Token Based Authentication
REST authentication is done using a security hash which is constructed using a public identifier of the client, a secret key of the client, a GUID, a timestamp of the request and the parameters sent with the request. This prevents unauthorized usage of the API and replay and other abuse of requests.
Requests will always have to authenticate. Read more about Authenticated Connection here.
Each authenticated request to the REST API must contain the following four headers in the request:
|x-axw-rest-identifier||Shared identifier of the secret key defined for this client in the Administration Toolkit of the ADOXX-based product.|
|x-axw-rest-guid||A GUID to ensure uniqueness of the request.|
|x-axw-rest-timestamp||The timestamp when the request was sent by the client. The header parameter 'x-axw-rest-timestamp' needs to be a UTC long value in milliseconds.|
|x-axw-rest-token||Hashed security token to ensure validity of the request. For generation example, see details below table.|
The algorithm for calculating the hashed security token consists of the following steps:
- Get the secret key matching to the identifier sent via the x-axw-rest-identifier header.
- Take all request parameter names and put them into a collection.
- Take all request parameter values as strings and put them into the same collection.
- Take the header names x-axw-rest-identifier, x-axw-rest-guid and x-axw-rest-timestamp and put them into the collection.
- Take the values of the x-axw-rest-identifier, x-axw-rest-guid and x-axw-rest-timestamp headers as well as the secret key and put them into the collection.
- Sort this collection using Locale en_US.
- Convert each item of the collection into a byte array using UTF-8
encoding. (So in the end the whole collection should be converted
- Append all items of the byte array collection into a single byte array in the order of their sorting.
- Convert the secret key into a byte array using UTF-8 encoding.
- Create a new HMac instance using SHA-512 algorithm.
- Initialize the HMac instance using the secret key byte array.
- Finalize the HMac using the byte array containing all parameters and headers/parameters.
- Get the resulting byte array of the HMac.
- Convert the byte array into a Base64 encoded string using UTF-8 encoding.