Tutorials

API Security Platform Overview

Overview of the 42Crunch API Security Platform, how to get started and the general dashboard layout.

Login and Dashboard

To log into the platform, go to https://platform.42crunch.com/login

A successful login takes you to your dashboard and the landing page of the platform. From here you can immediately start creating API collections, importing API definitions, or check your profile settings.

login-dashboard-2 (Custom)
42Crunch-Dashboard-sq (Custom)
lg-dash (Custom)

Platform Functions

A unique thing about 42Crunch Platform is that we give you a comprehensive solution that is applicable not only to runtime protection but to each and every step of the API lifecycle.

42Crunch Platform offers three main features:

  • API Contract Security Audit: This is a static analysis of OpenAPI (Swagger) definitions, something that you would likely use during API design, development, and testing, or with your pull request reviews and your CI/CD pipelines.
  • API Contract Conformance Scan: This is the dynamic testing of the actual API implementation. This function is very applicable in penetration testing, CI/CD pipelines and your test procedures.
  • API Protection: This lets you tailor runtime protection for your API and put a micro firewall in the line of traffic to protect your live API endpoints from malicious attacks.

Navigation Basics

Navigation basics The following image shows:

(1) At the top left, you can find links to documentation and support for your convenience.

(2) At the top right, you can click your name to manage your profile or create API tokens for external integrations.

(3) The gear icon shows the actions you can perform on the API (or API collection) you are working on.

dash-nav (Custom)
collections (Custom)

Getting Started with Collections

Getting started with API collections In 42Crunch Platform, APIs are organized in collections. You can create collections when you import API definitions, or even before that, just click API Collections in the main menu on the left. For example, you could group APIs into collections by department, project, or source code. You can control who has access to APIs across your company to allow for easier collaboration and reporting.

Latest Resources

WEBINAR

OWASP BOLA, BA, BOPLA: wie man sie finded und behebt

3. Juli 2025 | 10 Uhr MESZ

Wir werden verstehen wie die OWASP API Top 3 von Hackern genutzt werden um Daten aus Unternehmen zu stehlen und wie man sie schon während der Implementierung findet und beheben kann.

BLOG

Bridging the API Security Gap – The Perception and Reality of API Security

By Hugh Carroll | June 9, 2025

What is the API Security Gap? A recent report from Akamai as covered in the apisecurity.io newsletter, corroborates earlier findings from a report we commissioned of EMA Enterprise Management Associates into enterprise adoption patterns of API security technologies. Both studies indicate that while there is a broad recognition […]

DataSheet

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. 42Crunch makes developers’ and security practitioners' lives easier by protecting APIs, with a platform that automates security into the API development pipeline and gives full oversight of security policy enforcement at every stage of the API lifecycle.

Secure Your APIs Today

#1 API security platform