Authentication

Ensuring the security of your applications and the safety of your data is paramount. This section outlines the various authentication methods available.

We Don't Know Your Users, But You Do

You have the best understanding of your user base. You know who should subscribe to specific rooms and events, who needs access to publish events, and who should receive metrics and status updates.

That's why we provide you with the tools to create secure access credentials, empowering you to decide who has access to what.

Principle of Least Privilege

Our authentication and authorization strategy follows the principle of least privilege. Users are prohibited from performing any operation unless they are explicitly granted access.

Access Controls Through API Keys

The most effective way to control access is through a combination of API keys and dynamic permissions. For more details, please refer to the API Keys section.

    On this page