Secure Connection

To ensure secure communication between the client and the server, we use the X-HMAC signature security connection. This connection method adds an extra layer of protection by verifying the integrity and authenticity of the transmitted data.

How it works

  1. The client sends a request to the server with the X-HMAC signature included in the request headers.
  2. The server receives the request and extracts the X-HMAC signature from the headers.
  3. The server then calculates the HMAC (Hash-based Message Authentication Code) using a shared secret key and the request payload.
  4. The server compares the calculated HMAC with the received X-HMAC signature.
  5. If the two values match, the server proceeds with processing the request. Otherwise, it rejects the request as it indicates tampering or unauthorized access.

Benefits

  • Data Integrity: The X-HMAC signature ensures that the data transmitted between the client and the server remains intact and has not been modified during transit.
  • Authentication: By using a shared secret key, the server can verify the authenticity of the client and ensure that the request is coming from a trusted source.
  • Protection against tampering: Any attempt to modify the request payload or the X-HMAC signature will result in a mismatch, alerting the server of potential tampering attempts.
Table of Contents