use OAuth 2.0 to secure an API to ensure that so that an application can access the API on a user's behalf using IBM’s API Connect Version 5.0.7.About the tutorialAfter creating the Branches API in the previous tutorial, you will learn to modify the security settings to allow a calling application to use the OAuth 2.0 to access the API on a user’s behalf without their password. This tutorial is divided in the following lessons: Choosing your OAuth Scheme (and establishing whether your implementation will be confidential or public) Creating an OAuth 2.0 provider APIConfiguring the API Security SchemeAcquiring an access token for your chosen schemeUsing the access tokenAfter completing the tutorial, you will be able to implement and test any of the following six OAuth schemes: implicit flowapplication flowconfidential password flowpublic password flowconfidential access code flow, and public access code flowRequirementsIn order to follow this tutorial, it is necessary to complete the previous tutorials in sequence. Learning contentWebsite linkSecuring an API by using OAuth 2.0Target audienceDigital skills for ICT professionals and other digital experts.Digital skill levelAdvancedDigital ExpertGeographic scope - CountryAustriaBelgiumBulgariaCyprusRomaniaSloveniaCroatiaCzech republicDenmarkEstoniaFinlandFranceGermanyGreeceHungaryItalyIrelandMaltaLatviaLithuaniaLuxembourgNetherlandsPortugalPolandSwedenSpainSlovakiaAlbaniaBelarusBosnia and HerzegovinaCanadaIcelandIsraelJapanKosovoMontenegroMoroccoNorth MacedoniaNorwaySerbiaSwitzerlandSouth KoreaRussiaTunisiaTurkeyUkraineUnited KingdomUSAShow moreShow less Share this page Log in to comment