Authentication

Access to the Xyxyx API Testnet is limited to Xyxyx API Keys.

The Xyxyx API pioneers a new, innovative approach to API authentication by leveraging blockchain technology via the EVM instead of traditional methods like the OAuth 2.0 protocol. Xyxyx's blockchain-based, dual-token method ensures permissionless, secure, and efficient access to the API.

Xyxyx API authentication is achieved through two methods:

The API authentication can occur based on three architectures:

  1. Node

Users can authenticate via a node. This means 1 Xyxyx API Key or 1 XIN owned by an address.


  1. Cluster

Users can authenticate via a cluster. This means multiple Xyxyx API Keys or multiple XINs owned by an address.

e.g., 2 Xyxyx API Keys or 2 XINs


  1. Composite

Users can authenticate via a composite. This means a token composite between Xyxyx API Keys and XINs.

e.g., 1 Xyxyx API Key + 1 XIN


Refer to the Getting an API Key page to learn how to get an Xyxyx API or an XIN.

Refer to the Rates & Limits page to learn about rates and limits of Xyxyx API Keys and XINs.

Last updated