RETM APIs employ OAuth 2.0 with the client-credentials grant type to safeguard access to sensitive resources. This ensures that only authorized applications can interact with protected data. To access these resources, include a valid OAuth 2.0 bearer authentication token within the Authorization header of your HTTP requests.
What they are: Authentication tokens are encoded text strings that serve as proof of authorization for your application.
How to obtain them: To acquire a token, make a POST request to the /api/oAuth/token endpoint of the authentication API. Include your client ID and client secret within the request body.
Validity period: Tokens have a finite lifespan, determined by the specific RETM API environment you're using. The authentication API's response will specify the token's expiration time.
Renewing expired tokens: Upon expiration, you'll need to fetch a new token from the authentication API.
Importance of security: API credentials hold the keys to sensitive information; therefore, their secure storage is paramount.
Compromised credentials: If your credentials are exposed, the RETM integrations team will swiftly deactivate them and issue new ones to maintain security.