All API endpoints are authenticated using OAuth 2.0 standards. A client Id and client secret must be exchanged for a shortlived access token. This access token is then used to authenticate further requests.
The following diagram illustrates the authentication flow with Pipevest.
Access Token Request
Authenticate Requests with Token
Granular scopes are yet to be implemented. All tokens are scoped to have both
READ
and WRITE
permissions
Name | Permission | Status |
---|---|---|
read | Read access across all resources | ACTIVE |
write | Write access across all resources | ACTIVE |
Learn how to use HTTP signatures to improve API integrity
All API endpoints are authenticated using OAuth 2.0 standards. A client Id and client secret must be exchanged for a shortlived access token. This access token is then used to authenticate further requests.
The following diagram illustrates the authentication flow with Pipevest.
Access Token Request
Authenticate Requests with Token
Granular scopes are yet to be implemented. All tokens are scoped to have both
READ
and WRITE
permissions
Name | Permission | Status |
---|---|---|
read | Read access across all resources | ACTIVE |
write | Write access across all resources | ACTIVE |
Learn how to use HTTP signatures to improve API integrity