Quiz

Question 1

Which is the standard flow to use in a gateway to know what's inside an opaque token

chevron-rightSolutionhashtag

Introspection

Question 2

The phantom token flow defines a pattern to:

chevron-rightSolutionhashtag

Hide sensitive data on the Internet but expose it internally

Question 3

There are three methods to use tokens for API to API calls

chevron-rightSolutionhashtag

Exchange, embed, share

Question 4

What is good practice for the gateway when it comes to authorization

chevron-rightSolutionhashtag

To validate the token and inspect the scopes to perform a coarse grained authorization decision

Last updated