Layer7 API Security

 View Only

What's New

  • Layer7 API Security August Office Hours

    Join us for Layer7 August Office Hours as Francois Lascelles, Gary Vermeulen, and Sravan Sandela showcase cutting-edge AI applications that can transform how you work. They’ll walk through real-world use cases, including:

    • Helm troubleshooting prompt engineering – using your favorite GenAI tool with the right expert context to accelerate deployment configuration and troubleshooting.
    • Gateway config migration via prompt using MCP – effortless entity migration between Layer7 API Gateways with Graphman MCP Server.

    Join our Youtube Channel to view previous office hours 

Search Community

Latest Discussions

  • Thanks @Joseph Fry

  • Perfect . Thanks. With your 2-step approach, I wasn't able to reproduce the issue anymore. Kind regards ...Michael



Latest Q&A List

  • MARUBUN SUPPORT's profile image

    APIGW: Concurrency count of Rate Limit assertion becomes ...

    Hello Team, Do you have any answer? Please let me know if I should create a case to ask those questions. Thanks, MARUBUN Hello ...

  • Sebastian van Voorn's profile image

    RE: How to use Kerberos Delegation Protocol Transition ...

    We have received that it should be solved in V11.1.2, so we tested it with this version. But now we encounter this same error: 2025-07-22T13:49:53.282+0200 ...

Recent Shared Files List

Unanswered Threads

  • The Time Bound Composite Assertion (or Run All Assertions within Bounded Time ) is a composite assertion that limits the execution time of its child assertions within the specified time. It allows users greater control of long running assertions ...

  • Hi Everyone I am trying to use OAuth PKCE on Layer 7 API Gateway 11 with OTK 4.6, but I have been faced with some issue to build the request with curl. I got the sessionId and sessionData with /auth/oauth/v2/authorize however, I was redirected ...

Latest Blog Posts

  • The Role of Encryption in Secure Communication One of the foundational principles of data security is encryption. Using Public Key Infrastructure (PKI), two parties can establish a trust relationship that ensures the confidentiality and integrity ...

  • PI Planning for PI41 is now complete and development has kicked off. Below you will find the list of items that are included in this PI and a summary of the releases completed in the previous PI. As always, we invite you to provide feedback. We would ...