Features
Anonymization & Pseudonymization
Protect sensitive data by anonymizing or pseudonymizing it before it is stored or processed. HARP Proxy provides tools for data masking, tokenization, and encryption, ensuring that personal information is kept confidential and secure.
Read more about anonymization & pseudonymization use cases...
Audit Trail
Track and log all service interactions to ensure transparency, compliance, and accountability. HARP Proxy captures detailed information about requests and responses, enabling you to monitor and analyze service activity effectively.
Caching
Improve performance and reduce latency by storing frequently accessed data in cache. HARP Proxy implements a RFC-9111 compliant cache system that can store data in various storages, from SQL to Key-Value stores like Redis.
Dashboard
Monitor your external API calls using the aggregated and detailed view of the HARP Proxy dashboard. All transactions are stored for future analysis and troubleshooting, for a configurable amount of time.
Rules Engine
Define and enforce custom rules for request routing, transformation, and security. HARP Proxy allows you to create rules that match specific criteria and execute actions based on those rules, giving you fine-grained control over how requests are handled.
Storage
Store and retrieve data from various storage systems, including databases, object stores, and caches. HARP Proxy supports multiple storage backends, allowing you to read and write data to different systems based on your application's needs.
Read the documentation
The documentation to the latest version is always the more up-to-date source of information. Read more about the features of HARP Proxy in the official documentation. If you feel adventurous, you can even read the next version documentation for sneak peaks.