Skip to main content
Use this page to understand auth surface area by API family. For canonical literals (headers, token sources, environment-specific behavior), use the authentication matrix.

Scope

  • This page summarizes auth methods by API surface.
  • It does not define a single universal flow for all IXO APIs.
  • Protocol docs and service docs can require different credentials.

Common request patterns

Common header formats used across IXO docs are centralized in /reference/authentication-matrix.
Do not assume any one header or token type applies to every endpoint. Confirm each interface against /reference/authentication-matrix.

API families and auth responsibility

API familySurfaceAuth notes
Protocol gateways/api-reference/rpc-api, /api-reference/grpc-gateway-apiChain and node access patterns vary by network and deployment.
Service APIs/api-reference/blocksync-graphql-api, /api-reference/matrix-state-bot-api, /api-reference/registry-apiService operators can enforce different credentials and scopes.

Security baseline

  • Use HTTPS for all authenticated requests.
  • Keep credentials in secure runtime storage, not source files.
  • Rotate tokens and keys according to your operator policy.
  • Log request identifiers and auth failures for incident triage.

Source-of-truth references

  • Authentication matrix: /reference/authentication-matrix
  • Networks and endpoints: /reference/networks-and-endpoints
  • Product and SDK map: /reference/product-and-sdk-map