# API security
APIs are critical interfaces to your business systems, managing data flow and enabling essential functionalities. Securing APIs is crucial to prevent unauthorized access and potential data breaches that compromise sensitive information.
Workato's API management capabilities provide robust tools to secure your API ecosystem:
# API clients and access profiles
Workato enables you to create API clients, which are logical groupings of users, such as members from the same organization. These clients gain access to API collections through access profiles. Access profiles enable you to control who can interact with your APIs and which API collections clients can access. You can create access profiles with various authentication method requirements, and specify more granular controls like allowed IP addresses and policy restrictions.
# Authentication methods
Workato supports several authentication methods to safeguard your API interactions:
- Auth tokens for straightforward, token-based authentication.
- OAuth 2.0 for a robust authorization framework that allows granular permissions.
- JSON Web Tokens (JWT) for stateless, secure information exchange.
- OpenID Connect for identity verification based on the OAuth 2.0 protocol.
- OAuth 2.0 (Token Introspection) to validate external tokens issued by Identity Providers.
You can configure each authentication method within an access profile. This ensures that API clients are authenticated and authorized according to your security policies.
Using Workato's API management tools, you can ensure your APIs are secure and compliant with industry standards.
# Enforce mutual TLS (mTLS)
Workato adds an extra layer of protection with mutual TLS (mTLS). mTLS requires clients to present a valid certificate during the SSL handshake when enabled.
Workato validates both the access token and the client certificate. This ensures that only authenticated clients with trusted certificates can access your APIs.
Use mTLS to enforce certificate-based trust with your configured authentication method. Refer to the Mutual TLS authentication guide for more information.
Last updated: 5/8/2025, 3:37:17 PM