Includes information about the following policies:
If you don't have additional policies enabled in Policy Manager, the policies below are available in the Akana API Platform in the Add/Edit API wizard.
Policy Name | Type/Link |
---|---|
AtmosphereApplicationSecurityPolicy (In Policy Manager, API Consumer Application Security Policy) | Security policy for apps on the platform. Used to identify (authenticate) an app that is attempting to access an API, to make sure the app is authorized. This policy type supports multiple mechanisms for the app to present its identity, including plain text App ID, signed header with x.509 certificate, or shared secret. Most or all APIs on the platform have this policy assigned. For more information, see Using the API Consumer Application Security Policy. |
BasicAuditing | Provides basic auditing of messages. Message metrics are recorded in the Policy Manager Usage Logs Monitoring tab. The request and response messages are not logged. If auditing of individual messages is needed, use the DetailedAuditing policy. Category: Auditing |
DetailedAuditing | Provides detailed auditing of messages. Message metrics are recorded in the Policy Manager Usage Logs Monitoring tab as well as the entirety of each message, including request and response. Category: Auditing |
OAuthSecurity | An Akana API Platform policy that enables API authorization using OAuth 2.0. It uses the OAuth configuration assigned to an API when enforcing OAuth tokens in a received request. For more information, see Using the OAuth Security Policy. There is an additional sub-policy to the OAuth Security policy, TokenTransformation, which you can use to ensure that the OAuth bearer token is relayed to the downstream service, rather than being stripped off from the request message after validation by the API Gateway. You can use this for scenarios where the target endpoint needs access to the original OAuth token that the API Gateway validated. The transform attribute of this policy determines whether to strip the headers or pass them through to the next hop. The possible values of this attribute are strip and pass-through. An example of the policy configuration with the nested sub-policy tag is shown below. <wsp:Policy Name="OAuthSecurity" Description="OAuthSecurity policy uses OAuth configuration assigned to an API when enforcing OAuth tokens in the received request." xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy"> <goap:OAuthSecurity xmlns:goap="http://federatedgovernance.org/policy/oauth"> <wsp:Policy> <goap:TokenTransformation transform="strip"/> </wsp:Policy> </goap:OAuthSecurity> </wsp:Policy> |
Policy Name | Description |
---|---|
CORSAllowAll | CORS (cross-origin resource sharing) enables users to access resources from within the browser serving a web page, and defines a way in which the browser and the server can interact to determine whether or not to allow the cross-origin request. The CORSAllowAll policy allows all cross-origin requests. |
Cross-Site Scripting Detection policy | The Cross Site Scripting Detection Policy is an Operational policy that allows you to block potentially malicious HTML tags in the request message body using what is called a white list of tags. For more information, see Using the Cross-Site Scripting Detection Policy. |
HTTP Malicious Patterns Detection policy | Used to inspect the HTTP messages for content that could be considered dangerous to an API or web service, and to reject the message returning a fault if any of the defined expressions match the content. For more information, see Using the HTTP Malicious Patterns Detection Policy. |
Metrics policy | The Metrics Policy is an Operational policy that allows you to collect roll-up data for selected services/operations that the policy is attached to. For more information, see Using the Metrics Policy. |
Paging policy | The Paging Policy is designed to allow a client to only get a subset of a list based response. For example, if an operation is returning a list of books, and the full list is 1000 books, the client may wish to only have 100 books be returned at a time. For more information, see Using the Paging Policy. |
Schema Validation policy | Performs schema validation. A common integration problem in a service-oriented architecture occurs when consumers send messages to services that don’t conform to the services' message schemas. Typically this is caused by the versioning of a service’s schema, and a consumer sending a message that conforms to a prior schema version. It can also be a consumer’s malicious attempt to cause a denial of service by sending invalid messages to a service. An SOA Container can aid by validating the messages exchanged between the consumers and services against the service’s published schema. For more information, see Using the Schema Validation Policy. |
WS-Schema Validation policy | Schema validation policy for WS-Schema. For more information, see Using the WS-Schema Validation Policy. |
API User Security Policy | The default security policy for Akana API Platform services and controls who can perform administrative actions on the developer portal. Category: Security For more information, see Using the API User Security Policy. |
OAuth 1.0a Trusted Token Policy | An Akana API Platform security policy that provides OAuth Pass-thru support when OAuth 1.0a is used to perform API authorization. Category: Security For more information, see Using the OAuth 1.0a Security Policy. |
OAuthSecurity | An Akana API Platform policy that enables API authorization using OAuth 2.0. It uses the OAuth configuration assigned to an API when enforcing OAuth tokens in a received request. Category: Security For more information, see Using the OAuth Security Policy. |
WS-Auditing Message Policy | Used to audit service operations and binding operations. Category: Auditing |
WS-Auditing SOAP Message Policy | Used to audit service operations and binding operations. Category: Auditing |
WS-Auditing SOAP Service Policy | Used to audit SOAP binding operations. Category: Auditing |
WS-Auditing Service Policy | Used to audit Services, Bindings, Operations, and Access Points. Category: Auditing |
WS-Auditing Transaction Tracking Policy | Supports Transaction Tracking functionality that correlates related web service events within a single activity or transaction. For example, if a service in a Container uses the Akana Delegate to call another service in a different container that is managed by the Akana Agent, it will automatically insert correlation information into the message that is collected and used by Policy Manager to collect tracking and log information. Category: Auditing |
Defines conditions for measuring and reporting performance of a specific contract. Each policy is composed of a "Rule" and "Access Interval." Rules represent the conditions you define to measure and report performance of a service contract. When a defined system condition matches a defined rule, an alert is raised.
Policy Name | Description |
---|---|
Bandwidth Quota Policy | Allows you to configure the bandwidth cap (i.e, quota) that a consumer can upload or download at any given time. The bandwidth cap can be specified as kilobytes or megabytes per second. If the quota is exceeded, the runtime will throttle the traffic to conform to the quota policy. The quota is also assigned to either the request (upload) or response (download). No alerts are generated for this policy since the bandwidth consumed is a function of the network speed and capabilities of the service provider, not the consumer. Category: QoS (Quality of Service Policy) |
Script Policy | Allows you to update a policy defined using BeanShell or Jython script languages. A series of predefined functions and variables are provided that allow you to build a custom policy expression that is evaluated at runtime. Several sample scripts are also provided that illustrate common quota management activities. Category: QoS (Quality of Service Policy) |
Service Level Enforcement | The Service Level Enforcement Policy is a Quality of Service (QoS) policy that allows you to enable and configure the error message returned to the consumer when their SLA is violated. This policy works in conjunction with a Service-Level Policy and only applies to the following Service-Level rules: "Usage Count," "Total Request Message Size," and "Total Response Message Size." You define a Service-Level Policy and specify each service level condition and alert code, then you define a Service Level Enforcement Policy and specify the error message you would like displayed when a specified service level condition is violated. Category: QoS (Quality of Service Policy) |
Throughput Quota Policy | Allows you to monitor web service throughput performance by specifying a throughput limit (i.e., quota), queue size, and configuring fault and alert notifications. If the quota is exceeded, a consumer fault message will be returned to the service consumer and an alert will be logged. Category: QoS (Quality of Service Policy) |
Timeout Policy | Allows you to configure the timeout for each request and specify a custom fault error message that is returned to the client. Category: QoS (Quality of Service Policy) |
Concurrency Quota Policy | Allows you to monitor the web service concurrency performance by specifying a concurrency limit (i.e., quota) that represents the maximum number of concurrency connections, and configuring fault and alert notifications. If the specified concurrency limit is exceeded, Policy Manager will return a fault and send an alert. Category: QoS (Quality of Service Policy) |