We use the OAuth 2.0 authentication method, an industry standard for authorization, to ensure the security and integrity of user and system identification.

This method involves generating tokens that allow secure access to our servers, software, and APIs.

Authentication through OAuth 2.0 helps prevent cyber fraud and the leaking of confidential information by using public key cryptography to validate identities.

1

Creating Public and Private Keys

Before receiving the credential, you need to generate a pair of keys: a private key and a public key.

The private key will be used to sign the token, while the public key must be sent to us to validate the token signature.

First, generate the private key using the command below via terminal:

openssl genrsa -out private.pem 2048

Then generate the public key through the terminal:

openssl rsa -in private.pem -pubout > public.pem
Keep the private key in a safe place and never share it.
2

Public key request

We will ask for your email address to open a request for sending the public key.

After that, you will receive a message from notifications@heflo.com with instructions for sending the key.

Please only send your public key to our team for validation by replying to the HEFLO request email, without adding other people as a copy for safety. If other people are copied, this will invalidate the receipt of the public key.

3

Receiving client_id

After validating your public key, our team will generate and send your client_id, which will be used for authentication in the system.

4

Generation of JWT

Generate a TOKEN following the RS256 standard, containing crucial information such as unique identifier, issuance time and expiration.

const tokenHeader = {
  alg: "RS256", // 'alg': Algoritmo usado para assinar o token (RS256 - RSA com SHA-256).
  typ: "JWT"    // 'typ': Tipo do token, no caso, JWT.
};

const tokenPayload = {
  jti: "5e8e07e3-d3f0-4881-a644-0895f4949e9b", // 'jti': ID único do token.
  sub: "client_id", // 'sub': Identificador do cliente (preencher com o client_id enviado pelo nosso time).
  iat: 1573648398, // 'iat': Data e hora em que o token foi emitido (timestamp UNIX em segundos).
  nbf: 1573648398, // 'nbf': Data e hora antes da qual o token não deve ser aceito (timestamp UNIX).
  exp: 1573648458, // 'exp': Data de expiração do token (timestamp UNIX).
  iss: "client_id", // 'iss': Emissor do token (preencher com o client_id enviado pelo nosso time).
  aud: "https://auth.moneyp.dev.br/connect/token" // 'aud': Destinatário do token (verifica se o token é enviado ao servidor correto).
};
5

Bearer Token Generation Endpoint

To generate a TOKEN using the OAuth 2.0 method, the client must send a POST request with the Content-Type Header “x-www-form-urlencoded”, below is the CURL of the endpoint that will be used to generate the token:

curl --location 'https://auth.moneyp.dev.br/connect/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Cache-Control: no-cache' \
--data-urlencode 'grant_type=client_credentials' \
--data-urlencode 'client_id=client_id' \
--data-urlencode 'scope=bmp.digital.api.full.access' \
--data-urlencode 'client_assertion= "<< Token JWT >>"' \ // JWT generated on the last step.
--data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer'

After authentication, the obtained access token must be used in all subsequent requests in the authorization header.

const headers = {
  Authorization: `Bearer <<Access token>>`
};

Our Bearer Token, once generated, is valid for 1 hour. After this period, it will be necessary to generate a new token to ensure the continuity of the session in an active and secure manner.