Authentication
The Xyxyx API pioneers a new, innovative approach to API authentication by leveraging blockchain technology via the EVM instead of traditional methods like the OAuth 2.0 protocol. Xyxyx's blockchain-based, dual-token method ensures permissionless, secure, and efficient access to the API.
Xyxyx API authentication is achieved through two methods:
The API authentication can occur based on three architectures:
Node
Users can authenticate via a node. This means 1
Xyxyx API Key or 1
XIN owned by an address.
Cluster
Users can authenticate via a cluster. This means multiple Xyxyx API Keys or multiple XINs owned by an address.
e.g., 2
Xyxyx API Keys or 2
XINs
Composite
Users can authenticate via a composite. This means a token composite between Xyxyx API Keys and XINs.
e.g., 1
Xyxyx API Key + 1
XIN
Refer to the Getting an API Key page to learn how to get an Xyxyx API or an XIN.
Refer to the Rates & Limits page to learn about rates and limits of Xyxyx API Keys and XINs.
Last updated