5 How do I tell the API who I am?
5.1 Introduction
(introduction will be written ~last)
5.1.1 Learning Objectives
After you read this chapter, you will be able to:
- Compare and contrast authentication schemes.
- Describe the dangers associated with “leaking” credentials.
- Find authentication information in API docs.
- Authenticate a request with a username and password.
- Authenticate a request with an API key.
- Authenticate a request with the “OAuth dance.”
- Re-authenticate OAuth requests.
- Authenticate with browser cookies.
- TODO: LOs about other schemes?
5.1.2 Prerequisites
(prerequisites will be filled in as I write, if I decide to keep this section)