This document is also available in these non-normative format: pdf
This document is licensed under
Creative Commons Attribution 4.0 International Public License
This document contains a normative standard for designing APIs in the Dutch Public Sector. The Governance of this standard is described by the API-Standaarden beheermodel in a separate repository and published by Logius. This document is part of the Nederlandse API Strategie, which consists of a set of documents.
As well as sections marked as non-normative, all authoring guidelines, diagrams, examples, and notes in this specification are non-normative. Everything else in this specification is normative.
The key words MAY, MUST, MUST NOT, NOT RECOMMENDED, SHOULD, and SHOULD NOT in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.
This is a draft that could be altered, removed or replaced by other documents. It is not a recommendation approved by TO.
Organization / Committee | Version number | Official status | Date |
---|---|---|---|
Geonovum | 17-01-2020 | proposed version | 17-01-2020 |
Forum Standaardisatie | 1.0 | reported | 15-10-2019 |
Forum Standaardisatie | 1.0 | 'comply of explain' standard (mandatory open standard) | 09-07-2020 |
Working group | 2.0.0-rc.1 | working version / final draft by 'Working Group' | 05-09-2023 |
KP API Steering committee | 2.0.0-rc.1 | approved consultation version / adopted by 'KP API' | 21-09-2024 |
MIDO programmeringstafel | 2.0.0-rc.2 | release candidate 2 / definitief concept | 14-02-2024 |
MIDO PGDI Committee | 2.0.0-rc.2 | definitive version / approved by 'PGDI' | 07-03-2024 |
Forum Standaardisatie | 2.0.0-rc.2 | reported | 25-01-2024 |
Forum Standaardisatie | 2.0.0 | intake started | 18-04-2024 |
Forum Standaardisatie | 2.0.1 | updated version with fixes in permalinks and fixes in the how-to-test descriptions |
end of 2024 |
Forum Standaardisatie | 2.0.1 | definitive version / approved by Forum Standaardisatie | Currently in progress |
This section is non-normative.
More and more governmental organizations offer REST APIs (henceforth abbreviated as APIs), in addition to existing interfaces like SOAP and WFS. These APIs aim to be developer-friendly and easy to implement. While this is a commendable aim, it does not shield a developer from a steep learning curve getting to know every new API, in particular when every individual API is designed using different patterns and conventions.
This document aims to describe a widely applicable set of design rules for the unambiguous provisioning of REST APIs. The primary goal is to offer guidance for organizations designing new APIs, with the purpose of increasing developer experience (DX) and interoperability between APIs. Hopefully, many organizations will adopt these design rules in their corporate API strategies and provide feedback about exceptions and additions to subsequently improve these design rules.
This version of the design rules has been submitted to Forum Standaardisatie for inclusion on the Comply or Explain list of mandatory standards in the Dutch Public Sector. This document originates from the document API Strategie voor de Nederlandse Overheid, which was recently split into separate sub-documents.
This document is part of the Nederlandse API Strategie.
The Nederlandse API Strategie consists of a set of distinct documents.
Status | Description & Link |
---|---|
Informative | Inleiding NL API Strategie |
Informative | Architectuur NL API Strategie |
Informative | Gebruikerswensen NL API Strategie |
Normative | API Design Rules (ADR v2.0) |
Normative | Open API Specification (OAS 3.0) |
Normative | NL GOV OAuth profiel |
Normative | Digikoppeling REST API koppelvlak specificatie |
Normative module | GEO module v1.0 |
Normative module | Transport Security module v1.0 |
Before reading this document it is advised to gain knowledge of the informative documents, in particular the Architecture.
An overview of all current documents is available in this Dutch infographic:
Design rules can be technical rules, which should be tested automatically and functional rules which should be considerd when designing and building the api.
The REST architectural style is centered around the concept of a resource. A resource is the key abstraction of information, where every piece of information is named by assigning a globally unique URI (Uniform Resource Identifier). Resources describe things, which can vary between physical objects (e.g. a building or a person) and more abstract concepts (e.g. a permit or an event).
/core/naming-resources: Use nouns to name resources
This is different than RPC-style APIs, where verbs are often used to perform certain actions:
A resource describing a single thing is called a singular resource. Resources can also be grouped into collections, which are resources in their own right and can typically be paged, sorted and filtered. Most often all collection members have the same type, but this is not necessarily the case. A resource describing multiple things is called a collection resource. Collection resources typically contain references to the underlying singular resources.
/core/naming-collections: Use plural nouns to name collection resources
Example collection resources, describing a list of things:
https://api.example.org/v1/gebouwen
https://api.example.org/v1/vergunningen
Singular resources contained within a collection resource are generally named by appending a path segment for the identification of each individual resource.
Example singular resource, contained within a collection resource:
https://api.example.org/v1/gebouwen/3b9710c4-6614-467a-ab82-36822cf48db1
https://api.example.org/v1/vergunningen/d285e05c-6b01-45c3-92d8-5e19a946b66f
Singular resources that stand on their own, i.e. which are not contained within a collection resource, MUST be named with a path segment that is written in the singular form.
Example singular resource describing the profile of the currently authenticated user:
https://api.example.org/v1/gebruikersprofiel
/core/interface-language: Define interfaces in Dutch unless there is an official English glossary available
/core/no-trailing-slash: Leave off trailing slashes from URIs
404
(not found) error response and not a redirect. This enforces API consumers to use the correct URI.
URI without a trailing slash (correct):
https://api.example.org/v1/gebouwen
URI with a trailing slash (incorrect):
https://api.example.org/v1/gebouwen/
/
).
/core/hide-implementation: Hide irrelevant implementation details
Although the REST architectural style does not impose a specific protocol, REST APIs are typically implemented using HTTP [rfc9110].
/core/http-methods: Only apply standard HTTP methods
Method | Operation | Description |
---|---|---|
GET |
Read | Retrieve a resource representation for the given URI. Data is only retrieved and never modified. |
POST |
Create | Create a subresource as part of a collection resource. This operation is not relevant for singular resources. This method can also be used for exceptional cases. |
PUT |
Create/update | Create a resource with the given URI or replace (full update) a resource when the resource already exists. |
PATCH |
Update | Partially updates an existing resource. The request only contains the resource modifications instead of the full resource representation. |
DELETE |
Delete | Remove a resource with the given URI. |
Request | Description |
---|---|
GET /rijksmonumenten |
Retrieves a list of national monuments. |
GET /rijksmonumenten/12 |
Retrieves an individual national monument. |
POST /rijksmonumenten |
Creates a new national monument. |
PUT /rijksmonumenten/12 |
Modifies national monument #12 completely. |
PATCH /rijksmonumenten/12 |
Modifies national monument #12 partially. |
DELETE /rijksmonumenten/12 |
Deletes national monument #12. |
The HTTP specification [rfc9110] offers a set of standard methods, where every method is designed with explicit semantics. HTTP also defines other methods, e.g. HEAD
, OPTIONS
, TRACE
, and CONNECT
.
The OpenAPI Specification 3.0 Path Item Object also supports these methods, except for CONNECT
.
According to RFC 9110 9.1 the GET
and HEAD
HTTP methods MUST be supported by the server, all other methods are optional.
In addition to the standard HTTP methods, a server may support other optional methods as well, e.g. PROPFIND
, COPY
, PURGE
, VIEW
, LINK
, UNLINK
, LOCK
, UNLOCK
, etc.
If an optional HTTP request method is sent to a server and the server does not support that HTTP method for the target resource, an HTTP status code 405 Method Not Allowed
shall be returned and a list of allowed methods for the target resource shall be provided in the Allow
header in the response as stated in RFC 9110 15.5.6.
/core/http-safety: Adhere to HTTP safety and idempotency semantics for operations
Method | Safe | Idempotent |
---|---|---|
GET |
Yes | Yes |
HEAD |
Yes | Yes |
OPTIONS |
Yes | Yes |
POST |
No | No |
PUT |
No | Yes |
PATCH |
No | No |
DELETE |
No | Yes |
/core/http-response-code: Adhere to HTTP status codes to convey appropriate errors
The server SHOULD NOT only use 200
for success and 404
for error states. Use the semantically appropriate status code for success or failure.
In case of an error, the server SHOULD NOT pass technical details (e.g. call stacks or other internal hints) to the client. The error message SHOULD be generic to avoid revealing additional details and expose internal information which can be used with malicious intent.
One of the key constraints of the REST architectural style is stateless communication between client and server. It means that every request from client to server must contain all of the information necessary to understand the request. The server cannot take advantage of any stored session context on the server as it didn’t memorize previous requests. Session state must therefore reside entirely on the client.
To properly understand this constraint, it's important to make a distinction between two different kinds of state:
It's a misconception that there should be no state at all. The stateless communication constraint should be seen from the server's point of view and states that the server should not be aware of any session state.
Stateless communication offers many advantages, including:
/core/stateless: Do not maintain session state on the server
The client of a REST API could be a variety of applications such as a browser application, a mobile or desktop application and even another server serving as a backend component for another client. REST APIs should therefore be completely client-agnostic.
Resources are often interconnected by relationships. Relationships can be modelled in different ways depending on the cardinality, semantics and more importantly, the use cases and access patterns the REST API needs to support.
/core/nested-child: Use nested URIs for child resources
When modelling resources for a news platform including the ability for users to write comments, it might be a good strategy to model the collection resources hierarchically:
https://api.example.org/v1/articles/123/comments
The platform might also offer a photo section, where the same commenting functionality is offered. In the same way as for articles, the corresponding sub-collection resource might be published at:
https://api.example.org/v1/photos/456/comments
These nested sub-collection resources can be used to post a new comment (POST
method) and to retrieve a list of comments (GET
method) belonging to the parent resource, i.e. the article or photo. An important consideration is that these comments could never have existed without the existence of the parent resource.
From the consumer's perspective, this approach makes logical sense, because the most obvious use case is to show comments below the parent article or photo (e.g. on the same web page) including the possibility to paginate through the comments. The process of posting a comment is separate from the process of publishing a new article. Another client use case might also be to show a global latest comments section in the sidebar. For this use case, an additional resource could be provided:
https://api.example.org/v1/comments
If this would have not been a meaningful use case, this resource should not exist at all. Because it doesn't make sense to post a new comment from a global context, this resource would be read-only (only GET
method is supported) and may possibly provide a more compact representation than the parent-specific sub-collections.
The singular resources for comments, referenced from all 3 collections, could still be modelled on a higher level to avoid deep nesting of URIs (which might increase complexity or problems due to the URI length):
https://api.example.org/v1/comments/123
https://api.example.org/v1/comments/456
Although this approach might seem counterintuitive from a technical perspective (we simply could have modelled a single /comments
resource with optional filters for article and photo) and might introduce partially redundant functionality, it makes perfect sense from the perspective of the consumer, which increases developer experience.
/core/resource-operations: Model resource operations as a sub-resource or dedicated resource
goedgekeurd
that can be modified by issuing a PATCH
request against the resource. Drawback of this approach is that the resource does not contain any metadata about the operation (when and by whom was the approval given? Was the submission declined in an earlier stage?). Furthermore, this requires a fine-grained authorization model, since approval might require a specific role./inzendingen/12/beoordelingen
and add an approval or declination by issuing a POST
request. To be able to retrieve the review history (and to consistently adhere to the REST principles), also support the GET
method for this resource. The /inzendingen/12
resource might still provide a goedgekeurd
boolean attribute (same as approach 1) which gets automatically updated on the background after adding a review. This attribute SHOULD however be read-only./search
or /_search
. Depending on the operation characteristics, GET
and/or POST
method MAY be supported for such a resource.An API is as good as the accompanying documentation. The documentation has to be easily findable, searchable and publicly accessible. Most developers will first read the documentation before they start implementing. Hiding the technical documentation in PDF documents and/or behind a login creates a barrier for both developers and search engines.
/core/doc-openapi: Use OpenAPI Specification for documentation
/core/doc-openapi-contact: Document contact information for publicly available APIs
info.contact
object for publicly available APIs. Contact information SHOULD NOT be a generic contact address for the whole organisation.
info.contact
MAY be provided.
Relevant contact information can include an email address and issue tracker.
{
"name": "Gebouwen API beheerder",
"url": "https://www.github.com/ministerie/gebouwen/issues",
"email": "teamgebouwen@ministerie.nl"
}
/core/doc-language: Publish documentation in Dutch unless there is existing documentation in English
/core/publish-openapi: Publish OAS document at a standard location in JSON-format
Clients (such as Swagger UI or ReDoc) MUST be able to retrieve the document without having to authenticate. Furthermore, the CORS policy for this URI MUST allow external domains to read the documentation from a browser environment.
The standard location for the OAS document is a URI called openapi.json
or openapi.yaml
within the base path of the API. This can be convenient, because OAS document updates can easily become part of the CI/CD process.
At least the JSON format MUST be supported. When having multiple (major) versions of an API, every API SHOULD provide its own OAS document(s).
An API having base path https://api.example.org/v1
MUST publish the OAS document at:
https://api.example.org/v1/openapi.json
Optionally, the same OAS document MAY be provided in YAML format:
https://api.example.org/v1/openapi.yaml
Changes in APIs are inevitable. APIs should therefore always be versioned, facilitating the transition between changes.
/core/deprecation-schedule: Include a deprecation schedule when deprecating features or versions
/core/transition-period: Schedule a fixed transition period for a new major API version
/core/uri-version: Include the major version number in the URI
v
. This allows the exploration of multiple versions of an API in the browser. The minor and patch version numbers are not part of the URI and MAY not have any impact on existing client implementations.
An example of a base path for an API with current version 1.0.2:
https://api.example.org/v1
version: '1.0.2'
servers:
- description: test environment
url: https://api.test.example.org/v1
- description: production environment
url: https://api.example.org/v1
/core/changelog: Publish a changelog for API changes between versions
When releasing new (major, minor or patch) versions, all API changes MUST be documented properly in a publicly available changelog.
/core/semver: Adhere to the Semantic Versioning model when releasing API changes
major.minor.patch
template (examples: 1.0.2, 1.11.0). Pre-release versions MAY be denoted by appending a hyphen and a series of dot separated identifiers (examples: 1.0.2-rc.1, 2.0.0-beta.3). When releasing a new version which contains backwards-incompatible changes, a new major version MUST be released. Minor and patch releases MAY only contain backwards compatible changes (e.g. the addition of an endpoint or an optional attribute).
/core/version-header: Return the full version number in a response header
Since the URI only contains the major version, it's useful to provide the full version number in the response headers for every API call. This information could then be used for logging, debugging or auditing purposes. In cases where an intermediate networking component returns an error response (e.g. a reverse proxy enforcing access policies), the version number MAY be omitted.
The version number MUST be returned in an HTTP response header named API-Version
(case-insensitive) and SHOULD not be prefixed.
An example of an API version response header:
API-Version: 1.0.2
This section describes security principles, concepts and technologies to apply when working with APIs. Controls need to be applied for the security objectives of integrity, confidentiality and availability of the API (which includes the services and data provided thereby). The architecture section of the API strategy contains architecture patterns for implementing Transport security.
The scope of this section is limited to generic security controls that directly influence the visible parts of an API. Effectively, only security standards directly applicable to interactions are discussed here.
In order to meet the complete security objectives, every implementer MUST also apply a range of controls not mentioned in this section.
Note: security controls for signing and encrypting of application level messages are part of separate extensions: Signing and Encryption.
/core/transport/tls: Secure connections using TLS
One should secure all APIs assuming they can be accessed from any location on the internet. Information MUST be exchanged over TLS-based secured connections. No exceptions, so everywhere and always. This is required by law.
One MUST follow the latest NCSC guidelines [NCSC 2021].
Since the connection is always secured, the access method can be straightforward. This allows the application of basic access tokens instead of encrypted access tokens.
The usage of TLS is machine testable. Follow the latest NCSC guidelines on what is required to test. The serverside is what will be tested, only control over the server is assumed for testing. A testing client will be employed to test adherence of the server. Supporting any protocols, algorithms, key sizes, options or ciphers that are deemed insufficient or phased out by NCSC will lead to failure on the automated test. Both positive and negative scenarios are part of the test: testing that a subset of *Good* and *Sufficient* configurations are supported and configurations deemed *Insufficient* or marked for *Phase out*. A manual exception to the automated test results can be made when configurations designated for *Phase out* are supported; The API provider will have to provide clear documentation regarding the phase out schedule.
/core/transport/no-sensitive-uris: No sensitive information in URIs
Even when using TLS connections, information in URIs is not secured. URIs can be cached and logged outside of the servers controlled by clients and servers. Any information contained in them should therefore be considered readable by anyone with access to the network (in the case of the internet, the whole world) and MUST NOT contain any sensitive information. This includes client secrets used for authentication, privacy sensitive information suchs as BSNs or any other information which should not be shared.
Be aware that queries (anything after the '?' in a URI) are also part of an URI.
The guidelines and principles defined in this section are client agnostic. When implementing a client agnostic API, one SHOULD at least facilitate that multi-purpose generic HTTP-clients like browsers are able to securely interact with the API. When implementing an API for a specific client it may be possible to limit measures as long as it ensures secure access for this specific client. Nevertheless it is advised to review the following security measures, which are mostly inspired by the OWASP REST Security Cheat Sheet.
Even while remaining client agnostic, clients can be classified in four major groups. This is in line with common practice in The OAuth 2.0 Authorization Framework. The groups are:
This section contains elements that apply to the generic classes of clients listed above. Although not every client implementation has a need for all the specifications referenced below, a client agnostic API SHOULD provide these to facilitate any client to implement relevant security controls.
Most specifications referenced in this section are applicable to the first three classes of clients listed above. Security considerations for native applications are provided in OAuth 2.0 for Native Apps, much of which can help non-OAuth2 based implementations as well. For browser-based applications a subsection is included with additional details and information. System-to-system (sometimes called machine-to-machine) may have a need for the listed specifications as well. Note that different usage patterns may be applicable in contexts with system-to-system clients, see above under Client Authentication.
Realizations may rely on internal usage of HTTP-Headers. Information for processing requests and responses can be passed between components, that can have security implications. For instance, this is common practice between a reverse proxy or TLS-offloader and an application server. Additional HTTP headers are used in such example to pass an original IP-address or client certificate.
Implementations MUST consider filtering both inbound and outbound traffic for HTTP-headers used internally. Primary focus of inbound filtering is to prevent injection of malicious headers on requests. As for outbound filtering, the main concern is leaking of information.
/core/transport/security-headers: Use mandatory security headers in API all responses
There are a number of security related headers that can be returned in the HTTP responses to instruct browsers to act in specific ways. However, some of these headers are intended to be used with HTML responses, and as such may provide little or no security benefits on an API that does not return HTML. The following headers SHOULD be included in all API responses:
Header | Rationale |
---|---|
Header | Rationale |
Cache-Control: no-store |
Prevent sensitive information from being cached. |
Content-Security-Policy: frame-ancestors 'none' |
To protect against drag-and-drop style clickjacking attacks. |
Content-Type |
To specify the content type of the response. This SHOULD be application/json for JSON responses. |
Strict-Transport-Security |
To require connections over HTTPS and to protect against spoofed certificates. |
X-Content-Type-Options: nosniff |
To prevent browsers from performing MIME sniffing, and inappropriately interpreting responses as HTML. |
X-Frame-Options: DENY |
To protect against drag-and-drop style clickjacking attacks. |
Access-Control-Allow-Origin |
To relax the 'same origin' policy and allow cross-origin access. See CORS-policy below |
The headers below are only intended to provide additional security when responses are rendered as HTML. As such, if the API will never return HTML in responses, then these headers may not be necessary. You SHOULD include the headers as part of a defense-in-depth approach if there is any uncertainty about the function of the headers, the types of information that the API returns or information it may return in the future.
Header | Rationale |
---|---|
Content-Security-Policy: default-src 'none' |
The majority of CSP functionality only affects pages rendered as HTML. |
Feature-Policy: 'none' |
Feature policies only affect pages rendered as HTML. |
Referrer-Policy: no-referrer |
Non-HTML responses SHOULD not trigger additional requests. |
In addition to the above listed HTTP security headers, web- and browser-based applications SHOULD apply Subresource Integrity. When using third-party hosted contents, e.g. using a Content Delivery Network, this is even more relevant. While this is primarily a client implementation concern, it may affect the API when it is not strictly segregated or for example when shared supporting libraries are offered.
The precense of the mandatory security headers can be tested in an automated way. A test client makes a call to the API root. The response is tested for the precense of mandatory headers.
/core/transport/cors: Use CORS to control access
Modern web browsers use Cross-Origin Resource Sharing (CORS) to minimize the risk associated with cross-site HTTP-requests. By default browsers only allow 'same origin' access to resources. This means that responses on requests to another [scheme]://[hostname]:[port]
than the Origin
request header of the initial request will not be processed by the browser. To enable cross-site requests API's can return a Access-Control-Allow-Origin
response header. An allowlist SHOULD be used to determine the validity of different cross-site request. To do this check the Origin
header of the incoming request and check if the domain in this header is on the whitelist. If this is the case, set the incoming Origin
header in the Access-Control-Allow-Origin
response header.
Using a wildcard *
in the Access-Control-Allow-Origin
response header is NOT RECOMMENDED, because it disables CORS-security measures. Only for an open API which has to be accessed by numerous other websites this is appropriate.
Tests of this design rule can only be performed when the intended client is known to the tester. A test can be performed when this information is provided by the API provider. Otherwise no conclusive test result can be reached.
A specific subclass of clients are browser-based applications, that require the presence of particular security controls to facilitate secure implementation. Clients in this class are also known as user-agent-based or single-page-applications (SPA). All browser-based application SHOULD follow the best practices specified in OAuth 2.0 for Browser-Based Apps. These applications can be split into three architectural patterns:
A REST request or response body SHOULD match the intended content type in the header. Otherwise this could cause misinterpretation at the consumer/producer side and lead to code injection/execution.
406 Not Acceptable
or 415 Unsupported Media Type
.@consumes("application/json"); @produces("application/json")
.
This avoids XXE-attack vectors for example.It is common for REST services to allow multiple response types (e.g. application/xml
or application/json
, and the client specifies the preferred order of response types by the Accept header in the request.
Accept
header to the Content-type
header of the response.406 Not Acceptable
response) if the Accept header does not specifically contain one of the allowable types.Services (potentially) including script code (e.g. JavaScript) in their responses MUST be especially careful to defend against header injection attack.
application/json
and not application/javascript
.Geospatial data refers to information that is associated with a physical location on Earth, often expressed by its 2D/3D coordinates.
/core/geospatial: Apply the geospatial module for geospatial data
Referenced in: