Eti-Intelligence Logo
Home / Knowledge Base / Authentication / Authentication Guide
Authentication

Authentication Guide

Comprehensive guide to authenticating API requests

Updated: March 10, 2025
4 min read
Beginner
#security #authentication #tokens

All our API services require authentication using a Bearer token in the Authorization header. This guide covers different authentication methods and best practices for securing your API access.

Authentication Methods

We support multiple authentication methods:


  • API Key Authentication
  • Bearer Token
  • OAuth 2.0 for more complex scenarios

API Key Authentication

API key authentication is the simplest method. Include your API key in the Authorization header of each request:



Authorization: Api-Key YOUR_API_KEY



This method is suitable for server-to-server communications where you can securely store your API key.

Bearer Token Authentication

For more secure applications, use bearer token authentication:



Authorization: Bearer YOUR_TOKEN



Tokens have configurable expiration times and can be revoked if compromised.

OAuth 2.0 Authentication

For applications that need to access user data or perform actions on behalf of users, use OAuth 2.0:


  1. Register your application in the Developer Portal
  2. Implement the OAuth 2.0 flow to obtain access tokens
  3. Include the token in your API requests

Best Practices

  • Never expose authentication credentials in client-side code
  • Implement proper token rotation and expiration handling
  • Use the principle of least privilege when assigning permissions
  • Regularly audit and rotate your API keys

Need Help?

Can't find what you're looking for or have additional questions?

Contact Support

Was this article helpful?

Need Personalized Assistance?

Our support team is ready to help you resolve any outstanding questions.