Authentication
Last updated
Last updated
The Xyxyx API pioneers a new, innovative approach to API authentication by leveraging blockchain technology via the EVM instead of traditional methods like the OAuth 2.0 protocol. Xyxyx's blockchain-based, dual-token method ensures permissionless, secure, and efficient access to the API.
Xyxyx API authentication is achieved through two methods:
The API authentication can occur based on three architectures:
Node
Users can authenticate via a node. This means 1
Xyxyx API Key or 1
XIN owned by an address.
Cluster
Users can authenticate via a cluster. This means multiple Xyxyx API Keys or multiple XINs owned by an address.
e.g., 2
Xyxyx API Keys or 2
XINs
Composite
Users can authenticate via a composite. This means a token composite between Xyxyx API Keys and XINs.
e.g., 1
Xyxyx API Key + 1
XIN
Refer to the page to learn how to get an Xyxyx API or an XIN.
Refer to the page to learn about rates and limits of Xyxyx API Keys and XINs.