Authentication
This section explains how to authenticate requests to access our API using API keys.
Overview
Our API requires authentication to ensure secure access to resources. The primary method of authentication is through an API Key, which must be included in each request to validate the user’s identity and permissions.
Obtaining an API Key
Currently, the self-service option to create API keys is unavailable. If you require an API key, please reach out to our team directly.
Contact: [email protected]
Our team will guide you through the setup process and provide the necessary keys to access the API.
note
Keep your API key information secure. Do not share it with others or expose it publicly.
Making Authenticated Requests
To authenticate a request, include the following headers in each API request:
- Cs-Access-Key: Your unique API
access_key. - Cs-Signature: A signature generated from your
secret_key(explained below). - Cs-Timestamp: The current timestamp (in seconds since Unix epoch).
- Cs-Passphrase: The
pass_phraseyou set when creating the API key.
Here’s an example of how these headers might look in a request:
Signature Generation
To ensure request integrity, you must generate a signature by hashing your request with the secret_key. Here’s how to create the signature:
- Concatenate the
Cs-Timestamp, request method (e.g.,GETorPOST), request path, and request body as a single string. - Hash this string using HMAC-SHA256 with your
secret_key.
Example (Ruby)
Here’s a Ruby code snippet to generate the signature:
Example Request (cURL)
Here’s an example of an authenticated request using curl:
By following these steps, you can securely access our API and perform authorized requests. For more details on specific endpoints and permissions, refer to our API Explorer.