Introduction - Common Methods
- 02 Oct 2024
-
DarkLight
-
PDF
Introduction - Common Methods
- Updated on 02 Oct 2024
-
DarkLight
-
PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Common Authentication Techniques
The common methods of configuration you can use for adapter authentication include:
- Basic Authentication: This is the inclusion of a username and password in every request.
- Static Token: This is when you get an API key or other item from the system that needs to be included in every request you make to that system. Ideally, this item has a long-to-indefinite life so that you do not have to spend time getting and updating the item.
- Two-Step Token: This is a process where a call is made to get "dynamic" or changing information from the other system and then utilizing this information on subsequent calls to that system. The information provided often has an expiration that is short as compared to static tokens. The initial request to get the information usually includes one of the other types of authentication (e.g. credentials or some form of static information). Additionally, there are some standards for Two-Step Token, including OAuth.
- MSA Authentication: This is a process where several calls are made to get the authentication information that will be used for the actual call the adapter is trying to make. Often information from a prior call will be used in the next call and information in the actual call may include authentication information from 1 or all of the authentication calls.
Was this article helpful?