In this section, we explain how to establish connectivity and provide details
on the API design patterns and security model.
API communication details
Communication with the Redirect FOP API involves transport layer and
application layer security. The transport layer
uses TLS to secure HTTP requests (HTTPS) and the
application layer uses
either PGP or
JWE encryption.
In addition, our Protocol standards to find details on
our API design patterns and strategy for maintaining a robust connection with
partners.
Key exchanges
Encryption keys need to be rotated before they expire or if they are
compromised. As part of your implementation, you need to have a process for
managing these exchanges.
To ensure key rotations do not cause temporary outages or require significant
management overhead, Redirect FOP partners must support the use
of multiple encryption keys at once. During a key rotation, a second key will
be trusted and verified to be working correctly before the old key is removed.
All rights reserved. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2024-12-03 UTC.
[null,null,["Last updated 2024-12-03 UTC."],[[["This section outlines how to establish and secure connectivity with the Redirect FOP API, including details on transport and application layer security using TLS and either PGP or JWE encryption."],["It also covers API design patterns, maintaining robust connections, and the requirement for partners to support multiple encryption keys for seamless key rotation."],["Failure to support multiple keys will be considered a launch blocking bug."]]],["The Redirect FOP API uses TLS for transport layer security (HTTPS) and either PGP or JWE for application layer encryption. Partners must adhere to protocol standards for API design patterns. Encryption keys require rotation before expiration or compromise, with partners mandated to support multiple encryption keys simultaneously. This ensures continuous operation during key rotation, and failure to comply will block launch. A process for managing key exchanges is necessary.\n"]]