RSS

Tag: request-tampering

  • Designing Activity-Based, Data-Aware Authorization (ADA)

    By Varun Om | October 1, 2020

    In this guide you’ll learn about activity-based, data-aware authorization (ADA) – what is it, its advantages, the process to follow for activity and data authorization checks, challenges and recommended solutions for ADA designed for the real-world …

    Read more

  • Implementing HMAC Scheme To Protect API Requests

    By Varun Om | February 8, 2020

    In this guide you’ll learn about an important authentication scheme called HMAC - what is it, its advantages, things to consider while implementing a strong HMAC and a unique form of HMAC (invented by ASPSecurityKit team) to protect service callbacks …

    Read more