Introduction
As part of consulting engagements, it is common that customers ask for guidance on the different authentication and authorisation approaches available on API Management and how these approaches meet their security needs while offering support to existing legacy API clients. While many people now know...