Intercept calls to authenticated 3rd-party APIs, to automatically add auth keys?

Is this a good approach to preventing the leakage of secrets?
Say I had a simple setup where Alice holds the secret to access Bob, and Charlie has basic shell access to Alice (with a different auth method). Charlie echoing "$BOB_SECRE… Continue reading Intercept calls to authenticated 3rd-party APIs, to automatically add auth keys?

Should resource servers behind an API gateway independently verify authentication claims?

Is it considered OK to "authenticate" via unverifiable plain-string headers simply asserting a principal name (User-ID: 12345), as long as this is behind an API gateway that does verify authentication?
In addition to their basic … Continue reading Should resource servers behind an API gateway independently verify authentication claims?