Basic Configuration and Security
Last updated: 1 minute read.
This section covers methods for configuring and applying security methods to Tyk. the following subjects are covered:
- Security. This section includes how to apply security to your Tyk components, your APIs, and security policies.
- Control and limit traffic. This section shows you how to apply quotas, rate limits (throttling) and size limits to your APIs.
- Reduce latency. This section describes methods for reducing latency in your Tyk installation.
- Log traffic. This section describes how to control the capture of traffic logs for the transactions (API requests and responses) handled by your Tyk Gateways.
- Gateway events. This section describes the different types of asynchronous events that Tyk Gateway can generate and how you can register webhooks and other methods to handle them.