Overview
The EPISHIP Authentication framework provides the security layer for your integration, ensuring that only verified applications can access your shipping data and execute transactions. You can develop applications that integrate with EPISHIP to securely authenticate requests using standard Bearer tokens, protecting sensitive customer information and billing details.
View Doc →
The following figure shows the relationship between your EPISHIP app, the EPISHIP API, and the Authentication service.
Figure 1. EPISHIP API relationship diagram. Authentication architecture and request flow.
EPISHIP App
EPISHIP’s security services give administrators control over API access, allowing for the generation and management of API tokens that authorize your application to interact with the platform on behalf of your company.
EPISHIP API
The REST API that enforces security by requiring a valid Bearer token in the header of every request to a protected endpoint.
Header Configuration
A standard HTTP requirement where the `Authorization` key is paired with the value `”Bearer {API_TOKEN}”` to validate the client’s identity before processing any data.
Protected Endpoints
Specific resources within the API that contain sensitive data or trigger billable actions, marked with a “requires authentication” badge to indicate that a valid token must be present.
What can users do with EPISHIP Authentication?
Users can use EPISHIP Authentication mechanisms to perform common workflows, such as:
- Securely connect third-party applications to the EPISHIP platform
- Authorize GET and POST requests to protected endpoints
- Prevent unauthorized access to shipping and billing data
- Identify which endpoints require security credentials via documentation badges
- Manage access validity through token lifecycle
Authentication properties and requirements available to configure through the EPISHIP API:
- Authorization Header
- Bearer Token
- API Token String
- Endpoint Security Badges