Authentication with a Secure and Distributed API Design
In this paper, we go over the architecture of token based requests, our secure API token architecture, how to create and use a token, and provide some thoughts on token rotation and distributed design.