...
API access tokens can be acquired and applied to your requests to obscure sensitive Personally Identifiable Information (PII) and are compliant with common privacy and security standards. These tokens last for a preconfigured time period and can be renewed as needed.
Tip |
---|
Tip: API access tokens are the preferred method of authentication. |
Info | |
---|---|
NOTE: This feature may need to be enabled in your instance of the
|
Tip |
---|
Tip: API access tokens are the preferred method of authentication. |
Basic Steps:
- You submit a request to create a new access token.
- You can create and delete access tokens through the Settings area of the
. See Access Tokens Page.D s webapp You can create access tokens through the REST API endpoint.
- If you do not have a valid access token, you must submit your request to the endpoint using one of the other forms of authentication.
- If you do have a valid access token, you can use it with your submission to generate a new access token.
- See API AccessTokens Create v4.
- You can create and delete access tokens through the Settings area of the
- With each request, you submit the token as part of the
Authorization
header. - Continue using the token. As needed, you can create and use additional tokens. There is no limit to the number of tokens you can create.
...