Inherit from Parent
Inherit from Parent is the default Auth type in Apidog.
No Auth
No auth means that there is no authentication mechanism for this endpoint.
API Key
In this article, you will learn how to use API Key for authentication.
Bearer Key
The Bearer token is typically used for authentication, commonly seen in web applications. In the dropdown options under the "Auth" column, select the "Bearer Token" type.
JWT
JWT (JSON Web Token) is an anonymous token authorization mechanism used for authentication and information transmission.
Basic Auth
Basic Auth is an authentication method of the HTTP protocol that uses a username and password to authenticate API requests.
Digest Auth
Digest Authentication is an authentication mechanism for HTTP access control. It is similar to Basic Auth, but Digest Auth is more secure than the latter in terms of authentication method.
OAuth 1.0
OAuth 1.0 is an authorization mechanism based on the OAuth protocol, which allows third-party applications to access protected resources. For example, as a user of Product A, you can directly log in to the system of Platform B using your account on Product A, without exposing your username and password on Platform A.
OAuth 2.0
Apidog can directly generate tokens according to the OAuth 2.0 specification and attach them to requests, no need to generate them in other tools and then paste them, which is very convenient.
Hawk Authentication
Hawk Authentication is an HTTP request-based authentication protocol designed to provide a simple, flexible, and secure authentication mechanism.
Kerberos
Kerberos is a network authentication protocol initially developed by the Massachusetts Institute of Technology (MIT) and widely used in many modern computing systems, especially in enterprise environments. Kerberos utilizes symmetric encryption and a trusted third party, known as the Key Distribution Center (KDC), to perform its functions.
NTLM
NTLM (NT LAN Manager) is an authentication protocol developed by Microsoft based on HTTP requests. It uses the NTLMv1 and NTLMv2 algorithms to generate signatures, ensuring the integrity and authenticity of requests, and preventing them from being tampered with or forged. To learn more about NTLM Authentication, please visit the official documentation.
Akamai EdgeGrid
Akamai EdgeGrid is an HTTP request-based authentication protocol developed by Akamai that uses a signature algorithm to generate signatures, ensuring the integrity and authenticity of requests and preventing them from being tampered with or forged. For more information about Akamai EdgeGrid, please visit the official documentation.