GN HIP API Governance

Version: 1.0
Last Updated: July 7, 2025
Applies to: Internal and external consumers of GN APIs hosted on Azure API Management


Overview

GN’s APIs are built to be secure, scalable, and standards-compliant. This document provides guidance and governance rules that all internal and external application developers must follow when integrating with our APIs through Azure API Management (APIM).


Getting Started

To begin consuming GN APIs, follow these steps:

  1. Register your application with GN’s API Gateway team.
  2. Receive your Client ID and Client Secret.
  3. Implement authentication using OAuth 2.0 Client Credentials Flow.
  4. Review and adhere to API schema and format standards.
  5. Monitor key rotation schedules and integrate secure token management.

Authentication and Authorization

GN APIs are secured using industry-standard OAuth 2.0. All clients are required to authenticate before accessing protected resources.

OAuth 2.0 Client Credentials Flow

We use the Client Credentials Grant Flow for machine-to-machine communication. This flow requires a client application to authenticate using its Client ID and Client Secret to obtain an access token.

Token lifetime: 1 hour
Grant Type: client_credentials
Audience / Scope: Defined per API

Learn more: Microsoft Identity Platform - Client Credentials Flow

OAuth flow diagram

Token Management

Bypassing OAuth

OAuth bypass is allowed only under exceptional circumstances with a documented and approved justification. In such cases:

External Partner Authentication


Data Standards and Formats

Supported Data Types

FormatDescription
JSONPreferred for modern APIs
XMLSupported for legacy and structured
TextSupported for simple key-value data

EDI Standards

For transactional and B2B flows, we support the following EDI document formats:

Communication Protocols

ProtocolUse Case
AS2Secure, reliable B2B communication
HTTPSDefault transport for all API transactions
TLS Mutual AuthCertificate-based authentication supported

Security and Credential Rotation

Credential security is paramount. All secrets and keys must be rotated on a defined schedule.

Credential TypeRotation FrequencyNotes
OAuth Client SecretEvery 90 days5-day early distribution to external partners
Subscription KeyEvery 90 daysUsed only with explicit approval
❗ Rotation policies must be automated where possible using DevOps pipelines or Azure Key Vault integration.

API Schema Validation


Best Practices


Contact and Support

© 2025 GN Corporation. All rights reserved.