Authentication

最終更新日:2024-04-01 15:16:13

1 Feature Intro

1.1 Brief Inrtoduction

Verifies the credibility of the request with dynamic token, a cloud-based verification method based on the self-developed authentication algorithm, to intercept the request from imposters.

2 Feature Detail

2.1 Authentication

It is a security risk to directly expose the API assets to the public Internet. Therefore, you should divide the permissions of the API and perform an authentication on the API requests. If the authentication is passed, the API request is allowed to be processed. Otherwise, the API request will be rejected.

API Shield provide the authenticaiton feature for you protect your sensitive API assets, which token based authenticaiton and its algorithm is developed by CDNetworks.

2.2 How It Works

Once you enable the authentication,API Shield will provide the authentication key for you. The device of the end user should generate the authentication value based on the authentication key and the given aigorithm.
When the end user request to the API assets with authtication value, API Shield will verify whether the value is correct or not. If not, the request will be blocked.

China Premium Service控制台自助配置功能上线