Authentication
To use OS APIs you need to authenticate your requests. Before you can authenticate requests you need to add the API into an API Project in the OS Data Hub; this gives you access to a Project API Key and Project API Secret. See Getting started with an API project for more information on setting up your API Project.
Types of authentication
There are three options for authenticating your API requests:
Best practices
Keep your API keys and tokens secure at all times.
Rotate your keys periodically to minimize the risk of unauthorised access.
Monitoring and alerts
Regularly check the usage patterns of your API keys.
Set up alerts for unusual or unauthorised activities that could indicate a security breach.
Last updated