Securing APIs used by remote devices
We have desktop software that we install and run on remote, unattended machines. The software needs to hit API endpoints on our server. What is the best way to secure those endpoints to ensure that only our software can call them? We may o… Continue reading Securing APIs used by remote devices