Provides secure managed governance to API consumption
Based on Apigee Edge
Deployment model
On-Demand - Managed on SAP Cloud Platform
On-Premise - By Apigee, installed and managed by customers
Hybrid - Provides a cloud interface to manage an On-Premise deployment and SCP in a single unified environment
cloud-connector-as-a-bridge-connecting-sap-api-management-and-on-premise-system/
OpenAPI (Swagger) - Application Programming Interfaces
Widely adopted markup language for describing APIs specifications
Provides documentation for API Consumer
Helps API Developer in Implementation as a guideline
Acts as Contract between API Provider and Consumer - so that
Both the parties could work in parallel even if API is not yet implemented.
API Development Life Cycle
Design(modelling) - How API will look like
Implement - Build(coding) and testing
Publish API - Release (Security and Connectivity)
API Portal
Discover > Develop > Monetize > Analyze > Test
expose API - Create API proxy and product
API Provider System - Connection to back-end(Optional)
API Proxy - Additional layer to model flow and security policies
Policy Designer
Policy Template - Reuse the policy template available on API Business Hub
API Product
Group/bundle of API Proxies
Exposed for discovery and consumption in Developer portal
Application built on published products allow developer to subscribe and get an API Key
API Test Console - Pass Credentials to back-end system
Developer Portal
Manage User > Consume > Monetize > Analyze > Test
Used by developer to consume API Proxy
Policy Editor/Designer
Flows
Proxy end point - PreFlow and PostFlow
Target end point - PreFlow and PostFlow
Predefined Policies
Security Policies - protects APIs from security threats
Traffic Management Policies
Mediation Policies
Custom Policies
Java/ Python Script
Statistics Collector
Message Validation
Message Logging
Policy Template
Allows reuse of standard policies and best practices
Available as part of API package on SAP API Business Hub
Security Policies
OAuth v2.0 SET
XML Threat Protection
Basic Authentication
Verify API Key
JSON Threat Protection
SAML Assertion Validation
SAML Assertion Generation
OAuth v2.0
OAuth v2.0 GET
Regular Expression Protection
Traffic Management Policies
Invalidate Cache
Lookup Cache
Response Cache
Reset Quota
Spike Arrest
Concurrent Rate Limit
Access Control
Populate Cache
Quota
Mediation Policies
XSL Transform
Access Entity
Key Value Map Operations
JSON to XML
Raise Fault
Extract Variables
Assign Message
XML to JSON