Apstrata Authentication Methods
In Apstrata, all requests must be authenticated. There are four methods for authenticating Apstrata requests:
The authentication roadmap for the Apstrata database includes optional replay prevention.
Authentication Methods Description
Apstrata services only accept authenticated requests. Authenticating an Apstrata service request means either sending it with the apsws.authSig parameter or with a valid value for the apsdb.token parameter.
- Creating the signature parameter for owner requests requires the developer to know their authentication key (apsws.authKey) and their authentication secret.
- Creating the signature parameter for user requests requires the developer to know their authentication key (apsws.authKey), the user login, and the user password.
- Generating tokens requires generating a user request to VerifyCredentials or generateToken in order to generate a token and then sending the token with every consecutive request in order to authenticate it. The token needs to be constantly renewed and requires re-authentication when its lifetime expires. The authentication key and the secret are provided upon registration. The user login and the password are chosen when creating an Apstrata user.
- Note that the secret works as a password for accessing our services suite and hence your data.
- Using a bearer token authentication enables users and devices to access protected resources without sending their credentials or tokens as parameters. Instead, users and devices can set in the Authorization header of any Apstrata HTTP request a bearer token that will be computed based on the application authentication key, their unique identifier and their
- Apstrata token.
Never reveal your authentication secret to a third party, an Apstrata database affiliate will never ask for your secret. In case you feel that your authentication secret has been compromised, you can generate a new one.