Authentication
Authentication method
We use the OAuth 2.0 authentication method, an industry standard for authorization, to ensure the security and integrity of user and system identification.
This method involves generating tokens that allow secure access to our servers, software, and APIs.
Authentication through OAuth 2.0 helps prevent cyber fraud and the leaking of confidential information by using public key cryptography to validate identities.
Creating Public and Private Keys
Before receiving the credential, it is necessary to generate a pair of keys: a private key and a public key. The private key will be used to sign the token, while the public key must be sent to us to validate the token signature.
First, generate the private key using the command below via terminal:
Later, generate the public key via terminal:
Public key request
We will ask for your email to open a request regarding the sending of the public key.
After that, you will receive a message from notifications@heflo.com with instructions for sending the key.
Receiving the client_id
After validating your public key, our team will generate and send your client_id
, which will be used for authentication in the system.
JWT Generation
Generate a TOKEN following the RS256 standard, containing crucial information such as unique identifier, issuance time and expiration.
Bearer Token Generation Endpoint
To generate a TOKEN using the OAuth 2.0 method, the client must send a POST request with the Content-Type Header “x-www-form-urlencoded”, below the CURL of the endpoint that will be used to generate the token:
<JWT Token>
with the token generated in the previous step.After authentication, the access token obtained must be used in all subsequent requests in the authorization header.