Oracle Cloud API Platform Tutorial: Architecture, Pricing, Use Cases, and Hands-On Guide for Other Services

Category

Other Services

1. Introduction

Oracle Cloud API Platform is Oracle’s API management offering designed to help teams publish, secure, monitor, and govern APIs across their organization.

In simple terms: API Platform sits between your API consumers (apps, partners, developers) and your backend services, providing a controlled “front door” where you can enforce authentication, rate limits, and policies, and where developers can discover and subscribe to APIs.

Technically, API Platform typically includes a management plane (where APIs are defined, versioned, and published), one or more API Gateway runtimes (that enforce policies and route traffic to backend services), and often a developer portal/catalog for onboarding and API consumption. It centralizes common cross-cutting concerns—security, traffic shaping, observability, and governance—so every backend team doesn’t have to reinvent them.

The main problem API Platform solves is the operational and security complexity of running APIs at scale: inconsistent authentication approaches, lack of visibility, unmanaged breaking changes, uncontrolled traffic spikes, and fragmented developer onboarding.

Important note about naming and service lifecycle: Oracle has historically offered Oracle API Platform Cloud Service (often shortened to API Platform). Oracle Cloud also provides OCI API Gateway as an OCI-native service for API exposure. Availability, onboarding, and recommended patterns can vary by account type and region. Verify the current status, availability, and recommended successor path in official Oracle documentation for your tenancy before standardizing on it for new projects.


2. What is API Platform?

Official purpose

API Platform’s purpose is to provide a managed way to design, publish, secure, and operate APIs—including internal APIs, partner APIs, and public APIs—using consistent policies and centralized governance.

Core capabilities (what teams use it for)

Common API Platform capabilities include:

  • API onboarding and publishing: Define APIs, publish versions, manage lifecycle states (draft/published/deprecated).
  • Runtime enforcement: Route requests to backend services and enforce security and traffic policies.
  • Consumer onboarding: Provide a portal/catalog experience and/or application registration and credentials issuance.
  • Analytics/monitoring: Track API usage, errors, latency, and consumer activity (capabilities vary by edition and integration).
  • Governance: Standardize API design, ownership, and policy baselines.

If you rely on a specific capability (for example, monetization, advanced analytics, GraphQL, or mTLS), verify in official docs for your API Platform edition and your Oracle Cloud environment.

Major components (conceptual)

While names and packaging can vary, API management platforms generally include:

  1. API Manager / Control plane – Where API definitions, policies, applications, and publishing actions are managed.
  2. API Gateway / Runtime plane – One or more gateways that receive inbound traffic, validate/authenticate, enforce policies, and proxy to backends.
  3. Developer Portal / Catalog (if available) – A place for consumers to find APIs, read docs, register apps, and obtain keys/tokens.
  4. Identity integration – Typically integrates with Oracle identity services (Oracle Cloud Identity / IAM / IDCS depending on your environment) for admin access and OAuth flows.
  5. Logging/analytics – Built-in or integrated dashboards for operational visibility (verify exact integration options).

Service type

API Platform is best understood as API management (APIM): policy-driven governance + runtime API gateway functionality.

Scope (regional/global/account-scoped)

Scope depends on how your Oracle Cloud API Platform is provisioned:

  • Management plane is typically tenant/subscription scoped.
  • Runtime gateways can be deployed in one or more network zones and may support multiple environments (dev/test/prod), depending on how Oracle provides it in your account.
  • Region availability and deployment model can vary. Verify in official docs for your Oracle Cloud account type.

How it fits into the Oracle Cloud ecosystem

API Platform is commonly used alongside:

  • Oracle Cloud Identity / IAM: admin access control and OAuth/OIDC integration.
  • Oracle Cloud Infrastructure networking: VCN, subnets, security lists/NSGs, private endpoints (where applicable).
  • Compute / Kubernetes / Functions: backend services that the gateway routes to.
  • Observability services: logging/metrics/alarms (integration model depends on edition; verify).
  • WAF / Load Balancer: optional edge protection and traffic management in front of gateways.

3. Why use API Platform?

Business reasons

  • Faster partner onboarding: standard way to publish APIs and issue credentials.
  • Reduced delivery risk: versioning, lifecycle controls, and consistent rollout approach.
  • Better productization of APIs: treat APIs as products with owners, contracts, and usage insights.

Technical reasons

  • Consistent security controls across APIs: API keys, OAuth 2.0/OIDC, JWT validation, TLS enforcement (verify exact supported policies).
  • Traffic shaping: rate limiting/quotas to protect backends.
  • Central policy enforcement: headers, CORS policies, request/response transformations (verify).
  • Decoupling: clients call stable gateway endpoints while backend services evolve.

Operational reasons

  • Standardized routing layer: common logging, analytics, and alerting patterns.
  • Reduced operational overhead compared to building custom gateways per team.
  • Central governance and inventory: know what APIs exist, who owns them, and who consumes them.

Security/compliance reasons

  • Auditability: centralized change management and access control.
  • Least privilege: grant teams access to only their APIs and environments.
  • Controlled exposure: reduce direct internet exposure of backend services; keep backends private.

Scalability/performance reasons

  • Backpressure via rate limiting and quotas.
  • Caching and optimization may be available depending on policies and runtime configuration (verify).
  • Horizontal scaling via multiple gateway nodes/instances (deployment model varies).

When teams should choose it

Choose API Platform when you need:

  • Multiple teams publishing APIs with consistent governance
  • A developer onboarding experience (portal/app registration)
  • Security and traffic controls centralized at the edge of your services
  • Clear separation between control plane (management) and data plane (runtime)

When teams should not choose it

Consider alternatives when:

  • You only need a simple reverse proxy for one service (an ingress controller, NGINX, or load balancer may be simpler).
  • You require a capability not supported by your API Platform edition (e.g., advanced GraphQL features, complex monetization, strict mTLS everywhere)—validate first.
  • You are standardizing purely on OCI-native services and your organization prefers OCI API Gateway for new builds (common in OCI-only footprints).

4. Where is API Platform used?

Industries

  • Financial services (partner APIs, PSD2-like patterns, secure exposure)
  • Retail and e-commerce (mobile APIs, partner integrations)
  • Healthcare (controlled API access, auditing)
  • Telecom (high-volume API programs, throttling)
  • SaaS and ISVs (public APIs, developer onboarding)
  • Manufacturing/logistics (B2B integrations and IoT APIs)

Team types

  • Platform engineering teams building internal API foundations
  • Integration teams exposing ERP/CRM data as APIs
  • App teams needing secure/public endpoints without re-implementing auth
  • Security teams standardizing API controls and threat mitigation patterns
  • SRE/operations teams centralizing observability and incident response

Workloads and architectures

  • Microservices fronted by an API gateway
  • Hybrid apps with on-prem backends exposed securely to cloud consumers
  • Multi-environment (dev/test/prod) with gated promotions and versioning
  • Partner ecosystems with per-partner credentials and quotas

Deployment contexts

  • Production: strict IAM, change controls, WAF, private backends, monitoring, rate limiting
  • Dev/test: low-cost gateway footprints, relaxed quotas, synthetic tests, rapid iteration

5. Top Use Cases and Scenarios

Below are realistic scenarios where API Platform is commonly used.

1) Central API gateway for microservices

  • Problem: Each microservice team exposes endpoints differently, leading to inconsistent auth, logging, and rate limits.
  • Why API Platform fits: Centralizes security and traffic policies at a shared entry point.
  • Example: An OKE-based microservices stack is exposed through API Platform gateways with standardized JWT validation and per-route throttles.

2) Partner API program with onboarding controls

  • Problem: Partners need access, but credentialing and quota management are manual and inconsistent.
  • Why it fits: Provides application registration and policy-based quotas (verify policy names/features).
  • Example: A logistics company publishes “Shipment Tracking API” to partners, issuing keys and enforcing partner-specific quotas.

3) Securely expose on-prem services to cloud/mobile apps

  • Problem: On-prem services are not safe to expose directly and lack modern auth.
  • Why it fits: Gateways can front legacy services and enforce modern authentication.
  • Example: A bank exposes a legacy SOAP/REST facade through API Platform, enforcing OAuth and TLS.

4) API lifecycle governance and versioning

  • Problem: Breaking changes are pushed without warning; consumers are surprised.
  • Why it fits: Supports API versioning and lifecycle controls (verify implementation details).
  • Example: v1 remains supported while v2 is published; consumers migrate over 90 days.

5) Rate limiting to protect fragile backends

  • Problem: Spikes from mobile clients overload downstream databases.
  • Why it fits: Enforces rate limits/quotas at the gateway before traffic hits backends.
  • Example: “Search API” is limited to 50 requests/minute per app key.

6) Unified authentication for many APIs

  • Problem: Some APIs use API keys, others basic auth, others custom tokens.
  • Why it fits: Standardizes access via OAuth2/OIDC and/or API keys (verify supported methods).
  • Example: All APIs require JWT access tokens issued by Oracle identity service; legacy key-based APIs are phased out.

7) Observability for API operations

  • Problem: Hard to answer “who is calling what, and why are they failing?”
  • Why it fits: Central capture of metrics/logs and consumer usage analytics.
  • Example: SRE uses gateway logs/analytics to identify a single partner causing elevated 429 responses.

8) Blue/green API backend migrations

  • Problem: Backend services must be migrated without changing client endpoints.
  • Why it fits: Update gateway routing to new backend with minimal client impact.
  • Example: Route 10% of traffic to new service; then 100% after validation (if supported; otherwise change via deployment workflow).

9) API catalog for internal developers

  • Problem: Teams don’t know which APIs exist; duplication occurs.
  • Why it fits: A portal/catalog improves discoverability and reuse.
  • Example: Internal platform publishes HR and Finance APIs; teams self-serve documentation and credentials.

10) Enforcing compliance policies (headers, TLS, allowed methods)

  • Problem: Regulatory requirements demand consistent TLS and request handling.
  • Why it fits: Policy enforcement at the gateway reduces per-service compliance work.
  • Example: All APIs enforce TLS and reject insecure cipher suites (where configurable; verify).

11) Multi-tenant SaaS API separation

  • Problem: Tenant isolation must be enforced consistently.
  • Why it fits: Gateway policies can validate tenant claims and apply tenant-specific limits.
  • Example: Tenant ID in JWT is validated; requests without required claim are rejected.

12) Controlled public APIs with WAF in front

  • Problem: Public APIs are subject to scanning, abuse, and OWASP API threats.
  • Why it fits: API Platform gateway enforces auth/rate limits; WAF adds additional edge protection.
  • Example: OCI WAF blocks suspicious patterns; gateway returns 401/429 for unauthorized/abusive clients.

6. Core Features

Exact feature availability can vary by edition and Oracle Cloud environment. For critical requirements, verify in official docs for your API Platform deployment.

API definition onboarding (OpenAPI/Swagger and/or RAML)

  • What it does: Lets you define an API contract and publish it through the platform.
  • Why it matters: Contracts make APIs predictable and versionable.
  • Practical benefit: Consumers can generate clients; platform can map routes and policies consistently.
  • Caveats: Supported spec versions and import/export behavior vary—verify supported OpenAPI versions.

API lifecycle management (versions, states)

  • What it does: Supports publishing versions and managing lifecycle (draft/published/deprecated).
  • Why it matters: Prevents breaking changes and unmanaged API sprawl.
  • Benefit: Safer upgrades; clearer ownership.
  • Caveats: Deprecation workflows differ by product/version.

Policy enforcement at the gateway

  • What it does: Applies policies like authentication, authorization, throttling, header enforcement, and more.
  • Why it matters: Centralizes cross-cutting requirements.
  • Benefit: Backends can focus on business logic.
  • Caveats: Policy catalog varies; some transformations may be limited.

Authentication and authorization integration

  • What it does: Integrates with Oracle identity services and supports common API auth patterns (API keys, OAuth2/OIDC/JWT validation—verify).
  • Why it matters: Strong, standardized identity is the foundation of secure APIs.
  • Benefit: Reduced custom auth code and fewer security gaps.
  • Caveats: Token formats, claim mapping, and identity provider setup must be validated in docs.

Application registration and consumer management

  • What it does: Allows creation of “applications” that receive credentials and subscribe to APIs.
  • Why it matters: Enables per-consumer quotas and auditing.
  • Benefit: You can identify abusive consumers and rotate credentials.
  • Caveats: The portal experience and self-service options vary.

Developer portal / API catalog (if available)

  • What it does: Documents APIs and enables discovery and onboarding.
  • Why it matters: Reduces friction and support load.
  • Benefit: Self-service access to docs, keys, sample calls.
  • Caveats: Branding, customization, and workflow vary.

Analytics and reporting

  • What it does: Tracks usage, latency, error rates, and consumer activity.
  • Why it matters: Helps with troubleshooting, capacity planning, and product decisions.
  • Benefit: Identify top endpoints, failure patterns, and performance bottlenecks.
  • Caveats: Retention, granularity, and export options vary; verify.

Environment separation (dev/test/prod)

  • What it does: Supports separate gateways and/or configurations per environment.
  • Why it matters: Prevents test changes from impacting production.
  • Benefit: Controlled promotions and safer releases.
  • Caveats: How environments are modeled is product/version specific.

Gateway deployment flexibility (cloud and/or on-prem)

  • What it does: Allows gateway runtime placement close to backends or within required network zones.
  • Why it matters: Hybrid architectures are common.
  • Benefit: Keep sensitive backends private while still offering secure APIs.
  • Caveats: Installation model, sizing, and HA options depend on your offering; verify.

TLS termination and certificate management

  • What it does: Terminates TLS at the gateway; manages server certificates.
  • Why it matters: Secure transport is mandatory for production APIs.
  • Benefit: Central certificate lifecycle rather than per-service.
  • Caveats: mTLS support and certificate automation vary.

7. Architecture and How It Works

High-level architecture

API Platform generally uses a control plane / data plane model:

  • Control plane (management): admins define APIs, policies, and publish them.
  • Data plane (runtime gateways): gateways receive traffic, enforce policies, then route to backend services.

Request flow (data plane)

  1. Client calls an API endpoint hosted by API Platform Gateway.
  2. Gateway validates TLS, checks authentication (API key / OAuth token), and evaluates policies (rate limit, allowed methods, etc.).
  3. Gateway forwards the request to the configured backend endpoint (private or public).
  4. Gateway returns the backend response to the client (optionally applying response policies).
  5. Logs/metrics are produced for operations and analytics (implementation varies).

Control flow (management plane)

  1. API owner uploads/creates API definition.
  2. API owner configures policies and backend mapping.
  3. API is published to gateway(s) and optionally to a developer portal/catalog.
  4. Consumers register apps and receive credentials.
  5. Operations monitors usage and adjusts policies as needed.

Integrations with related services

Common integrations in Oracle Cloud environments include:

  • Identity: Oracle Cloud Identity / IAM (and in some environments Oracle Identity Cloud Service).
  • Networking: VCN, subnets, NSGs, security lists, DRG/VPN/FastConnect for hybrid.
  • Edge security: OCI WAF (optional) in front of gateways.
  • Backend hosting: OCI Compute, OKE (Kubernetes), Functions, Integration services.
  • Observability: OCI Logging/Monitoring or built-in analytics (depends on edition; verify).

Security/authentication model (typical)

  • Admin access: controlled via identity groups/roles (service admin, API owner, viewer).
  • Consumer access: API key and/or OAuth 2.0 access tokens; gateway validates credentials and enforces authorization policies.

Networking model (typical)

  • Gateways sit in front of backends.
  • For production, backends should be private where possible; gateway has network route to backends.
  • Public exposure can be limited to the gateway endpoint (and optionally WAF/LB).

Monitoring/logging/governance considerations

  • Decide early: what logs are needed (access logs, auth failures, latency, backend errors).
  • Define SLOs: availability, p95 latency, error rate.
  • Establish governance: naming standards, tags, ownership metadata, deprecation policy, change approvals.

Simple architecture diagram (Mermaid)

flowchart LR
  A[API Consumer<br/>(App / Partner / Developer)] -->|HTTPS| G[API Platform Gateway]
  G -->|Policy enforcement<br/>Auth + Rate limit| B[Backend API Service]
  M[API Platform Manager<br/>(Control plane)] -->|Publish APIs/Policies| G
  P[Developer Portal / Catalog] -->|Discover & Subscribe| A
  M --> P

Production-style architecture diagram (Mermaid)

flowchart TB
  subgraph Internet
    C[Consumers<br/>Mobile / Web / Partners]
  end

  subgraph Edge["Edge (Public Subnet)"]
    WAF[OCI WAF<br/>(optional)]
    LB[Load Balancer<br/>(optional)]
  end

  subgraph GatewayZone["API Platform Gateway Tier"]
    G1[Gateway Node A]
    G2[Gateway Node B]
  end

  subgraph Backends["Private Backends (VCN / On-Prem)"]
    OKE[OKE Microservices]
    VM[Compute VM API]
    ONP[On-Prem APIs<br/>via VPN/DRG]
  end

  subgraph ControlPlane["Control Plane"]
    MGR[API Platform Manager]
    ID[Oracle Identity<br/>(IAM/Identity)]
    OBS[Logging/Monitoring<br/>(varies by edition)]
  end

  C -->|HTTPS| WAF --> LB --> G1
  LB --> G2
  G1 -->|HTTPS/Private| OKE
  G1 --> VM
  G2 -->|DRG/VPN| ONP

  MGR -->|Config & Publish| G1
  MGR -->|Config & Publish| G2
  ID -->|Admin auth / OAuth config| MGR
  G1 --> OBS
  G2 --> OBS

8. Prerequisites

Because Oracle Cloud “API Platform” availability and onboarding can vary by account type, confirm prerequisites in official docs first.

Account/tenancy requirements

  • An Oracle Cloud account/tenancy with access to API Platform (or Oracle API Platform Cloud Service).
  • If API Platform is not available for new provisioning in your environment, consider using OCI API Gateway and treat this guide as conceptual plus migration guidance (verify Oracle’s current recommendation).

Permissions / IAM roles

You typically need: – Service admin privileges for API Platform – Ability to manage: – gateways / deployments – API definitions and policies – applications/consumers – Identity admin privileges may be required to configure OAuth clients/groups (depending on integration).

Exact role names differ by Oracle Cloud environment. Verify required roles in the official documentation for your API Platform edition.

Billing requirements

  • API Platform is generally a paid service (subscription or consumption). Ensure billing is enabled.

Tools

  • curl (or Postman) for testing
  • A text editor (VS Code)
  • Optional: OpenAPI tooling (swagger-cli, openapi-generator) for validation

Region availability

  • Region availability and provisioning model depend on your Oracle Cloud subscription type. Verify in official docs and your console.

Quotas/limits

Common limits to check (varies): – Number of gateways/nodes – Max request size / timeout – Rate limit ceilings – Number of APIs and versions – Analytics retention

Prerequisite services for the lab

  • A reachable backend endpoint (we’ll build a simple “hello” API)
  • Network access from gateway to backend (VCN routing/security rules as needed)
  • DNS name and TLS certificate for production-style exposure (optional for lab)

9. Pricing / Cost

Pricing model (how you are billed)

Oracle pricing for API Platform depends on the exact offering (for example, Oracle API Platform Cloud Service vs OCI-native gateway services). Pricing may be:

  • Subscription-based (monthly) and/or
  • Usage-based (requests/messages, gateway capacity, environments)

Because Oracle pricing and SKUs can change and can be region- and contract-dependent, do not rely on estimates without checking official sources.

Pricing dimensions to look for

When reviewing Oracle’s official pricing, look for dimensions such as:

  • Gateway runtime capacity (nodes/instances, OCPU, or equivalent)
  • API calls (requests/messages) per period
  • Environments (dev/test/prod) and included quotas
  • Analytics retention and log export costs (if applicable)
  • Optional add-ons (WAF, Load Balancer, private connectivity)

Free tier

Oracle Cloud Free Tier commonly covers certain OCI services (compute/networking), but API Platform itself may not be part of Free Tier. Verify in: – Oracle Cloud Free Tier overview: https://www.oracle.com/cloud/free/

Cost drivers (direct and indirect)

Direct – API Platform subscription or metered usage – Number of gateway nodes/instances – Traffic volume (API calls) – Advanced features (analytics, portal) if priced separately

Indirect – Data egress charges (internet outbound) depending on traffic patterns – OCI Load Balancer and WAF costs (if used) – Logging/monitoring storage and retention – Backend compute/OKE/database costs – Private connectivity (VPN/FastConnect) for hybrid backends

Network/data transfer implications

  • Inbound internet traffic is usually not charged; outbound (egress) often is.
  • If consumers are internet-based and responses are large, egress can become a major cost driver.
  • If backends are on-prem via VPN, consider bandwidth and availability costs.

How to optimize cost

  • Right-size gateway footprint for real traffic
  • Use rate limits and quotas to reduce abuse-driven costs
  • Minimize large response payloads (pagination/compression where supported)
  • Set appropriate log retention; export only required fields
  • Use WAF strategically (block abusive traffic early)
  • Separate dev/test with smaller capacity and lower retention

Example low-cost starter estimate (method, not numbers)

A realistic way to estimate a starter environment:

  1. Identify minimum gateway footprint for dev (1 gateway node/instance if allowed).
  2. Estimate monthly calls (e.g., 1–5 million calls/month for a small internal API program).
  3. Add optional edge components: – Load balancer (if required) – WAF (if public)
  4. Add observability costs: – log ingestion volume (requests/day × log size) – retention (days)

Then validate in Oracle’s pricing pages and calculator.

Example production cost considerations

For production, plan for: – Multiple gateway nodes for HA – WAF + Load Balancer (typical) – Higher log/metrics volume and retention – Separate environments and CI/CD pipelines – Private connectivity (DRG/VPN/FastConnect) if hybrid

Official pricing sources (start here)

  • Oracle Cloud pricing page: https://www.oracle.com/cloud/pricing/
  • Oracle Cloud price list: https://www.oracle.com/cloud/price-list/
  • Oracle Cloud cost estimator/calculator (if applicable for your offering): https://www.oracle.com/cloud/costestimator.html

For the exact “API Platform” SKU, search within the official price list for “API Platform” or “API Platform Cloud Service”, and verify current SKUs and metering units.


10. Step-by-Step Hands-On Tutorial

This lab focuses on a small, safe, low-cost workflow: publish a simple backend API through Oracle Cloud API Platform, secure it with an application credential (API key or similar, depending on what your API Platform edition supports), and test access.

Because API Platform provisioning and UI flows can vary by Oracle Cloud environment, this tutorial uses a hybrid approach: – Steps that are consistent and executable everywhere: building the backend and testing with curl – Steps that depend on your API Platform console: kept explicit but not overly UI-specific, with checkpoints and verification guidance

If you cannot provision API Platform in your tenancy, use this lab as a conceptual guide and verify Oracle’s recommended OCI-native alternative (often OCI API Gateway) in official docs.

Objective

  • Deploy a small backend “Hello API” service.
  • Register the backend in API Platform.
  • Publish an API via the API Platform Gateway.
  • Create an application/consumer and obtain credentials.
  • Call the API through the gateway endpoint and confirm policy enforcement.
  • Clean up resources.

Lab Overview

You will build:

  • A backend HTTP API (/hello) running on a small VM (or any reachable endpoint you control).
  • An API in API Platform that proxies /hello through the gateway.
  • An application registration that gets credentials.
  • A test call via curl.

Expected outcome: You can successfully call https://<gateway-host>/hello and receive JSON, and unauthorized calls fail with an auth error (401/403) or policy rejection.


Step 1: Create a backend “Hello API” service (Compute VM)

You need a backend endpoint reachable from the API Platform Gateway.

Option A (recommended for broad compatibility): OCI Compute VM + Python Flask

  1. Create a small Linux VM in Oracle Cloud Infrastructure (Free Tier eligible shapes may be available; verify in your region).
  2. Allow inbound TCP 8080 from the gateway network only (for production). For a lab, you may temporarily allow from your IP.

On the VM, install Python and run a tiny API:

sudo apt-get update
sudo apt-get install -y python3 python3-pip
pip3 install flask

Create app.py:

from flask import Flask, jsonify, request

app = Flask(__name__)

@app.get("/hello")
def hello():
    return jsonify({
        "message": "Hello from backend",
        "client_ip": request.remote_addr
    })

@app.get("/health")
def health():
    return jsonify({"status": "ok"})

if __name__ == "__main__":
    # Listen on all interfaces so the gateway can reach it
    app.run(host="0.0.0.0", port=8080)

Run it:

python3 app.py

Expected outcome: The backend is listening on http://<vm-private-or-public-ip>:8080.

Verify backend locally

From your laptop (if reachable):

curl -s http://<BACKEND_HOST>:8080/hello | jq .

If you don’t have jq:

curl -s http://<BACKEND_HOST>:8080/hello

Expected outcome: JSON with message: "Hello from backend".


Step 2: Prepare an OpenAPI definition (API contract)

Create hello-openapi.yaml locally:

openapi: 3.0.3
info:
  title: Hello API
  version: 1.0.0
servers:
  - url: https://example.invalid
paths:
  /hello:
    get:
      summary: Returns a hello message
      responses:
        "200":
          description: OK
          content:
            application/json:
              schema:
                type: object
                properties:
                  message:
                    type: string
                  client_ip:
                    type: string
  /health:
    get:
      summary: Health endpoint
      responses:
        "200":
          description: OK

Expected outcome: You have a minimal API contract to import into API Platform (or use as documentation).

Some API management products require a specific OpenAPI version or additional vendor extensions. If import fails, verify supported OpenAPI versions and import requirements in official API Platform docs.


Step 3: Create/register the backend in API Platform

In your API Platform console:

  1. Navigate to the section for Backends / Services / Implementations (naming varies).
  2. Create a backend/service with: – Name: hello-backendBase URL: http://<BACKEND_HOST>:8080Health URL (optional): /health
  3. Save.

Expected outcome: API Platform has a registered backend endpoint.

Verification checkpoint

Most platforms provide a “test connection” or “try it” for backends. If available: – Run a test call to /health. – Confirm you get 200 OK.

If there is no backend test tool, proceed and validate after gateway deployment.


Step 4: Create an API in API Platform and attach policies

  1. Go to APIs and create a new API: – Name: hello-apiVersion: 1.0
  2. Import the hello-openapi.yaml (if supported) or manually create resources/routes: – Route: GET /hello → backend hello-backend/hello
  3. Add security policy: – Choose API Key or OAuth 2.0/OIDC depending on what your API Platform edition supports. – For a beginner lab, API key is often simplest.

  4. Add a basic traffic policy (optional but recommended): – Rate limit, e.g., 60 requests/min per application (if supported).

Expected outcome: The API is defined with at least one route and an authentication requirement.

If you do not see API key or OAuth policies, your edition may have different features. Verify policy catalog in official docs and adapt accordingly.


Step 5: Deploy/publish the API to an API Platform Gateway

  1. Ensure you have at least one Gateway available and running.
  2. Select your API (hello-api) and choose Deploy/Publish to a gateway/environment: – Environment: dev (or your non-prod environment) – Gateway: select a gateway instance
  3. Confirm deployment.

Expected outcome: The gateway receives configuration and exposes an endpoint for your API.

Capture the gateway URL

You should end up with something like:

  • https://<gateway-hostname>/hello
    or
  • https://<gateway-hostname>/<basepath>/hello

Record: – Gateway base URLBase path (if applicable)


Step 6: Create an application/consumer and subscribe to the API

  1. Navigate to Applications / Consumers / Subscriptions (naming varies).
  2. Create an application: – Name: hello-client
  3. Subscribe the application to hello-api (if subscription is required by your platform model).
  4. Obtain the credentials: – API key, client ID/secret, or other token credentials

Expected outcome: You have credentials to call the API through the gateway.


Step 7: Call the API through the gateway

Test 1: Unauthorized call (should fail)

curl -i https://<GATEWAY_HOST><BASE_PATH>/hello

Expected outcome: A 401/403 (or policy rejection). The exact status code depends on policy configuration.

Test 2: Authorized call (should succeed)

If using an API key header (example header name; verify in your platform):

curl -s -H "X-API-Key: <YOUR_API_KEY>" \
  https://<GATEWAY_HOST><BASE_PATH>/hello

If your platform uses another header name or query parameter for API keys, use that method as documented by your API Platform console.

Expected outcome: 200 OK and JSON response from your backend.


Validation

Use this checklist:

  • Backend works directly:
  • curl http://<BACKEND_HOST>:8080/hello returns JSON
  • Gateway is reachable:
  • curl -i https://<GATEWAY_HOST><BASE_PATH>/health (if exposed)
  • Unauthorized call fails:
  • returns 401/403 (or policy error)
  • Authorized call succeeds:
  • returns 200 OK
  • Rate limit (if configured) works:
  • repeated calls eventually return 429 (if enabled)

A simple load test (be gentle in shared environments):

for i in $(seq 1 20); do
  curl -s -o /dev/null -w "%{http_code}\n" \
    -H "X-API-Key: <YOUR_API_KEY>" \
    https://<GATEWAY_HOST><BASE_PATH>/hello
done

Troubleshooting

1) Gateway returns 502/504

Likely causes – Backend not reachable from gateway network – Wrong backend URL/port – Backend firewall blocks gateway – Timeout too low

Fix – Verify backend is listening on 0.0.0.0:8080 – Check VCN security rules/NSGs to allow gateway-to-backend traffic – Confirm backend URL in API Platform matches reachable address (private IP vs public IP)

2) Unauthorized even with API key

Likely causes – Wrong header name or credential type – App not subscribed to the API – API deployed before policy changes

Fix – Verify the required header name and format in API Platform docs/portal – Confirm subscription is active – Redeploy the API after policy updates

3) 404 Not Found on gateway URL

Likely causes – Wrong base path – API not deployed to that gateway/environment – Route not defined

Fix – Check deployment status in API Platform – Confirm the gateway endpoint and base path – Verify route /hello exists and method is GET

4) TLS/certificate errors

Likely causes – Self-signed cert on gateway endpoint – Incorrect hostname

Fix – Use the correct DNS name – For lab-only testing you can do: bash curl -k -i https://<GATEWAY_HOST><BASE_PATH>/hello Do not use -k in production.


Cleanup

To avoid ongoing costs and reduce attack surface:

  1. Undeploy/unpublish hello-api from all gateways.
  2. Delete the application hello-client and revoke credentials.
  3. Delete the API definition and backend registration if no longer needed.
  4. Terminate the backend VM (Compute instance) and remove related networking rules.
  5. Remove any test certificates and DNS records created for the lab.

11. Best Practices

Architecture best practices

  • Use a clear API domain model: group APIs by domain/team, not by technology.
  • Keep backends private: expose only the gateway publicly; connect gateway to backends via private networking where possible.
  • Separate environments: dev/test/prod with controlled promotions and minimal cross-environment sharing.
  • Design for versioning: embed version strategy (/v1/ vs header-based) and document deprecation timelines.

IAM/security best practices

  • Least privilege: separate platform admins from API publishers; limit who can deploy to prod gateways.
  • Use centralized identity: prefer OAuth/OIDC with short-lived tokens for user-context calls.
  • Rotate credentials: API keys and client secrets should be rotated regularly and on incident.

Cost best practices

  • Start with minimal gateway footprint for dev/test.
  • Avoid excessive log verbosity in production; log what you need for audit and debugging.
  • Use quotas/rate limits to prevent abuse-driven cost spikes.
  • Control payload sizes with pagination and resource limits.

Performance best practices

  • Enforce request/response size limits to protect backends.
  • Keep policy chains minimal for hot paths; complex transformations add latency.
  • Use regional placement wisely: place gateways close to consumers or backends to reduce round-trip time (depending on your architecture).

Reliability best practices

  • Deploy multiple gateway nodes/instances for HA (where supported).
  • Use health checks and automated failover at the edge (LB/WAF).
  • Define timeouts and retry strategies carefully—avoid retry storms.

Operations best practices

  • Establish SLOs and dashboards: error rate, latency, 4xx/5xx breakdown, throttling events.
  • Run synthetic checks against key endpoints.
  • Use structured logging with correlation IDs (propagate X-Request-Id or equivalent).
  • Maintain an API inventory and ownership metadata.

Governance/tagging/naming best practices

  • Standardize naming: <domain>-<api>-<env> for gateways and routes.
  • Tag APIs by owner, cost center, data classification, and lifecycle state.
  • Require documentation and an operational runbook before publishing to prod.

12. Security Considerations

Identity and access model

  • Administrative access should use Oracle identity groups and strong MFA policies.
  • Separate:
  • platform admin (global)
  • environment operator (deploy to prod)
  • API owner (manage specific APIs)
  • read-only auditor

Encryption

  • In transit: enforce TLS from consumers to gateway.
  • Gateway to backend: use TLS where possible; for internal-only networks, still prefer TLS for sensitive data.
  • At rest: depends on how configuration and analytics are stored in your offering; verify encryption defaults in official docs.

Network exposure

  • Prefer: Internet → WAF/LB → Gateway → Private Backend
  • Avoid exposing backend services directly to the internet.
  • Restrict backend inbound rules to the gateway subnet/NSG.

Secrets handling

  • Do not store API keys or client secrets in source code.
  • Use a secrets manager solution available in Oracle Cloud (for OCI workloads, OCI Vault is common) and inject secrets at runtime.
  • Implement credential rotation procedures.

Audit/logging

  • Ensure administrative actions (API publish, policy changes, credential issuance) are auditable.
  • Centralize logs and protect them from tampering.
  • Set retention based on compliance needs.

Compliance considerations

Common compliance expectations for API programs: – strong access control and auditing – encryption in transit – data minimization and classification tags – incident response playbooks – documented retention policies

Common security mistakes

  • No rate limiting on public APIs (leads to abuse and outages)
  • Using long-lived static tokens without rotation
  • Allowing wildcard CORS unnecessarily
  • Logging sensitive data (tokens, PII) in access logs
  • Treating dev gateway as “safe” while leaving it publicly accessible

Secure deployment recommendations

  • Put WAF in front of public gateways (if appropriate).
  • Enforce strict authentication for all endpoints; avoid anonymous APIs unless truly public.
  • Apply per-consumer quotas and burst limits.
  • Use private networking to backends and restrict inbound rules.
  • Add automated tests for auth, rate limiting, and common misconfigurations.

13. Limitations and Gotchas

Because “API Platform” packaging can differ across Oracle Cloud environments, treat the following as common gotchas and verify specifics in official docs.

Known limitations (typical)

  • Not all OpenAPI constructs import cleanly; some require manual adjustments.
  • Some policy types may be limited or only available in certain editions.
  • Advanced traffic management (complex routing, canary, weighted routing) may not be supported natively.
  • Analytics granularity and retention may be limited.

Quotas

  • Max APIs, versions, and deployments can be capped.
  • Rate limit ceilings may exist.
  • Log retention may be capped or billed separately.

Regional constraints

  • Service availability can vary by region and account type.
  • Hybrid gateway placement may require additional network setup.

Pricing surprises

  • High log volumes can generate unexpected observability/storage costs.
  • Public API response egress can become expensive at scale.
  • Additional edge components (WAF/LB) are separate services with separate bills.

Compatibility issues

  • OAuth/OIDC integration requires careful alignment of issuer, audience, and token signing algorithms.
  • Header-based API keys can conflict with proxies/CDNs if headers are stripped or normalized.

Operational gotchas

  • Policy changes may require redeployment to gateways.
  • Rolling updates of gateway nodes may temporarily affect traffic if not HA.
  • Misconfigured timeouts can cause backend overload (if clients retry aggressively).

Migration challenges

  • Moving from API Platform to another gateway (or vice versa) requires:
  • mapping policies
  • converting API definitions and base paths
  • reissuing credentials
  • updating DNS/certificates
  • revisiting logging/analytics pipelines

Vendor-specific nuances

  • Identity integration details can vary (OCI IAM vs IDCS vs Oracle Cloud Identity). Verify which identity service your API Platform uses and how OAuth is configured.

14. Comparison with Alternatives

Nearest services in Oracle Cloud

  • OCI API Gateway: OCI-native gateway for publishing APIs.
  • Oracle Integration (OIC): integration platform; may expose integrations as APIs but has different primary goals.
  • OCI Load Balancer + Ingress (OKE): workable for simple routing but lacks full API management features.

Nearest services in other clouds

  • AWS API Gateway
  • Azure API Management
  • Google Apigee / API Gateway

Open-source / self-managed alternatives

  • Kong (Gateway + Kong Manager)
  • NGINX (plus API management add-ons)
  • Tyk
  • WSO2 API Manager
  • Envoy-based gateways

Comparison table

Option Best For Strengths Weaknesses When to Choose
Oracle Cloud API Platform Organizations needing centralized API management (governance + gateway) in Oracle Cloud environments Central policy/governance model, developer onboarding patterns, Oracle ecosystem alignment Availability and feature set can depend on edition; may be legacy in some orgs; verify roadmap When you already have it available and need full API management workflows
OCI API Gateway OCI-native API exposure Tight OCI integration, simpler provisioning, good fit for OCI workloads May not include full “portal + management” experience by default When standardizing on OCI-native services for new builds
Oracle Integration (OIC) Application and data integration Great for integrating SaaS/ERP systems; can expose integrations Not a dedicated APIM replacement When your primary requirement is integration orchestration, not API product management
AWS API Gateway AWS-based systems Mature, serverless, deep AWS integration AWS lock-in; pricing/limits differ When workloads are primarily on AWS
Azure API Management Azure-based systems Strong enterprise governance/portal features Azure lock-in; operational model differs When workloads are primarily on Azure
Apigee Large-scale API programs Strong API productization and analytics Cost and operational complexity When you need advanced enterprise APIM capabilities
Kong / Tyk / WSO2 (self-managed) Platform teams that want control and portability Flexible, portable, customizable You operate it: upgrades, scaling, security When you need cross-cloud/on-prem portability and can operate the platform

15. Real-World Example

Enterprise example: Regional bank partner API program

Problem A bank needs to expose secure partner APIs (account verification, payments initiation status, transaction lookup) while keeping core systems private and controlling partner traffic.

Proposed architecture – Public edge: OCI WAF → Load Balancer – API runtime: API Platform Gateways (HA) – Identity: Oracle identity integration for OAuth2 (partner client credentials) – Backends: core services on-prem via DRG/VPN, plus some OCI-hosted microservices – Observability: centralized logs/metrics with alerts on error rate and latency

Why API Platform was chosen – Central governance across many APIs and teams – Standardized OAuth and quota enforcement – API inventory and onboarding for multiple partners

Expected outcomes – Faster partner onboarding with consistent credentialing – Reduced outages from partner traffic spikes (rate limiting) – Improved audit readiness (central change control and usage visibility)


Startup/small-team example: SaaS public API for integrations

Problem A SaaS startup wants to publish a public API for customer integrations, but doesn’t want every service team to implement auth, throttling, and documentation.

Proposed architecture – Gateway endpoint: API Platform Gateway exposing /v1/* – Auth: API keys for initial rollout; roadmap to OAuth for enterprise customers – Backends: a small set of microservices (OKE or compute VMs) – CI/CD: automated deployment of API definitions and policies (where supported)

Why API Platform was chosen – Quick path to consistent API security and traffic control – Central place for API documentation and consumer onboarding (portal if available) – Ability to evolve backend without breaking client endpoints

Expected outcomes – Faster delivery of a stable API contract – Better customer experience through self-serve onboarding and predictable limits – Reduced operational incidents due to centralized throttling and monitoring


16. FAQ

1) Is “API Platform” the same as “OCI API Gateway”?
Not necessarily. Oracle Cloud has an API management offering historically known as API Platform (Oracle API Platform Cloud Service), and OCI also offers OCI API Gateway as an OCI-native service. Verify which one your tenancy provides and Oracle’s current recommendation.

2) Do I need API Platform if I already have a load balancer?
A load balancer handles traffic distribution and basic routing, but API Platform typically adds API-centric controls like authentication, quotas, developer onboarding, and API lifecycle governance.

3) Can API Platform front on-prem backends?
Commonly yes, using private connectivity (VPN/DRG/FastConnect) and network rules. Verify gateway deployment options and supported network patterns for your edition.

4) What authentication methods are supported?
Typically API keys and OAuth2/OIDC/JWT validation are common. Exact supported policies depend on your API Platform version/edition—verify in official docs.

5) How do I version APIs safely?
Use a clear versioning scheme (path-based like /v1/) and run overlapping support windows. Use API lifecycle states to communicate deprecation and timelines.

6) Should I expose the gateway publicly or keep it private?
For public APIs, the gateway is typically public (often behind WAF). For internal APIs, prefer private endpoints and private networking.

7) How do rate limits work?
Rate limits typically apply per consumer/application and/or per API. When exceeded, gateways return 429. Exact policy semantics vary—verify.

8) Where should I put WAF: before or after the gateway?
Typically before the gateway for public APIs, to block malicious traffic early. The gateway still enforces identity and API-specific policies.

9) Can API Platform transform requests/responses?
Many API gateways support basic transformations (headers, some payload manipulation). Capabilities vary; for complex transformations, consider doing it in backend services.

10) How do I migrate from an existing gateway to API Platform (or away from it)?
Inventory APIs, map policies, plan credential migration, and implement DNS cutover with careful testing. Expect differences in policy semantics and analytics.

11) Is API Platform suitable for GraphQL?
Some API management platforms support GraphQL; others treat it as generic HTTP. Verify GraphQL support in official docs before committing.

12) How do I secure backend services?
Keep them private, restrict inbound traffic to gateway networks, require backend auth if possible, and use TLS between gateway and backend.

13) What should I log?
At minimum: timestamp, request path/method, response status, latency, consumer/app ID, correlation ID. Avoid logging tokens or sensitive data.

14) How do I implement zero-downtime policy changes?
Use HA gateways, staged rollouts, and deploy changes first to non-prod. If your platform supports gradual rollout, use it; otherwise coordinate maintenance windows.

15) What’s the biggest operational risk with API management platforms?
Treating the gateway as “set and forget.” Gateways become critical infrastructure—monitor them, patch/update per Oracle guidance, and test policies like you test code.


17. Top Online Resources to Learn API Platform

Because Oracle product packaging can evolve, use these as starting points and always confirm the docs match your edition and environment.

Resource Type Name Why It Is Useful
Official documentation Oracle Cloud Documentation portal: https://docs.oracle.com/ Entry point for official product docs; search for “API Platform” and your exact service name
Official docs (search) Docs search for “API Platform Cloud Service”: https://docs.oracle.com/en/ Helps locate the API Platform-specific guide if your account uses that offering
Official pricing Oracle Cloud Pricing: https://www.oracle.com/cloud/pricing/ Understand Oracle’s pricing model and links to calculators
Official price list Oracle Cloud Price List: https://www.oracle.com/cloud/price-list/ Find the exact SKU/meter for “API Platform” (verify naming)
Cost estimator Oracle Cloud Cost Estimator: https://www.oracle.com/cloud/costestimator.html Build a cost estimate using official tooling (availability depends on service)
Free tier overview Oracle Cloud Free Tier: https://www.oracle.com/cloud/free/ Helps you design low-cost labs using free-eligible backend services
Architecture guidance Oracle Architecture Center: https://www.oracle.com/cloud/architecture-center/ Reference architectures for secure network patterns, WAF, and hybrid connectivity
Identity docs OCI IAM docs: https://docs.oracle.com/en-us/iaas/Content/Identity/home.htm Core identity model; useful when integrating OAuth and admin permissions
Networking docs OCI Networking docs: https://docs.oracle.com/en-us/iaas/Content/Network/Concepts/overview.htm VCN, subnets, NSGs, and hybrid networking patterns for gateway-to-backend connectivity
Security guidance OCI Security docs: https://docs.oracle.com/en-us/iaas/Content/Security/Concepts/securityoverview.htm Security best practices relevant to API exposure
Community learning Oracle Cloud Infrastructure blog: https://blogs.oracle.com/cloud-infrastructure/ Practical guidance and updates (verify relevance to API Platform)
Video learning Oracle YouTube channel: https://www.youtube.com/@Oracle Search for Oracle API management/API gateway content; confirm applicability

18. Training and Certification Providers

The following training providers may offer courses relevant to Oracle Cloud and API management. Verify current course catalogs on their websites.

Institute Suitable Audience Likely Learning Focus Mode Website
DevOpsSchool.com DevOps engineers, platform teams, architects DevOps, cloud fundamentals, automation, platform practices Check website https://www.devopsschool.com/
ScmGalaxy.com Students, beginners, DevOps practitioners DevOps basics, SCM, CI/CD, cloud introductions Check website https://www.scmgalaxy.com/
CLoudOpsNow.in Cloud engineers, operations teams Cloud operations, monitoring, reliability practices Check website https://cloudopsnow.in/
SreSchool.com SREs, operations, platform engineering SRE principles, observability, reliability engineering Check website https://sreschool.com/
AiOpsSchool.com Ops/SRE teams exploring AIOps AIOps concepts, automation, event correlation Check website https://aiopsschool.com/

19. Top Trainers

These sites are presented as training resources/platforms. Verify current offerings directly.

Platform/Site Likely Specialization Suitable Audience Website
RajeshKumar.xyz DevOps/cloud training and guidance (verify) Beginners to intermediate engineers https://rajeshkumar.xyz/
devopstrainer.in DevOps training resources (verify) DevOps engineers and students https://devopstrainer.in/
devopsfreelancer.com Independent DevOps consulting/training content (verify) Teams needing practical DevOps help https://devopsfreelancer.com/
devopssupport.in DevOps support and learning resources (verify) Operations/DevOps teams https://devopssupport.in/

20. Top Consulting Companies

These organizations may provide consulting services related to DevOps, cloud, and platform engineering. Verify service offerings and references directly.

Company Likely Service Area Where They May Help Consulting Use Case Examples Website
cotocus.com Cloud/DevOps consulting (verify) Platform automation, cloud migrations, operational improvements API gateway rollout planning, CI/CD for API definitions, observability setup https://cotocus.com/
DevOpsSchool.com DevOps and cloud consulting/training DevOps transformation, pipeline design, SRE practices Standardizing API deployment workflows, governance processes, runbooks https://www.devopsschool.com/
DEVOPSCONSULTING.IN DevOps consulting (verify) Delivery automation, infrastructure as code, operations API edge security patterns, environment separation, deployment automation https://devopsconsulting.in/

21. Career and Learning Roadmap

What to learn before API Platform

  • HTTP fundamentals: methods, status codes, headers, TLS
  • REST API design basics and common patterns
  • OpenAPI basics (reading and validating specs)
  • OAuth 2.0 / OIDC concepts (tokens, scopes, audiences)
  • Networking basics: DNS, subnets, firewall rules, private/public endpoints
  • Observability basics: logs vs metrics vs traces

What to learn after API Platform

  • Advanced API security (OWASP API Top 10, threat modeling)
  • CI/CD for APIs and policies (GitOps patterns where supported)
  • Performance engineering (latency budgets, load testing, caching strategies)
  • Multi-region resiliency and DR for API entry points
  • API product management practices (contract governance, deprecation, SLAs)

Job roles that use it

  • Cloud engineer / DevOps engineer
  • Platform engineer
  • Solutions architect
  • API architect
  • Security engineer (API security)
  • SRE / production operations

Certification path (if available)

Oracle’s certification landscape changes over time, and API Platform may not have a dedicated certification track. A practical approach: – Start with Oracle Cloud Infrastructure foundations certifications (verify current names). – Add security and networking certifications relevant to API exposure. – Use hands-on projects as proof of skill.

Verify Oracle’s current certification catalog here:
https://education.oracle.com/

Project ideas for practice

  1. Publish an internal API catalog with versioning and deprecation policy.
  2. Implement OAuth2-protected APIs with per-client quotas.
  3. Build a multi-environment pipeline that deploys API definitions and policies.
  4. Add WAF in front of public APIs and test common abuse patterns.
  5. Create an operational dashboard: 4xx/5xx, p95 latency, throttles, top consumers.

22. Glossary

  • API (Application Programming Interface): A contract and endpoint for programmatic access to a service.
  • API Management (APIM): Tools and processes to publish, secure, monitor, and govern APIs.
  • API Gateway: Runtime component that enforces policies and routes API requests to backends.
  • Control plane: Management layer where APIs and policies are configured and deployed.
  • Data plane: Runtime layer handling live traffic.
  • OAuth 2.0: Authorization framework used to obtain access tokens.
  • OIDC (OpenID Connect): Identity layer on top of OAuth 2.0 for authentication.
  • JWT (JSON Web Token): A signed token format commonly used for access tokens.
  • Rate limiting: Restricting the number of requests over time to protect systems.
  • Quota: A usage cap per consumer/application or per API.
  • WAF (Web Application Firewall): Security layer that filters malicious web/API traffic.
  • VCN (Virtual Cloud Network): OCI virtual network construct for isolated networking.
  • NSG (Network Security Group): OCI security rules applied to VNICs/resources.
  • DRG (Dynamic Routing Gateway): OCI component for connecting VCNs to on-prem or other networks.
  • SLO (Service Level Objective): Reliability target (latency, availability, error rate).
  • Egress: Outbound network traffic, often billable.

23. Summary

Oracle Cloud API Platform provides a centralized approach to API governance and runtime enforcement—typically combining a management/control plane, gateway runtimes, and consumer onboarding patterns. It matters because it standardizes how APIs are secured, rate-limited, monitored, and published, reducing duplicated effort and lowering operational risk.

Architecturally, it fits as the front door for APIs in Oracle Cloud and hybrid environments, often paired with identity services, VCN networking, and optional edge components like WAF and load balancing. Cost is driven by gateway capacity and API traffic volume, plus indirect costs like data egress and logging retention—so quotas, rate limits, and sensible observability practices are key.

Use API Platform when you need consistent API lifecycle management and centralized policy enforcement across teams. If API Platform availability is limited or your organization prefers OCI-native services for new builds, verify Oracle’s current guidance and consider OCI-native alternatives where appropriate.

Next step: confirm your tenancy’s API Platform offering and supported policy set in official Oracle docs, then repeat the lab using your real backend services and a production-grade network/security topology.