In the API Manager, you can use API keys to authenticate your APIs and applications. The API Manager generates the API keys and enable you to add API key-based authentication to your APIs. Validation using API keys is a type of security you can enforce while creating an API. Applications ...
If you must re-use an application in a new PlayFab Title ID, please be sure to first unlink all accounts from Facebook, or delete all users in the first Title ID. Note: If the user is authenticated with AuthenticationToken, instead of AccessToken, the GetFriendsList ...
These applications can silently acquire a token by using integrated Windows authentication. Applications running on a device without a browser can still call an API on behalf of a user. To authenticate, the user must sign in on another device that has a web browser. This scenario requires that...
These applications can silently acquire a token by using integrated Windows authentication. Applications running on a device without a browser can still call an API on behalf of a user. To authenticate, the user must sign in on another device that has a web browser. This scenario requires that...
REST API Authentication TypesThe section provides complementary information with regard to all UFM REST APIs.Exposing site_name Field in REST API In addition to the existing REST API, users can configure the UFM to expose the site_name (configurable) field in all the supported REST APIs. The...
This module uses basic authentication, which is the HTTP protocol’s built-in authentication support. The web server issues a client request for username and password, and sends that information back to the server as part of the authorized request. Access Manager retrieves the username and passwor...
Querying the Historical Versions of Files Performing Batch Operations REST Getting Started Preparations Configuring App Information in AppGallery Connect Accessing Drive Kit App Development Function Description Obtaining Authentication Information Obtaining User Information Managing and Searching for...
5. Token-based authentication Token-based authentication enables users to log in to accounts using a physical device, such as a smartphone, security key or smart card. It can be used as part of MFA or to provide a passwordless experience. With token-based authentication,users verify credentials...
The process of verifying that the bot can access the user's resources. If the first step is successful then a token based on the user's credentials is issued. In the second step, the bot uses the token to access the user's resources.For more information, see User authentication....
In a world where most activities are done digitally, protecting sensitive data is of utmost importance. One of the ways to do this is by verifying identities within the network, done through what we call authentication