Basic Configuration and Security
Last updated:
This section covers methods for configuring and applying security methods to Tyk. the following subjects are covered:
- Security. This section includes how to apply security to your Tyk components, your APIs, and security policies.
- Reduce latency. This section describes methods for reducing latency in your Tyk installation.
- Log traffic. This section describes how to control the capture of traffic logs for the transactions (API requests and responses) handled by your Tyk Gateways.
- Gateway events. This section describes the different types of asynchronous events that Tyk Gateway can generate and how you can register webhooks and other methods to handle them.