Authentication is a critical component of securing your API endpoints. Below are the primary methods supported by our platform:

1. OAuth 2.0

OAuth 2.0 is widely used for delegated access.

OAuth_2_0
- **Use Case**: Third-party applications accessing user data - **Documentation**: [Learn more about OAuth 2.0 configuration](/en/Documentation/API/OAuth_Configuration)

2. API Key

API keys are simple yet effective for server-to-server authentication.

API_Key
- **Use Case**: Client applications with static credentials - **Best Practice**: Store keys securely and rotate them regularly

3. JWT (JSON Web Token)

JWT provides stateless authentication through encrypted tokens.

JWT
- **Use Case**: Web and mobile applications - **Documentation**: [Explore JWT implementation details](/en/Documentation/API/JWT_Implementation)

4. Basic Auth

Basic authentication uses username/password pairs encoded in Base64.

Basic_Auth
- **Use Case**: Simple internal tools - **Security**: Always use HTTPS to prevent interception

Security Best Practices

  • 🔒 Validate all tokens and keys before processing requests
  • ⚠️ Disable deprecated authentication methods in production
  • 🔄 Implement rate limiting to prevent brute force attacks

For deeper insights, check our Authentication Overview. 📘