Our authentication and authorization process relies heavily on the endpoint since it enables us to confirm the legitimacy of the merchant requesting access to our services.

  1. Payloads and Headers: Your API key and merchant ID are two necessary payloads that must be provided in order to access this endpoint and prove your identity. By using these credentials as authentication, our server is able to confirm your identity. These delicate credentials are sent in the request headers rather than the request body in order to maintain security. Credential header inclusion is a common method for secure communication.
  2. Request and Response: Our server responds to your request for this endpoint with the necessary headers, which must include the secret key and merchant ID. The process of authentication is handled by our server. If your credentials are legitimate, the server will reply with a success code of "0", signifying that your authentication was successful. On the other hand, the server responds with the proper error code if the provided credentials are wrong or invalid.
  3. Access Token: The server creates an access token, which functions as a bearer token, following successful authentication. This access token, which reflects your authenticated identity, is a distinct, transitory, and encrypted string. You can make additional queries to other endpoints on our platform using this token. The token is a form of authorization included in the request headers that enables the server to confirm that subsequent requests are made by an authenticated and authorized merchant.
  4. Further Calls: Now that you have the access token, you can make calls to other endpoints on our platform by including the token in the request headers. To confirm that the merchant is permitted to carry out the desired operation, each request is compared to the access token. This procedure maintains data security and integrity while offering convenient and secure access to numerous services and resources.

Overall, this authentication and authorization process makes sure that only reputable merchants with legitimate credentials may access and use the resources on our platform.

It provides a solid basis for a secure and dependable merchant experience on our platform by assisting in preventing unwanted access and any security breaches.

Sample response
JSON

                                {
    "response_code": 0,
    "response_message": "Successful",
    "data": {
        "auth": {
            "access_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpYXQiOjE3MTUwMTc4MTMsImV4cCI6MTcxNTEwNDIxMywiaXNzIjoiaHR0cDovL2xvY2FsaG9zdC9tZXNzYWdpbmcvIiwiZGF0YSI6eyJtZXJjaGFudF9pZCI6bnVsbCwibWVyY2hhbnRfbmFtZSI6bnVsbCwibWVyY2hhbnRfZW1haWwiOm51bGwsIm1lcmNoYW50X3Bob25lIjpudWxsLCJtZXJjaGFudF9hZGRyZXNzIjpudWxsLCJlbnZpcm9ubWVudCI6bnVsbH19.GF7oKstLNHqTd9qJCvzRrvKNXlIVgVN9w3JDsJAV4Ow",
            "access_expiry": 1715104213
        }
    }
}