🚀Intro
Authentication
Forensics API endpoints require authentication.
This means that these endpoints are oriented to changing the information and data that given user owns and is about him / her. To identify who is exactly the user whose details are changed, the following protocol is used.
API Keys
To call a given endpoint that require authentication, the current user has to be identified.
If you do not include a key or use one that is incorrect, you will be rate limited. See Rate Limits
Last updated