API Calling Methods
Authentication Mode |
Severity Level |
Authorization and Authentication Mechanism |
Calling Method |
Example Calling Method |
Description |
---|---|---|---|---|---|
(Recommended) App authentication |
High |
After an API is authorized to an app, the key pair (AppKey and AppSecret) of the app is used for security authentication. |
|
App authentication and SDKs are recommended, which can help you easily and quickly obtain open data through data APIs. |
|
IAM authentication |
Medium |
After an API is authorized to an account using an IAM app or whitelist, the user token obtained from IAM is used for security authentication. |
API tool: You need to call the API for obtaining a user token through password authentication to obtain a token, and then use an API tool to call the API. |
Using an API Tool to Call an API Which Uses IAM Authentication |
IAM authentication can be used when an API tool is used to call APIs. |
None |
Low |
No authorization is required. All users can access APIs. |
|
It is recommended that the non-authentication mode be used only for testing APIs. If the caller is not a trusted user, there is a risk of data leakage, breakdowns caused by high concurrent access, SQL injection, and others. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot