Many web services that provide service via an API provide their authorized users an API Key to submit along with their requests.
I'm trying to understand the basic methodology and some of the security implications.
1) User requests API Key
2) User granted API Key
3) User requests resource, affixes APIKey to request
4) Service checks API key, grants request
My biggest question is in instances where you are creating ajax/jquery type requests to a web service, and you have to include your API Key. It'll be right there in the browser with the rest of the request details.
Or am I missing something? Is there a way to obscure the api key? What is to keep someone from snooping that key out of the request and using it for their own requests?
I'm trying to understand the basic methodology and some of the security implications.
1) User requests API Key
2) User granted API Key
3) User requests resource, affixes APIKey to request
4) Service checks API key, grants request
My biggest question is in instances where you are creating ajax/jquery type requests to a web service, and you have to include your API Key. It'll be right there in the browser with the rest of the request details.
Or am I missing something? Is there a way to obscure the api key? What is to keep someone from snooping that key out of the request and using it for their own requests?