The X-API-Key HTTP header needs to be used from now on to secure the API endpoints in a simple way. The first step is to implement a PHP script that will generate an API key in the form of a hash given a password and a salt. This will allow to verify whether an incoming API key has been created using the expected password and salt.
The
X-API-Key
HTTP header needs to be used from now on to secure the API endpoints in a simple way. The first step is to implement a PHP script that will generate an API key in the form of a hash given a password and a salt. This will allow to verify whether an incoming API key has been created using the expected password and salt.See:
Happy coding!