...
To obtain a security token, it is requisite to send a POST HTTP request to the API at the designated path /api/ipn/tokenstoken. For the successful execution of operations, two security-sensitive values, namely hash and secret, must be provided by Thinksurance Support Team. Following the provision of these values as a JSON payload in the HTTP request, the API will respond by returning a security token within a JSON payload in the HTTP response.
Action name | get token |
---|---|
HTTP path | /api/ipn/tokenstoken |
HTTP method | POST |
Attributes of the HTTP request
...
As previously stated, to procure a security token, it is imperative to dispatch a POST HTTP request to the /api/ipn/tokenstoken endpoint of the API. Below, instances of potential communication between the API and consumers are provided.
HTTP Request | |||||
| |||||
Successful HTTP Response | |||||
| |||||
Failed HTTP Response | |||||
|
...
Throughout the lifespan of a security token, consumers are entitled to submit requests to various endpoints within the API. Upon receiving the first response indicating an invalid request, consumers of the API should initiate the retrieval of a new security token.
Drawio | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...