On API Keys

satya - 2/4/2015, 11:18:03 AM

What is API Key Management?

What is API Key Management?

Search for: What is API Key Management?

satya - 2/4/2015, 11:22:40 AM

Using Stormpath for API Authentication

Using Stormpath for API Authentication

satya - 2/4/2015, 11:23:36 AM

Here is its introduction

In this guide, we discuss how to set up Stormpath to manage and authenticate API Keys and Tokens for developers that are using your API Services. Stormpath provides not only the user management piece around API Keys, but also allows you to associate permissions and custom data with the accounts for advanced use-cases.

satya - 2/4/2015, 11:28:17 AM

sotrmpath apigee mashery

sotrmpath apigee mashery

Search for: sotrmpath apigee mashery

satya - 2/4/2015, 12:55:35 PM

More on API keys from apigee

More on API keys from apigee

satya - 2/4/2015, 12:58:21 PM

API keys and client side signatures

API keys and client side signatures

Search for: API keys and client side signatures

satya - 2/4/2015, 12:58:33 PM

Security limitations of API keys

Security limitations of API keys

Search for: Security limitations of API keys

satya - 2/4/2015, 4:18:34 PM

How do API keys work?

How do API keys work?

Search for: How do API keys work?

satya - 2/4/2015, 4:18:41 PM

Here is SOF discussion

Here is SOF discussion

satya - 2/4/2015, 4:20:35 PM

what is the difference between a password and an API key?

what is the difference between a password and an API key?

Search for: what is the difference between a password and an API key?

satya - 2/4/2015, 4:25:06 PM

Here is REST authentication from Amazon S3

Here is REST authentication from Amazon S3

satya - 2/4/2015, 4:25:40 PM

Some details on this idea

The Amazon S3 REST API uses a custom HTTP scheme based on a keyed-HMAC (Hash Message Authentication Code) for authentication. To authenticate a request, you first concatenate selected elements of the request to form a string. You then use your AWS secret access key to calculate the HMAC of that string. Informally, we call this process "signing the request," and we call the output of the HMAC algorithm the signature, because it simulates the security properties of a real signature. Finally, you add this signature as a parameter of the request by using the syntax described in this section.

When the system receives an authenticated request, it fetches the AWS secret access key that you claim to have and uses it in the same way to compute a signature for the message it received. It then compares the signature it calculated against the signature presented by the requester. If the two signatures match, the system concludes that the requester must have access to the AWS secret access key and therefore acts with the authority of the principal to whom the key was issued. If the two signatures do not match, the request is dropped and the system responds with an error message.