Lesson 9: Securing Your API with HTTPS & API Gateway
Meta Description
Learn how to secure your .NET API using HTTPS, an API Gateway, Google reCAPTCHA, and API rate limiting. This tutorial covers enforcing HTTPS, setting up authentication middleware, configuring API keys, implementing CAPTCHA, and handling JWT security. Includes best practices and FAQs.
1️⃣ Why API Security Matters
APIs handle sensitive data and user authentication, making them a prime target for attacks. Securing your API is essential to prevent unauthorized access, data breaches, and malicious attacks.
Key security measures:
- Enforce HTTPS
- Use Authentication & Authorization
- Secure API Endpoints
- Implement Rate Limiting
- Protect Against Bots with Google reCAPTCHA
2️⃣ Installing Required Libraries
Before proceeding, install the required packages:
# Install JWT authentication
dotnet add package Microsoft.AspNetCore.Authentication.JwtBearer
# Install Rate Limiting
dotnet add package AspNetCoreRateLimit
# Install Google reCAPTCHA
nuget install reCAPTCHA.Net
These libraries will help secure our API with authentication, rate limiting, and bot protection.
3️⃣ Enforcing HTTPS in Azure
To ensure all requests use HTTPS, Azure provides an easy setting to redirect all HTTP traffic.
🔹 Update 2024: Enforcing HTTPS in Azure
It’s now under Settings > Configuration > General Settings:
- Go to Azure Portal and open the overview page of the App Service.
- In the sidebar, under the Settings section, click TLS/SSL Settings.
- Enable HTTPS only.
- Save the settings.
This works for every App Service Plan tier, including the F-Series (Free Tier).
For additional security, enforce HTTPS in your .NET
code:
var builder = WebApplication.CreateBuilder(args);
var app = builder.Build();
app.UseHttpsRedirection(); // Forces HTTPS
app.UseAuthentication();
app.UseAuthorization();
app.MapControllers();
app.Run();
4️⃣ Protecting API Endpoints with JWT Authentication
We need to ensure only authenticated users can access certain routes.
🔹 Adding Authentication Middleware
Modify Program.cs
to require JWT authentication:
builder.Services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
.AddJwtBearer(options =>
{
options.Authority = $"https://securetoken.google.com/{YourFirebaseProjectId}";
options.Audience = "{YourFirebaseProjectId}";
});
builder.Services.AddAuthorization();
🔹 Securing an API Route
[Authorize]
[HttpGet("secure-data")]
public IActionResult GetSecureData()
{
return Ok(new { message = "This is a protected route" });
}
Any request without a valid JWT token will receive a 401 Unauthorized
error.
5️⃣ Implementing Google reCAPTCHA for Bot Protection
To prevent bots from accessing public endpoints (like user registration), use Google reCAPTCHA.
🔹 Set up reCAPTCHA in Google
- Visit Google reCAPTCHA Admin
- Register your site and choose reCAPTCHA v2 or v3.
- Copy the Site Key and Secret Key.
🔹 Validate reCAPTCHA in .NET
[HttpPost("register")]
public async Task<IActionResult> RegisterUser([FromBody] RegisterRequest request)
{
var isValidCaptcha = await VerifyRecaptcha(request.RecaptchaToken);
if (!isValidCaptcha)
return BadRequest("Invalid reCAPTCHA.");
// Proceed with registration...
}
private async Task<bool> VerifyRecaptcha(string token)
{
var secretKey = "Your-Google-Secret-Key";
var client = new HttpClient();
var response = await client.GetStringAsync($"https://www.google.com/recaptcha/api/siteverify?secret={secretKey}&response={token}");
var json = JsonSerializer.Deserialize<RecaptchaResponse>(response);
return json.success;
}
6️⃣ Limiting API Calls to Prevent Abuse
Using AspNetCoreRateLimit
:
builder.Services.AddMemoryCache();
builder.Services.Configure<IpRateLimitOptions>(options =>
{
options.GeneralRules = new List<RateLimitRule>
{
new RateLimitRule
{
Endpoint = "*", // Apply to all endpoints
Limit = 100, // 100 requests
Period = "1m" // Per minute
}
};
});
7️⃣ Common Questions & Answers
Q1: What is an authenticated user?
An authenticated user is one who has successfully logged in and received a valid JWT token. This token must be included in every request to access secured endpoints.
Q2: Does this mean only registration is unsecured?
Yes, registration is usually the only endpoint open to the public. After registering, the user receives a token and must use it for all future requests.
Q3: How do I restrict API access to specific users?
Check claims inside your controller:
var userId = User.FindFirst("user_id")?.Value;
if (userId != "allowed-user-id")
{
return Unauthorized();
}
Q4: How do I protect against SQL Injection?
Use parameterized queries:
var cmd = new SqlCommand("SELECT * FROM Users WHERE Email = @Email", connection);
cmd.Parameters.AddWithValue("@Email", userEmail);
Q5: How do I enable CORS for secure access from multiple clients?
builder.Services.AddCors(options =>
{
options.AddPolicy("AllowAll", builder =>
builder.AllowAnyOrigin()
.AllowAnyMethod()
.AllowAnyHeader());
});
app.UseCors("AllowAll");
Next Steps
Now that our API is secured, we will cover: ✅ OAuth Login (Google, Facebook, Apple, AWS) ✅ Monitoring & Logging API Activity
Let me know if you have more questions! 🚀