Authorizations
Last updated
Last updated
The following method allows you to generate unique authentication data for accessing the proxy server for each order.
To generate authentication for an order, you need to send an additional parameter to the endpoint.
To generate authentication data for an order, you must send the additional parameter to the endpoint.
To obtain the orderNumber required to create and match authentications, use the endpoint for a specific proxy server.
These authorizations are not displayed in
Authorization management involves several key processes to ensure secure and efficient access control within a system. Below are the comprehensive details of the various functions related to authorization proxy-servers:
Having a full list of permissions is vital for auditing and checking access to the system. This list gives an idea of which login/password pairs or IPs from the whitelist have access to the proxy:
Use Case: getting all current data assigned in the system to the client's email address.
Benefits: determine the relevance of existing data.
Authorization creation is the process of creating new authorization data for an individual entrepreneur or generating random ones for each new order. This can facilitate the division of access rights to certain individual entrepreneur addresses by employees or sub-users.
Use case: onboarding a new team member or custom data for each order.
Benefits: dynamic management of authorization data.
Changing authorization involves modifying existing access rights for users.
Use Case: data leakage or requirement for usage specification for security.
Benefits: Ensures users have appropriate access aligned with their current job functions.
The delete authorization function allows for the removal of existing permissions or access rights within the system. This is essential for maintaining up-to-date security protocols and ensuring users do not retain access they no longer require.
Use Case: the access period is limited in time.
Benefits: Enhances security by preventing unauthorized access.
Managing these authorization processes effectively ensures secure access, maintains organizational compliance, and supports.