Authentication Methods

Inyo gateway utilizes the Client Credentials Grant flow of OAuth 2.0 to securely authenticate machine-to-machine communications

  • Secure Access Tokens: Used for authentication between services, ensuring secure communications.

  • Short-Lived Tokens: Tokens are designed with a limited lifespan to enhance security and reduce exposure risks in case of compromise.

  • Encrypted Token Storage and Validation: Tokens are encrypted and validated securely, adhering to industry standards to prevent unauthorized access.

Last updated