Zuplo Changelog
We release improvements, new features, and fixes daily. Follow along here to see the most important updates.
Federated Identity increases the security of your Zuplo API by removing the need to share sensitive service account keys with your Zuplo API. Instead, Zuplo will use the Zuplo Identity Token to authenticate with Google Cloud Services on your behalf.
A new policy has been added to Zuplo that enables Federated Identity with Google Cloud Services. By utilizing this policy developers can secure their GCP API or other Google Cloud Resources (Storage, Pub/Sub, etc.) with GCP IAM and allow Zuplo to call these services on their behalf.
Federated Identity with GCP is available as a paid-addon to customers on enterprise plans. Contact your account manager or sales@zuplo.com to inquire about pricing.
For more information on how to configure Federated Identity with GCP, see the Federated Identity with GCP documentation.
Role-Based Access Control allows you to assign specific roles to users who access the Zuplo Portal. These roles determine the permissions that users have and the actions they can perform. For example, you can assign roles such as "Admin", "Developer", or "Viewer", each with different levels of access to resources and functionality.
With RBAC, you can:
- Assign roles to users based on their responsibilities and access requirements.
- Limit access to production resources to only select users.
- Enable more users access to the Zuplo Portal, such as API Analytics, without compromising security.
See the Account Members & Roles documentation for more information.
Developers can use Zuplo's CLI and API to automate tasks with the Zuplo platform. For example, you can create a custom CI/CD process to publish your Zuplo API or automate the management of environment variables. Previously, each account had only a single API key, which granted full access to all resources and functionality. With Fine-Grained API Keys, you can create multiple API keys with limited permissions.
These new capabilities allow:
- Create API keys with specific permissions for specific tasks, environments, or projects.
- Set expiration dates on API Keys to ensure that they are only valid for a limited time.
- Administrators can view and manage all API keys in the Zuplo portal to maintain security of their resources.
See the Zuplo API Key documentation for more information.
API Monetization Enhancements
Over the past month, we have made several improvements to the API Monetization beta:
-
Better Error Handling for Stripe Webhooks: We have improved the error handling for Stripe webhooks to ensure more robust and reliable operation.
-
Improved Documentation: We have updated and expanded the documentation to provide clearer and more comprehensive guidance.
-
Additional Logging: We have added more logging to help diagnose and troubleshoot issues more effectively.
-
Editable Plans: We have made plans editable, allowing developers to modify quotas or fix misconfigurations as needed.
These improvements are part of our ongoing effort to refine and enhance the API Monetization beta. We have more enhancements planned before the General Availability (GA) release, and we aim to stabilize the feature in the next month.
We added a new plugin for API Brownouts, which allows developers to simulate outages of their API. This is useful for migrating users off of old versions of their API. You can read more about API Brownouts in our blog post here.
To learn more, please view our Policy documentation.
We have added a new plugin for Curity Phantom Tokens, which allows developers to take advantage of the Curity Identity Management solution. This plugin uses Curity's unique Phantom Token approach which is a privacy-preserving token usage pattern for microservices. It combines the benefits of opaque and structured tokens. To read more about phantom tokens see this document.
To learn more, please view our Policy documentation.