Authentication and Authorization

1. Authentication (will be extended)

The API can only be used over an encrypted HTTPS channel. Every request is authenticated by an API-Key and a username with its password with the OAuth 2.0 authorization protocol.

See also the authentication and token provision sequence diagram :

To keep the access simple and uncomplicated, the single API is provided under