Basic Configuration and Security

Last updated: 1 minute read.

This section covers methods for configuring and applying security methods to Tyk. the following subjects are covered:

  • Security. This section includes how to apply security to your Tyk components, your APIs, and security policies.
  • Control and Limit Traffic. This section shows you how to apply quotas, rate limits (throttling) and size limits to your APIs.
  • Reduce Latency. This section describes methods for reducing latency in your Tyk installation.
  • Report, Monitor and Trigger Events. This section describes what event data you can include in your APIs, and how you can do manage them with the use of webhooks and custom JavaScript handlers. This section also cover the use of monitors for user and organisation quotas, as well as StatsD and NewRelic instrumentation.