1 results found for " encrypted ".

  • Authentication - Cloud Eye

    using either of the following methods: Token authentication: Requests are authenticated using tokens. AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity

Total Items:1