Overview
HMAC Authentication - For business API integrations
HMAC-based authentication is used for the external Client API. Every request to a /client endpoint must be signed with your secret key using HMAC-SHA256.
Key Features
- API Keys - Public identifier for your business
- Secret Keys - Used to sign requests (never exposed)
- Timestamp Validation - Prevents replay attacks
- Request Signing - HMAC-SHA256 signature of body + timestamp
π Learn about HMAC Authentication
Quick Start
For Client API Access
- Generate API Keys - Create API keys in your business dashboard
- Sign Requests - Generate HMAC signature for each request
- Send Headers - Include
X-API-Key,X-Signature, andX-Timestampheaders
Security Best Practices
- Never expose tokens or keys in code repositories
- Use HTTPS only for all API requests
- Handle token expiration with automatic refresh
- Store credentials securely (environment variables, secret managers)
- Rotate keys regularly for enhanced security