Authentication Methods
Inyo gateway utilizes the Client Credentials Grant flow of OAuth 2.0 to securely authenticate machine-to-machine communications
Secure Access Tokens: Used for authentication between services, ensuring secure communications.
Short-Lived Tokens: Tokens are designed with a limited lifespan to enhance security and reduce exposure risks in case of compromise.
Encrypted Token Storage and Validation: Tokens are encrypted and validated securely, adhering to industry standards to prevent unauthorized access.
Last updated