0% found this document useful (0 votes)
140 views22 pages

Understanding API Management (APIM)

Uploaded by

Ceo Tran Dang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views22 pages

Understanding API Management (APIM)

Uploaded by

Ceo Tran Dang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Reference Architecture Brief: API Management

28 February 2024 - ID G00802491 - 21 min read


By: Steve Deng
Initiatives:Software Architecture and Integration for Technical Professionals; Adopt
Modern Architectures and Technologies; Build and Deliver Software to Drive Business
Results

APIs and API management are fundamental to modern application


architecture and integration architecture. This research provides
application technical professionals with a reference architecture
for API management.

Architecture Brief
APIs and API management (APIM) have become critical to many modern application
architecture practices, such as microservices architecture (MSA), agile web applications,
cloud-native applications and application integration. A key platform capability for
managing APIs at runtime is the API gateway. API gateways secure north-south API traffic
at the network edge, enterprise edge, cloud edge and/or data center edge. They also
mediate east-west API traffic within the enterprise to support application-to-application or
service-to-service communication.

This reference architecture provides a structured framework for designing and


implementing API management across a variety of enterprise use cases. It focuses on the
most common and widely supported scenario: managing HTTP-based request-response
APIs. APIM practices and technical capabilities for other kinds of APIs (notably, event-
based APIs) are emerging. However, these scenarios require some different components
and capabilities that are not covered in this document.

Architecture Use Cases


API management architecture commonly supports the following use cases:

■ Offering external-facing APIs: In this scenario, organizations are exposing their


services and data to external developers via public APIs, private APIs or partner APIs.
Commercializing APIs that deliver access to valuable data or business capabilities
can open up new revenue and partnership channels.

Gartner, Inc. | G00802491 Page 1 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ Managing third-party APIs: In this scenario, organizations are consuming third-party
APIs (e.g., mapping APIs, payment APIs, SaaS application APIs or other business
partner APIs). They want to control and monitor their usage of those APIs, either to
track and limit costs or to safeguard sensitive data.

■ Supporting MSA: In this scenario, organizations are using MSA principles to build
applications, and they need to manage and secure service-to-service and app-to-
service communication.

■ Implementing API-based integration: In this scenario, organizations are using APIs


to integrate internal and external applications, services and data. These APIs need to
be secured, managed and monitored.

■ Productizing APIs: When APIs are shared outside their immediate application
domain, they must be treated as products, with technical and nontechnical
contracts. In this scenario, organizations are productizing APIs so that internal or
external consumers can confidently use them to build and extend applications.

■ Managing APIs in hybrid/multicloud environments: In this scenario, organizations


need to manage, secure and monitor APIs consistently across hybrid and multicloud
environments.

Architecture Diagram
As shown in Figure 1, API management architecture comprises six core logical
components in a dual-plane architecture. These components must be deployed and
integrated into your operational environment. The figure also shows the relationships and
interactions among these components, using colored arrows to denote:

■ Policy/configuration flow

■ API transaction flow

■ Telemetry flow

■ Platform API flow

■ App identity and access management (IAM) flow

■ User IAM flow

Gartner, Inc. | G00802491 Page 2 of 22

This research note is restricted to the personal use of hoanx@[Link].


Note that this is an abstract reference architecture. You will need to customize it to the
specific technologies and circumstances of your organization and your product
development teams.

Figure 1: Reference Architecture for API Management

Click to Download an Editable Version of This Figure

The reference architecture shows six types of connectivity:

■ Platform API flow: The integration between the API admin portal, API developer
portals or integrated development environments (IDEs), and other APIM components
via platform APIs provided by the control plane.

Gartner, Inc. | G00802491 Page 3 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ API transaction flow: The flow of messages (e.g., requests, responses, commands or
events) between API consumers and the exposed service implementations. This flow
is mediated by one or more API gateways and optionally filtered by web application
and API protection (WAAP) capabilities.

■ Policy/configuration flow: The flow of policy or configuration updates from the


control plane to the API gateway instances making up the APIM data plane.

■ Telemetry flow: The asynchronous flow of observability and API usage metrics from
the API gateways to the control plane and telemetry collectors.

■ App IAM flow: The flow of access control requests from the control plane and data
plane to the enterprise IAM to utilize authentication, authorization, public-key
infrastructure (PKI), directories and secrets management services. The identities
being authenticated here may include:

■ Application users (of the apps that employ the API)

■ Application/service accounts for apps that don’t delegate user identity checks

■ User IAM flow: The flow of authentication/authorization (AuthN/AuthZ) requests


from the API admin portal, command line interface (CLI) and API developer portals to
the enterprise IAM to authorize provider- and consumer-user access to the platform.
Single sign-on (SSO) is also supported using this flow. Note that different identity
providers and tools may be used for the consumer identities versus the
provider/admin identities.

The core components of an APIM platform are (click links to jump to sections):

■ APIM data plane: Components (mainly API gateways) responsible for mediating
APIs implemented by the API providers and making them securely accessible by the
API consumers. The three primary types of API gateways in the APIM data plane are:

■ Enterprise API gateway: A component typically located on the network


perimeter to secure inbound and outbound API traffic

■ Lightweight API gateway: A component designed to be distributed and


deployed close to individual services

■ Ingress gateway: A component that functions as the network communications


gatekeeper for a container orchestration cluster or service mesh

Gartner, Inc. | G00802491 Page 4 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ APIM control plane: The software and services that manage API gateway
configurations, API proxy definitions and APIM policies, including security, traffic
management, rate limiting, monitoring and caching. The APIM control plane also
provides platform APIs to integrate with API developer portals, API admin operations
and data plane interfaces, among others.

■ API admin portal: The UI component (either a web portal or a CLI) for API
administrators to manage API gateways and global policies, and for API providers to
manage API proxy definitions and application-specific policies.

■ API developer portal: The UI component (typically a web portal) for API consumer
developers to discover, test-drive and request access to APIs published in the
catalog.

The following are external components that frequently integrate with APIM architecture.
These components are covered in other Gartner Reference Architecture Briefs and
research:

■ Web application and API protection: WAAP solutions support security-based


controls to help protect the back-end service environment from malicious attacks or
accidental misuse. These solutions encompass a broad set of protection capabilities
and features for web-facing applications and services, including:

■ Bot detection to discover unauthorized automation and attacks

■ Distributed denial of service (DDoS) protection to defend against brute-force


saturation of service capacity

■ Web application firewalls (WAFs) to protect against web-technology-based


attacks, such as malformed requests, script injection and cross-site request
forgery (CSRF)

Gartner, Inc. | G00802491 Page 5 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ Identity access management infrastructure: This is a collection of IAM tools that
are architected to enable identity-first security. It typically includes the following
components:

■ Access management

■ Identity federation

■ Token services

■ Application directory

■ PKI

■ Secrets manager

■ Thirty-party API observability and security audit: This is an optional group of API
observability components that collect and store usage metrics and operational
telemetry from the APIM control plane or API gateways. The telemetry collected can
support custom analytics/reporting (e.g., for digital experience monitoring and
monetization). With additional integration, the telemetry can also be leveraged by
some security tools for security audit purposes. Software observability components
typically include (see Reference Architecture Brief: Software Observability):

■ Telemetry collector

■ Telemetry data store

■ Telemetry analytics

■ Telemetry visualization

Architecture Capabilities and Components


The following subsections provide an overview of each component of the reference
architecture.

Enterprise API Gateway

Back to top

Gartner, Inc. | G00802491 Page 6 of 22

This research note is restricted to the personal use of hoanx@[Link].


An enterprise API gateway is typically located on the network perimeter to secure inbound
and outbound API traffic. It is best-suited for external-facing, productized and published
APIs with monetization potential. These gateways are often centrally managed by the
organization and may be part of a broader APIM solution that includes API life cycle
management and an API developer portal.

Enterprise API gateways commonly support:

■ Access management (authentication and authorization)

■ Traffic management (quotas and distributed rate limiting)

■ Request routing

■ Request and response payload validation

■ Payload filtering or transformation

■ Caching

■ Coarse-grained security policy enforcement

Example Technologies

■ Amazon API Gateway

■ Axway Amplify API Management — API Gateway

■ Google Cloud Apigee X and Apigee hybrid API gateway

■ [Link] API Management

■ IBM API Connect API gateway

■ Kong Gateway

■ Microsoft Azure API Management — gateway

■ MuleSoft Anypoint Mule Gateway

■ Software AG webMethods API Gateway

■ WSO2 API Gateway

Key Characteristics

Gartner, Inc. | G00802491 Page 7 of 22

This research note is restricted to the personal use of hoanx@[Link].


An enterprise API gateway implementation has the following general characteristics:

■ It must secure APIs at the edge of the enterprise, ensuring consistency in the
enterprise’s overall API security strategy. Typically, only coarse-grained policies are
enforced here.

■ It must publish APIs to consumers outside the enterprise as external, private or


partner APIs.

■ It must publish internally hosted APIs or third-party APIs to internal applications or


services.

■ It should manage access to APIs as products. These APIs are productized and
published in a developer portal or API marketplace.

■ It should support business value reporting and monetization, aiming to contribute


direct and indirect revenue to the business.

An enterprise API gateway implementation has the following technical characteristics:

■ It should be offered as SaaS and/or a customer self-managed deployment option.

■ It may require a multicomponent runtime footprint to operate, increasing the


operational overhead in customer self-managed environments.

■ It should integrate with WAAP and enterprise IAM infrastructure for all external-
facing north-south mediation.

Related Research

■ Decision Point for Mediating API and Microservices Communication

■ Comparing Architectures for Hybrid and Multicloud API Management

■ How to Evaluate API Management Solutions

■ How to Deliver Sustainable APIs

Lightweight API Gateway

Back to top

Gartner, Inc. | G00802491 Page 8 of 22

This research note is restricted to the personal use of hoanx@[Link].


A lightweight API gateway, aka microgateway, is designed to be distributed and deployed
close to individual services. Unlike enterprise API gateways, which are often centrally
managed as shared middleware, lightweight gateways can be individually deployed,
configured and managed by a development team to meet the needs of the application.

Lightweight API gateways commonly support:

■ Access management (authentication and authorization)

■ Traffic management (quotas and distributed rate limiting)

■ Request routing

■ Request and response payload validation

■ Payload filtering or transformation

■ Caching

■ Basic security checks

Example Technologies

■ Apache APISIX

■ Contour

■ Envoy Gateway

■ Kong Gateway

■ Microsoft Azure self-hosted API gateway

■ MuleSoft Anypoint Flex Gateway

■ [Link] Gloo Gateway

■ Spring Cloud Gateway

■ Tyk Gateway

■ WSO2 API Platform for Kubernetes

Key Characteristics

Gartner, Inc. | G00802491 Page 9 of 22

This research note is restricted to the personal use of hoanx@[Link].


A lightweight API gateway implementation has the following general characteristics:

■ It should be optimized as a self-contained turnkey solution for customers to deploy


and operate in private clouds or in on-premises data centers.

■ It should be configurable to keep its resource footprint to a minimum.

■ It should allow organizations to confine internal API traffic within their trusted
network for security and compliance reasons by placing the lightweight API gateway
in close proximity to API providers and API consumers.

■ It should allow certain lightweight gateway instances to enforce domain-specific,


fine-grained API policies as a way to implement a defense-in-depth strategy.

■ It can be deployed as part of the organization’s DevOps process. Configuration and


control can be delegated to the development team.

A lightweight API gateway implementation has the following technical characteristics:

■ Its lightweight runtime footprint can be packaged in a single container or virtual


machine (VM) image.

■ It’s built to be cloud-native. Recent implementations are built on the Envoy proxy.

Related Research

■ Decision Point for Mediating API and Microservices Communication

■ Comparing Architectures for Hybrid and Multicloud API Management

■ How to Evaluate API Management Solutions

■ How to Deliver Sustainable APIs

Ingress Gateway

Back to top

Gartner, Inc. | G00802491 Page 10 of 22

This research note is restricted to the personal use of hoanx@[Link].


An ingress gateway is part of the organization’s container environment. It is a component
that functions as the network communications gatekeeper for a container orchestration
cluster or service mesh. All inbound traffic to services running inside the cluster must pass
through the ingress gateway first. As a result, the ingress gateway becomes an ideal
policy enforcement point (PEP) for protecting APIs implemented by the services deployed
to the cluster or service mesh.

In the context of this research, “ingress gateway” collectively refers to a class of


components that implement Kubernetes ingress functionality. Ingress gateways are
differentiated only by their configuration model, which could be Kubernetes Ingress
controller, Kubernetes Gateway API or a service mesh ingress gateway.

Example Technologies
■ Ambassador Labs Emissary-Ingress

■ Apache APISIX

■ Contour

■ Envoy Gateway

■ HashiCorp Consul API Gateway

■ Kong Ingress Controller (KIC) for Kubernetes

■ Mulesoft Anypoint Flex Gateway in connected mode

■ [Link] Gloo Gateway

■ Tyk Gateway

■ WSO2 API Platform for Kubernetes

Key Characteristics

An ingress gateway implementation has the following general characteristics:

■ It should secure all external access to services running in Kubernetes or a service


mesh.

Gartner, Inc. | G00802491 Page 11 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ It should support the delegation of ingress routing rules to individual development
teams. This capability gives development teams autonomy over the application-
specific routing configurations while allowing the platform team to retain control
over the entry point of the cluster.

■ It must support a declarative configuration model to manage API mediation and


service deployment.

An ingress gateway implementation has the following technical characteristics:

■ It is often built on Envoy, with xDS as the most common data plane API.

■ It must support Kubernetes CustomerResourceDefinition (CRD)-based configuration.


It should support Kubernetes Ingress controller and/or Kubernetes Gateway API
CRDs.

■ It must minimize communication latency between gateway instances and the


control plane. Options include using a local control plane or a local agent to bridge
communication with remote control planes.

■ It may obtain policies from a remote APIM control plane via a local operator, or
directly from CRD.

Related Research

■ Decision Point for Mediating API and Microservices Communication

■ Comparing Architectures for Hybrid and Multicloud API Management

■ How to Evaluate API Management Solutions

■ How to Deliver Sustainable APIs

APIM Control Plane

Back to top

The APIM control plane is typically provided as a part of an APIM suite. It is a set of core
software and services that manage API gateway configurations, API proxy definitions, API
management policies, and API monitoring and observability policies. The control plane
hosts:

Gartner, Inc. | G00802491 Page 12 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ Data plane APIs for communication with the API gateways

■ Platform APIs for communication with the API admin portal and API developer
portals

The platform APIs can also facilitate integration with external IDEs and DevOps
processes. The control plane often contains one or more data stores or repositories to
store API gateway configurations, API proxy definitions, API enforcement policies and API
usage metrics. APIM control plane implementations also include an API catalog or
registry, which can be accessed by API developer portals.

Runtime for the APIM control plane should be deployed and managed independently from
the data plane. APIM control planes are typically offered as managed services from cloud
providers or service providers. Only some APIM vendors offer self-hosted, customer-
managed APIM control plane options.

Example Technologies

■ Amazon Web Services (AWS) Management Console

■ APIIDA API Control Plane

■ APIwiz

■ Axway Amplify Management Plane

■ Envoy Gateway control plane

■ Google Cloud Apigee hybrid management plane

■ IBM API Connect control plane, including the management server and analytics
server

■ Kong Konnect — Kong Gateway control plane

■ Microsoft Azure API Management — management plane

■ WSO2 API Control Plane and Management Plane

Key Characteristics

An APIM control plane implementation has the following general characteristics:

Gartner, Inc. | G00802491 Page 13 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ It must expose the control plane’s core capabilities, such as user management, API
definition and policy definition, via RESTful APIs. The vendor then uses these APIs to
implement the admin portal and developer portal features. The vendor also
publishes the APIs for automation and integration purposes.

■ It must maintain policy stores and distribute policy updates to API gateways.

■ It should receive and aggregate API usage metrics and telemetry from API gateways.

■ It should generate API analytics and reporting for API providers and consumers,
often via the admin portal and developer portals. Such API analytics can also
support API monetization/chargeback capabilities.

■ It should provide some basic form of built-in identity and access management when
an external enterprise IAM service is not available. This built-in capability should
include “superadmin” management to enable API gateway management, federation,
life cycle management and control from central IAM tools.

■ It must provide or facilitate certificate and secrets management for API gateway
provisioning and configuration.

■ It should support native integration with third-party IAM tools.

■ It must maintain a registry or catalog for API proxy definitions and interface
specifications.

An APIM control plane implementation has the following technical characteristics:

■ It should be deployed and managed independently from the data plane.

■ It should offer a self-hosted option (e.g., for internal-facing APIs).

■ It should offer SaaS options (e.g., for external-facing APIs).

■ It should use data plane APIs to dynamically configure the data plane.

■ It should publish data plane APIs (e.g., Envoy xDS) to facilitate integration with third-
party API gateways.

■ It should publish platform APIs for integration with third-party developer portals or
IDEs.

Gartner, Inc. | G00802491 Page 14 of 22

This research note is restricted to the personal use of hoanx@[Link].


Related Research

■ Decision Point for Mediating API and Microservices Communication

■ Comparing Architectures for Hybrid and Multicloud API Management

■ How to Evaluate API Management Solutions

API Admin Portal (for API Providers)

Back to top

The API admin portal, aka API manager or APIM console, is the web UI front end to the
APIM control plane. It uses the platform APIs to communicate with the control plane core
services as part of the platform API flow. Alternate UIs for configuring the control plane
and API gateways include CLI and Kubernetes CRD.

The API admin portal serves as the policy administration point (PAP) for APIM platform
operators, API product managers and API providers to administer all aspects of the API
management platform.

APIM platform operators use the API admin portal and other tools to:

■ Set up and configure APIM environments

■ Set up multitenancy structures and role-based access control (RBAC) rules on the
APIM platform to support multiple lines of business (LOBs), departments or
development teams

■ Set up API gateway deployment topologies and cluster configurations

API product managers use the API admin portal to:

■ Define API products

■ Define API subscription plans

■ Approve or deny subscription requests from API consumers

■ View API usage metrics and reports

API providers/developers may use the API admin portal and other tools to:

Gartner, Inc. | G00802491 Page 15 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ Create API proxy definitions and API documentation

■ Create and manage security, monitoring and routing policies

■ Manage the life cycle of their own APIs

Example Technologies
■ APIIDA API Developer Portal

■ APIwiz

■ Axway Amplify API Management — API Manager

■ Google Cloud Apigee UI

■ IBM API Connect API Manager

■ Kong Konnect — Gateway Manager

■ Microsoft Azure portal

■ [Link] Gloo Portal

■ WSO2 API Manager

Key Characteristics

An API admin portal implementation has the following general characteristics:

■ It should allow the APIM platform team or administrators to configure organizations,


suborganizations and environments for the APIM platform.

■ It should allow the APIM platform team or administrators to set up API gateway
instances, cluster configurations and high availability/disaster recovery (HA/DR)
options.

■ It should allow the APIM platform team or administrators to define global API
policies by organization, environment, application or product.

■ It should allow API providers to define API proxies, mediation policies, API products
and subscription plans.

An API admin portal implementation has the following technical characteristics:

Gartner, Inc. | G00802491 Page 16 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ It is an integral part of the APIM platform, often with limited customization options.

■ It integrates with the APIM control plane using platform APIs.

Related Research

■ Decision Point for Mediating API and Microservices Communication

■ Comparing Architectures for Hybrid and Multicloud API Management

■ How to Evaluate API Management Solutions

■ How to Deliver Sustainable APIs

API Developer Portal (for Consumers)

Back to top

An API developer portal is a self-service website or UI designed to support developers. It


covers aspects of API consumption, including:

■ Access to API documentation

■ API client development support, such as software development kits (SDKs) and
sample codes

■ API testing tools

■ Self-service onboarding of API clients/consumers

■ Analytics and reporting on API usage by API consumers

Many organizations create separate developer portal instances — internal developer


portals and external developer portals — to serve distinct purposes and target audiences:

■ Internal API developer portal: This portal is optimized to support internal API
developers as part of developer hubs.

■ External API developer portal: This portal is the storefront that connects an
organization’s external API consumers to its public- or partner-facing APIs. Its
primary focus is to create developer communities and showcase API business value.

Example Technologies

Gartner, Inc. | G00802491 Page 17 of 22

This research note is restricted to the personal use of hoanx@[Link].


Many API management products include a developer portal as part of their offering.
Examples include:

■ APIwiz API Marketplace

■ Axway Amplify API developer portal

■ Google Cloud Apigee Drupal modules and integrated portal

■ IBM API Connect Developer Portal

■ Kong Konnect Dev Portal

■ Microsoft Azure API Management developer portal

■ MuleSoft Anypoint Platform API portal

■ [Link] Gloo Portal

In addition, some stand-alone developer portal offerings include:

■ Apiable

■ Backstage

■ Microsoft Azure API Management developer portal (open-source software)

■ OpsLevel

■ Postman workspaces

■ SwaggerHub Portal

Key Characteristics

A developer portal implementation has the following general characteristics:

■ It must present to an API catalog. The API catalog may be managed by the API
control plane or, in some cases, be stand-alone to support the portal user experience
that must be maintained/synchronized with the runtime environment. An API catalog
is the most basic requirement of an API developer portal.

Gartner, Inc. | G00802491 Page 18 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ It must enable developers to register and obtain the proper credentials — such as API
keys or client credentials for their consuming application — to access APIs published
on the developer portal. Developers can manage their credentials, with the ability to
add, modify, renew or revoke keys. This feature requires integration with the
respective APIM control plane.

■ Developers can access usage metrics and performance analytics to help optimize
their applications’ API consumption. This feature requires integration with analytics
and reporting capabilities, either built into the APIM platform or available from third
parties.

■ Developers can seek assistance from API product teams or engage with the broader
developer community to exchange knowledge and share code. API providers can
also use the developer portal to communicate feature updates, changes in SLAs and
service contracts, and changes to relevant policies.

■ API client libraries, downloadable via a developer portal, allow the developer to
interact with the API through a well-defined object model rather than through low-
level API calls. Such libraries are referred to as “SDKs” once they approach full
coverage of all API features. The easier the SDK is to use, and the more functionally
complete it is, the more productive a developer using it will be.

A developer portal implementation has the following technical characteristics:

■ It is built on a content management system (CMS), such as Drupal. Familiarity with


the underlying CMS may be required to customize/enhance the portal.

■ It must integrate with APIM and other components to support self-service


onboarding, visibility of analytics and metrics, and maintenance of any stand-alone
API catalog (if present).

■ It must integrate with enterprise IAM for SSO of internal/external users via identity
federation.

Related Research

■ Leverage API Portals for Successful API Adoption

Key Architecture Principles and Patterns


Foundational principles of API management architecture include:

Gartner, Inc. | G00802491 Page 19 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ API mediation: API gateways act as an abstraction layer between sources and
consumers, decoupling them from one another. API mediation may include protocol
and format transformation, content filtering and mapping, and orchestration and
composition of requests and responses.

■ Dual-plane architecture: The data plane (including API gateways) and control plane
are decoupled. Control plane and data plane components can be deployed and
managed independently of each other.

■ Modular design: Key API management capabilities, such as developer portals, API
gateways and analytics, are independent components that can be customized,
extended or replaced by customers to meet specific requirements.

■ API- and event-based communication: API management components interact with


each other using well-defined APIs and events.

■ Cloud-native design: APIM architecture is cloud-native by design and is ready to


support hybrid and multicloud deployment.

■ APIs as products: The APIM platform embraces and supports APIs as products
throughout their life cycle for all personas involved, including API providers, product
managers and API consumers.

■ Customer focus: The APIM platform enables API providers to design, develop,
maintain and continuously improve APIs to meet the customers’ evolving needs.

Key Architecture Recommendations


■ Implement API mediation centered on API gateways, but do not overload the
gateways with integration tasks. Use complementary technologies, such as
enterprise service bus (ESB), integration platform as a service (iPaaS) and custom
software, to accomplish complex integration tasks.

■ Use cloud-managed enterprise API gateways for external-facing public APIs or


partner APIs to provide high availability and elasticity while minimizing operational
costs. However, latency and data ingress/egress are concerns for internal APIs,
especially when the API consumers and API providers are located on different clouds
or on-premises networks.

■ Protect and manage containerized services by using an ingress gateway to apply


API-specific policies to requests from external clients. An ingress gateway helps
define and secure the boundary for services deployed in a container orchestration
platform.

Gartner, Inc. | G00802491 Page 20 of 22

This research note is restricted to the personal use of hoanx@[Link].


■ Choose lightweight API gateways when you need to deploy and manage your own
gateways on-premises or in self-managed cloud infrastructure (containers or VMs)
to minimize operational overhead. Lightweight API gateways are also well-suited for
governing internal APIs or domain-specific APIs that demand their own gateway
instances for better isolation and customization.

■ Integrate your APIM platforms or services with your enterprise IAM tools rather than
using the APIM’s native identity provider. This approach not only ensures long-term
compliance with your enterprise security and identity federation policies, but also
reduces vendor lock-in.

Related Architecture Research


■ When to Use a Service Mesh in Cloud-Native Architectures

■ Decision Point for Mediating API and Microservices Communication

■ Comparing Architectures for Hybrid and Multicloud API Management

■ How to Evaluate API Management Solutions

■ Market Guide for API Gateways

■ Architect a Modern API Access Control Strategy

■ Reference Architecture Brief: Cloud-Native Application Architecture

■ Reference Architecture Brief: Event-Driven Application Architecture

■ Reference Architecture Brief: Microservices Architecture Delivery Platform

■ Reference Architecture Brief: Software Observability

■ Reference Model for API Management Solutions

■ Leverage API Portals for Successful API Adoption

■ Critical Capabilities for API Management

Recommended by the Author


Some documents may not be available as part of your current Gartner subscription.

Decision Point for Mediating API and Microservices Communication

Gartner, Inc. | G00802491 Page 21 of 22

This research note is restricted to the personal use of hoanx@[Link].


Comparing Architectures for Hybrid and Multicloud API Management
How to Evaluate API Management Solutions
How to Deliver Sustainable APIs

© 2025 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of
Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form
without Gartner's prior written permission. It consists of the opinions of Gartner's research
organization, which should not be construed as statements of fact. While the information contained in
this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties
as to the accuracy, completeness or adequacy of such information. Although Gartner research may
address legal and financial issues, Gartner does not provide legal or investment advice and its research
should not be construed or used as such. Your access and use of this publication are governed by
Gartner's Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its
research is produced independently by its research organization without input or influence from any
third party. For further information, see "Guiding Principles on Independence and Objectivity." Gartner
research may not be used as input into or for the training or development of generative artificial
intelligence, machine learning, algorithms, software, or related technologies.

Gartner, Inc. | G00802491 Page 22 of 22

This research note is restricted to the personal use of hoanx@[Link].

Common questions

Powered by AI

An ingress gateway contributes to the security of containerized services by applying API-specific policies to external client requests. It defines and secures the boundary for services deployed within a container orchestration platform, ensuring that only authorized and vetted traffic is allowed to interact with internal services. This enforcement helps maintain the integrity and confidentiality of the services by controlling access at a centralized point .

The API admin portal serves as the central point for managing all aspects of an API management platform. It allows APIM operators, product managers, and developers to configure environments, define API products, manage API lifecycle, and monitor usage metrics. As a policy administration point, it supports the setup of multitenancy structures and RBAC rules, thereby facilitating comprehensive oversight and management of API security, monitoring, and routing policies .

Domain-specific, fine-grained API policies enhance an organization's security strategy by allowing precise control over the services accessed through the API. By implementing defense-in-depth strategies that are specific to different domains, organizations can enforce strict security measures where necessary, while allowing more open access in less critical areas. This granularity in policy application helps protect sensitive data and resources from unauthorized access or excessive exposure without compromising the flexibility to innovate and integrate efficiently .

The significance of modular design in API management platforms lies in its ability to meet specific customization needs by allowing independent and custom interventions on key components such as developer portals, gateways, and analytics. It provides the flexibility to add or replace specific modules based on organizational requirements without disrupting the entire system, thus enabling tailored integration and management solutions that are scalable and adaptable .

Dual-plane architecture enhances API management in hybrid and multicloud environments by decoupling the control plane and data plane. This separation allows independent deployment and management, making it easier to customize, extend, or replace components such as gateways and analytics. It supports cloud-native and event-based communication, enabling flexibility in managing APIs across different cloud platforms .

Organizations should prefer cloud-managed enterprise API gateways for external-facing public APIs or when high availability and elasticity are critical, as these gateways provide these features while minimizing operational costs. However, latency and data ingress/egress become concerns when the API consumers and providers are on different networks, hence in such cases, self-hosted solutions might be better suited for internal APIs especially when data sovereignty or control is a concern .

Treating APIs as products within their lifecycle underscores the focus on customer experience and continuous improvement aligned with market demands. This approach ensures that APIs are developed, maintained, and iterated with the same discipline and focus as any other product, considering not only technical aspects but also user engagement, documentation, and market fit. It shifts the emphasis from mere functionality to value delivery, ensuring APIs evolve to meet the changing needs of consumers .

When comparing API management architectures for hybrid and multicloud deployment, key factors include the ability to decouple the data plane and control plane, support for hybrid deployments, and cloud-native design features. Other considerations are the flexibility to customize and integrate various components like developer portals, ease of deployment, and cross-cloud data management capabilities. An effective architecture should also uphold security and compliance requirements while maintaining elasticity and high availability across clouds .

A lightweight API gateway benefits cloud-native architectures by providing a distributed and flexible management system that is closer to the services. Unlike centrally managed enterprise API gateways, lightweight gateways can be individually deployed and managed to meet specific application needs. They support essential functionalities like access management, traffic management, routing, and security checks within a minimized resource footprint. This allows organizations to confine internal API traffic within trusted networks while maintaining fine-grained policy enforcement and integration with DevOps processes .

Integrating APIM platforms with enterprise IAM tools is crucial because it ensures long-term compliance with enterprise security policies and identity federation. It also reduces vendor lock-in by providing flexibility for the organization to switch or upgrade platforms without significant disruptions. This integration supports a more robust identity management approach that aligns with established security strategies within the organization .

You might also like