Defining an API using API JSON configuration file in sideband mode
To secure your API environment using sideband ASE deployment, APIs need to be configured in ASE using an API JSON file. Each API has a unique API JSON file. ASE ships with sample JSON files located in the /config/api
directory. You can manually configure the JSON file with the required parameters as shown in the next section.
The API JSON file parameters define the behavior and properties of your API. The sample API JSON files shipped with ASE can be changed to your environment settings and are populated with default values.
The following table describes the JSON file parameters:
Parameter | Description | ||
---|---|---|---|
|
API request type with supported values of:
|
||
|
The value of the URL for the managed API. You can configure up to 10 levels of sub-paths when ASE is deployed in sideband mode. For example,
|
||
|
Hostname for the API. The value cannot be empty.
|
||
Configure the client identifiers (for example, cookie, API key, OAuth2 token) used by the API |
|||
|
Name of cookie used by the backend servers. |
||
|
N/A |
||
|
When When Default value is For more information, see Capture client identifiers - Sideband. |
||
|
When set to
The default value is |
||
|
When API key is sent in the query string, ASE uses the specified parameter name to capture the API key value. For more information, see Configuring API keys. |
||
|
When API key is part of the header field, ASE uses the specified parameter name to capture the API key value. For more information, see Capture client identifiers - Sideband. |
||
|
Public URL used by a client to connect to the application. |
||
|
When Default value is |
||
|
N/A |
||
API pattern enforcement
|
N/A |
||
Flow control
|
N/A |
||
|
Maximum ASE memory allocation for an API. The default value is 128 MB. The data unit can be MB or GB. |
||
Health_check
|
N/A |
||
|
N/A |
||
Servers:
|
The IP address or hostname and port number of each backend server running the API. |
||
|
N/A |
||
Decoy Config
|
When
See Configuring API deception for details. |
||
|
The name of the custom header containing username. When the value of
|
||
JWT
|
When the parameter values of
For more information, see Extract user information from JWT in sideband mode.
|
Here is a sample JSON file for a REST API:
{
"api_metadata": {
"protocol": "http",
"url": "/rest",
"hostname": "*",
"cookie": "",
"cookie_idle_timeout": "200m",
"logout_api_enabled": false,
"cookie_persistence_enabled": false,
"oauth2_access_token": false,
"is_token_mandatory": false,
"apikey_qs": "",
"apikey_header": "",
"login_url": "",
"enable_blocking": true,
"api_mapping": {
"internal_url": ""
},
"api_pattern_enforcement": {
"protocol_allowed": "",
"http_redirect": {
"response_code": "",
"response_def": "",
"https_url": ""
},
"methods_allowed": [],
"content_type_allowed": "",
"error_code": "401",
"error_def": "Unauthorized",
"error_message_body": "401 Unauthorized"
},
"flow_control": {
"client_spike_threshold": "0/second",
"server_connection_queueing": false
},
"api_memory_size": "128mb",
"health_check": false,
"health_check_interval": 60,
"health_retry_count": 4,
"health_url": "/health",
"health_check_headers": {},
"server_ssl": false,
"servers": [
{
"host": "127.0.0.1",
"port": 8080,
"server_spike_threshold": "0/second",
"server_connection_quota": 0
},
{
"host": "127.0.0.1",
"port": 8081,
"server_spike_threshold": "0/second",
"server_connection_quota": 0
}
],
"decoy_config": {
"decoy_enabled": false,
"response_code": 200,
"response_def": "",
"response_message": "",
"decoy_subpaths": []
},
"username_header": "x-username-header",
"jwt": {
"location": "h:authorization:bearer",
"username": "username",
"clientid": "client_id"
}
}
}
The sample JSON file has an extension of |
Manually add API JSON to ASE
After configuring an API JSON file, add it to ASE to activate ASE processing. To add an API, execute the following CLI command:
/opt/pingidentity/ase/bin/cli.sh –u admin -p admin add_api {file_path/api_name}
After configuring API JSON files for each API, ASE configuration is complete.
Update a configured API JSON
After activation, an API JSON definition can be updated in real time. Edit the API JSON file located in the /config/api
directory and make the desired changes. Save the edited API JSON file and execute the following CLI command:
/opt/pingidentity/ase/bin/cli.sh –u admin -p admin update_api <api_name>
For example:
/opt/pingidentity/ase/bin/cli.sh –u admin -p admin update_api shop api shop updated successfully