On API Keys
satya - 2/4/2015, 11:18:03 AM
What is API Key Management?
What is API Key Management?
satya - 2/4/2015, 11:22:40 AM
Using Stormpath for API Authentication
satya - 2/4/2015, 11:23:36 AM
Here is its introduction
In this guide, we discuss how to set up Stormpath to manage and authenticate API Keys and Tokens for developers that are using your API Services. Stormpath provides not only the user management piece around API Keys, but also allows you to associate permissions and custom data with the accounts for advanced use-cases.
satya - 2/4/2015, 11:28:17 AM
sotrmpath apigee mashery
sotrmpath apigee mashery
satya - 2/4/2015, 12:58:21 PM
API keys and client side signatures
API keys and client side signatures
satya - 2/4/2015, 12:58:33 PM
Security limitations of API keys
Security limitations of API keys
satya - 2/4/2015, 4:18:34 PM
How do API keys work?
How do API keys work?
satya - 2/4/2015, 4:20:35 PM
what is the difference between a password and an API key?
what is the difference between a password and an API key?
Search for: what is the difference between a password and an API key?
satya - 2/4/2015, 4:25:06 PM
Here is REST authentication from Amazon S3
satya - 2/4/2015, 4:25:40 PM
Some details on this idea
The Amazon S3 REST API uses a custom HTTP scheme based on a keyed-HMAC (Hash Message Authentication Code) for authentication. To authenticate a request, you first concatenate selected elements of the request to form a string. You then use your AWS secret access key to calculate the HMAC of that string. Informally, we call this process "signing the request," and we call the output of the HMAC algorithm the signature, because it simulates the security properties of a real signature. Finally, you add this signature as a parameter of the request by using the syntax described in this section.
When the system receives an authenticated request, it fetches the AWS secret access key that you claim to have and uses it in the same way to compute a signature for the message it received. It then compares the signature it calculated against the signature presented by the requester. If the two signatures match, the system concludes that the requester must have access to the AWS secret access key and therefore acts with the authority of the principal to whom the key was issued. If the two signatures do not match, the request is dropped and the system responds with an error message.