Endpoints and identifier keys
What is the problem we are addressing? The act of receiving keys from REST requests coming from the outside world into an application presents a well-known security issue. Indeed, if a hacker understands the logic behind the keys, for example, GET:customerInfo?id=23, they could easily access information about other customers by simply modifying the identifier value….