Creating and Deploying an API
- 
  
    About the API Gateway development environmentDescribes the API Gateway development environment. 
- 
  
    Configuring the development environmentDescribes how to configure your development environment for API development. 
- 
  
    Creating an APIDescribes how to create an API. 
- 
  
    Creating an API configDescribes how to create an API config using OpenAPI. 
- 
  
    Configuring a gRPC serviceDescribes how to create an API config using a gRPC service definition. 
- 
  
    Deploying an API to a gatewayDescribes how to deploy an API config to a gateway. 
- 
  
    Passing data to and from the backend serviceDescribes how to pass data to the backend service and receive data back. 
Troubleshooting & Monitoring
- 
  
    Troubleshooting overviewProvides general troubleshooting information. 
- 
  
    Monitoring your APIDescribes how to monitor the health of APIs using the logs and metrics Endpoints maintains for you automatically. 
- 
  
    Tracing your APIExplains the trace sampling rate, how to estimate your cost for Cloud Trace, how to view the traces in the Cloud console, and how to disable trace sampling. 
- 
  
    Accessing audit logsDescribes the audit logs created by API Gateway as part of Cloud Audit Logs. 
Authentication & API Keys
- 
  
    Choosing an Authentication MethodProvides an overview and sample use cases for each supported authentication method. 
- 
  
    Using JWT to authenticate usersProvides an overview of user authentication using JSON Web Token (JWT). 
- 
  
    Using Firebase to authenticate usersProvides an overview of user authentication using Firebase. 
- 
  
    Using AuthO to authenticate usersProvides an overview of user authentication using AuthO. 
- 
  
    Using Okta to authenticate usersProvides an overview of user authentication using Okta. 
- 
  
    Using GoogleID tokens to authenticate usersProvides an overview of user authentication using GoogleID tokens. 
- 
  
    Authentication between servicesDescribes how to use service accounts to authenticate human or machine users. 
- 
  
    Securing backend servicesDescribes how to secure your backend services and grant the roles and permissions your gateway needs to access those services.