Authentication
  • 1 minute to read
  • Dark
    Light
  • PDF

Authentication

  • Dark
    Light
  • PDF

Article summary

Authentication mechanisms play a crucial role in ensuring the security of your system. They provide a robust way to verify and establish trust between various applications, confirming their identities and permissions to access and manage sensitive data, secrets, and related functions within the system.

senhasegura’s A2A APIs support OAuth v1.0, OAuth v2.0, and AWS authentication methods.

Info

senhasegura recommends the use of OAuth v2.0 authentication for enhanced security.

Following senhasegura's recommendation to use OAuth v 2.0 as the authentication method, each request made to the A2A APIs must include the Client ID, the Client Secret, and the Access Token.

The request URI follows this pattern:

https://senhasegura/iso/*MODULE*/*FUNCTION*
Here's what each part represents:

  • MODULE: A2A senhasegura's function module.
  • FUNCTION: the module's specific function.

For example, when creating a device in PAM Core, the URI format is:

POST /iso/pam/device

In this case:

  • POST is the HTTP method to create the device.

  • Before /iso, enter the appliance URI.

  • pam represents senhasegura’s PAM Core module.

  • device represents the module’s function.

For more information on how to authenticate an application, access the How to authenticate an application document.


Was this article helpful?