Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Published by Scroll Versions from space DEV and version r0642

...

API access tokens can be acquired and applied to your requests to obscure sensitive Personally Identifiable Information (PII) and are compliant with common privacy and security standards. These tokens last for a preconfigured time period and can be renewed as needed.

Tip

Tip: API access tokens are the preferred method of authentication.


Info

NOTE: This feature may need to be enabled in your instance of the

D s platform
. For more information, see Enable API Access Tokens.

Tip

Tip: API access tokens are the preferred method of authentication.


Basic Steps:

  1. You submit a request to create a new access token.
    1. You can create and delete access tokens through the Settings area of the 
      D s webapp
      . See Access Tokens Page.
    2. You can create access tokens through the REST API endpoint.

      1. If you do not have a valid access token, you must submit your request to the endpoint using one of the other forms of authentication.
      2. If you do have a valid access token, you can use it with your submission to generate a new access token.
      3. See API AccessTokens Create v4.

  2. With each request, you submit the token as part of the Authorization header. 
  3. Continue using the token. As needed, you can create and use additional tokens. There is no limit to the number of tokens you can create.

...