Basic Configuration and Security

Last updated: 1 minute read.

This section covers methods for configuring and applying security methods to Tyk. the following subjects are covered:

  • Security. This section includes how to apply security to your Tyk components, your APIs, and security policies.
  • Control and limit traffic. This section shows you how to apply quotas, rate limits (throttling) and size limits to your APIs.
  • Reduce latency. This section describes methods for reducing latency in your Tyk installation.
  • Log traffic. This section describes how to control the capture of traffic logs for the transactions (API requests and responses) handled by your Tyk Gateways.
  • Gateway events. This section describes the different types of asynchronous events that Tyk Gateway can generate and how you can register webhooks and other methods to handle them.