# Authorizations

The following method allows you to generate unique authentication data for accessing the proxy server for each order.

To generate authentication for an order, you need to send an additional parameter [`generateAuth=Y`](https://docs.proxy-seller.com/proxy-seller/order-actions/place-an-order) to the endpoint.

To generate authentication data for an order, you must send the additional  parameter[`generateAuth=Y`](https://docs.proxy-seller.com/proxy-seller/order-actions/place-an-order) to the [`/order/make`](https://docs.proxy-seller.com/proxy-seller/order-actions/place-an-order) endpoint.

To obtain the **orderNumber** required to create and match authentications, use the [/proxy/list](https://docs.proxy-seller.com/proxy-seller/actions-with-proxies/retrieve-active-proxy) endpoint for a specific proxy server.

{% hint style="danger" %}
These authorizations are **not displayed** in [/proxy/list](https://docs.proxy-seller.com/proxy-seller/actions-with-proxies/retrieve-active-proxy)
{% endhint %}

### Authorization Management

Authorization management involves several key processes to ensure secure and efficient access control within a system. Below are the comprehensive details of the various functions related to authorization proxy-servers:

[List of Authorizations](https://docs.proxy-seller.com/proxy-seller/actions-with-proxies/authorizations/list-of-authorizations)

Having a full list of permissions is vital for auditing and checking access to the system. This list gives an idea of ​​which login/password pairs or IPs from the whitelist have access to the proxy:

* **Use Case**: getting all current data assigned in the system to the client's email address.
* **Benefits**: determine the relevance of existing data.

[Create Authorization](https://docs.proxy-seller.com/proxy-seller/actions-with-proxies/authorizations/create-authorization)

Authorization creation is the process of creating new authorization data for an individual entrepreneur or generating random ones for each new order. This can facilitate the division of access rights to certain individual entrepreneur addresses by employees or sub-users.

* **Use case:** onboarding a new team member or custom data for each order.
* **Benefits**: dynamic management of authorization data.

[Change Authorization](https://docs.proxy-seller.com/proxy-seller/actions-with-proxies/authorizations/change-authorization)

Changing authorization involves modifying existing access rights for users.

* **Use Case**: data leakage or requirement for usage specification for security.
* **Benefits**: Ensures users have appropriate access aligned with their current job functions.

[Delete Authorization](https://docs.proxy-seller.com/proxy-seller/actions-with-proxies/authorizations/delete-authorization)

The delete authorization function allows for the removal of existing permissions or access rights within the system. This is essential for maintaining up-to-date security protocols and ensuring users do not retain access they no longer require.

* **Use Case**: the access period is limited in time.
* **Benefits**: Enhances security by preventing unauthorized access.

Managing these authorization processes effectively ensures secure access, maintains organizational compliance, and supports.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.proxy-seller.com/proxy-seller/actions-with-proxies/authorizations.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
