Introduction - Common Methods
  • 08 Nov 2022
  • Dark
    Light
  • PDF

Introduction - Common Methods

  • Dark
    Light
  • PDF

Article Summary

Common Authentication Techniques

The common methods of configuration you can use for adapter authentication include:

  • Basic Authentication: This is the inclusion of a username and password in every request.
  • Static Token: This is when you get an API key or other item from the system that needs to be included in every request you make to that system. Ideally, this item has a long-to-indefinite life so that you do not have to spend time getting and updating the item.
  • Two-Step Token: This is a process where a call is made to get "dynamic" or changing information from the other system and then utilizing this information on subsequent calls to that system. The information provided often has an expiration that is short as compared to static tokens. The initial request to get the information usually includes one of the other types of authentication (e.g. credentials or some form of static information). Additionally, there are some standards for Two-Step Token, including OAuth.

Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.