Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Authentication and Authorization are two subtly different things. In this case, you may want an API key (Authentication) to be required to ensure things like rate limiting is enforced, but then want proof that the call is operating on a user, or is a machine-to-machine interaction which OAuth2 Bearer tokens work nicely for (Authorization)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: