Authentication method | Permission scheme | Description |
---|---|---|
API Keys | Simple permission list | When creating API keys, users explicitly grant one or more of these high-level permissions. Your API key will only be able to perform actions within the scope of the permissions selected by the user. |
OAuth | service-name:resource:action pattern | OAuth utilizes a more fine-grained permission model based on a colon-separated pattern. This allows for precise control over the specific resources and actions your application can access on behalf of the user. |