Security
Overview
The API's are secured based on API Keys that will be provided by us during the provisioning stage. The function key will allow access and the software key is a named key that links up the relevant product.
Name | Type | Description | Example Keys |
---|---|---|---|
header | X-Functions-Key | Function Api Key | ABCdefgHiJKlm0n1OpQrStuVwxyzAbcDefg123fwGerH1Pfsdfnbfd== |
header | X-Software-Key | Software Key for this Integration | CompanyA |