To authenticate your requests, we provide each client a pair of access token and secret
key. The secret key is only used for HMAC SHA-1 signing and not transmitted over the
wire along with your requests.Each request must contain identity authentication
information to confirm the identity and authority of the sender
introduction
Step 1: get token and key
Follow these steps to quickly complete identity authentication
Test environment | Production environmen | ||||
---|---|---|---|---|---|
1 | Host | http://qa.etowertech.com | Host | http://cn.etowertech.com | |
2 | Token | test5AdbzO5OEeOpvgAVXUFE0A | Token | Please contact the integrator | |
3 | Key | 79db9e5OEeOpvgAVXUFWSD | Key | Please contact the integrator |
Step 2: Every request need contain the HTTP header
Request Headers | ||
---|---|---|