➜ The public network is built for developers with ease of use in mind, so we don't require any complicated (but more secure) authentication mechanisms.
➜ The only mechanism used is a security token (per-application), and you will need to provide this token before any other interactions with the interface.
➜ Note that anyone with knowledge of the token can access your data, so please keep the tokens as protected any of your passwords.
✔ With the latest update of our software, the format of the tokens has been changed.
➜ The token has been extended and now includes information about the application ID and the server origin, so that 3rd party platforms can use single value copy-paste to access our API.
✔ You can continue using any legacy tokens you have already in place, we provide full backward compatibility.