Authentication

Authentication starts with requesting access and being given a username and password.

In order to process the data, there are certain business rules adapted to authenticate and validate the data. Security of data is crucial.

Token authentication is an HTTP authentication scheme using security tokens. These are called "bearer" tokens, because they allow access to the bearer of the token. The token is a unique string of characters tied to your specific username and password.

🚧

Tokens are valid for a limited amount of time and will need to be refreshed.

To obtain the token, enter the username and password provided for the authentication and authorization request. Once the authentication process is successful, a token is generated. This token will be required for further processing.

Authentication Examples

Once you have the credentials, you are ready to create the token.

The authorization token is a Bearer Token accessed via a Post call.

{
  "userName": "myUser",
  "password": "password"
}

See the example below of a successful call:

The Bearer token value is shown in the accessToken string. The expiration date is indicated at the bottom of the results.

📘

Remember to add the string “Bearer” to the beginning of the authorization header when using this token.

❗️

If the credentials are entered incorrectly, the results will indicate Unauthorized with a status code of 401.