Links

Policies

This section provides a reference for the following API management policies.

Policies management

Policies are a powerful capability of the system that allow the publisher to change API behavior through configuration. Policies are the collection of statements that are executed sequentially on the API request or response. Popular statements include format conversion from XML to JSON and call rate limiting to restrict the amount of incoming calls from a developer. Many more policies are available out of the box.

Why do we need policies?

API policies are solid proficiencies within an API system that allows the issuer to adjust API performance through configuration. Policies apply restrictions that secure API and maintain their structure, ensuring control over API effectiveness and delivery. Keeping API well-structured prevents overexposing API that results in stucking in little things.

How to use policies?

The configuration is divided into inbound, outbound, and on-error. The series of specified policy statements are executed in a request-response order.
<policies>
<inbound>
<!-- statements to be applied to the request go here -->
</inbound>
<outbound>
<!-- statements to be applied to the response go here -->
</outbound>
<on-error>
<!-- statements to be applied if there is an error condition go here -->
</on-error>
</policies>
If there is an error during processing of a request, any remaining steps in the inbound, or outbound sections are skipped and execution jumps to the statements in the on-error section.

Example

<policies>
<inbound>
<check-header name="Authorization" failed-check-httpcode="401" failed-check-error-message="Not authorized" ignore-case="false">
<value>f6dc69a089844cf6b2019bae6d36fac8</value>
</check-header>
</inbound>
<on-error>
<sentry-log />
</on-error>
</policies>

Policies available

Access restriction policies

  • Check HTTP header – enforces the existence or value of an HTTP header.
  • Restrict caller IPs – filters (allows/denies) calls from specific IP addresses and/or address ranges.
  • Restrict caller hosts – filters (allows/denies) calls from specific IP addresses and/or address ranges.

Advanced policies

  • Control flow – conditionally applies policy statements based on the results of the evaluation of Boolean expressions.
  • Mock response – aborts pipeline execution and returns a mocked response directly to the caller.
  • Return response – aborts pipeline execution and returns the specified response directly to the caller.
  • Send request – sends a request to the specified URL.
  • Set request method – allows you to change the HTTP method for a request.
  • Set status code – changes the HTTP status code to the specified value.
  • Set variable – persists a value in a named context variable for later access.
  • Sentry error tracking – prevent crashes across your entire stack.
  • Cloudwatch logs – sends logs to Amazon Cloudwatch.

Authentication policies

Cross domain policies

  • CORS – adds cross-origin resource sharing (CORS) support to an operation or an API to allow cross-domain calls from browser-based clients.

Transformation policies

  • Convert JSON to XML – converts request or response body from JSON to XML.
  • Convert XML to JSON – converts request or response body from XML to JSON.
  • Find and replace string in body – finds a request or response substring and replaces it with a different substring.
  • Set body – sets the message body for incoming and outgoing requests.
  • Set HTTP header – assigns a value to an existing response/request header or adds a new response/request header.
  • Set query string parameter – adds, replaces value of, or deletes request query string parameter.
  • Rewrite URL – converts a request URL from its public form to the form expected by the web service.