We allow two methods of authenticating users: API keys and HTTP Bearer tokens.
API Key authorization is the mechanism to be used by external applications. API keys will typically be long-lived, as such they should be kept secret and treated like any other password.
Authorization is performed by providing the API key in an
HTTP Bearer token authorization is the mechanism to be used for other types of clients. Depending on the token scope, these tokens may provide access to all endpoints.
Bearer tokens must be obtained and refreshed through our identity provider.
Authorization is performed by providing the bearer token in an Authorization header, for example:
Authorization: Bearer <token>.
Updated 3 months ago