Configuring API protection
The API protection uses the OAuth 2.0 protocol. To configure the API protection, you must create a definition and a client.
You must then attach the API protection definition to a resource.
The API protection uses the OAuth 2.0 protocol. To configure the API protection, you must create a definition and a client.
You must then attach the API protection definition to a resource.