Authentication
Authentication is encrypted and hashed through a unique seed per user profile. After a user is logged in (after registration), a Bearer Token is used to manage sessions, request context, authorizations, and permissions.
The seed is used to hash the passwords and other sensitive information at any point of data being in transit (it is not to be confused with a wallet recovery seed).
The AUTH Endpoints are documented accordingly in this chapter.
Last updated
Was this helpful?

