In order to prevent unauthorized users from using my json data, I want users to apply for my APIkey first and then use it. What is the idea behind this approach?
In order to prevent unauthorized users from using my json data, I want users to apply for my APIkey first and then use it. What is the idea behind this approach?
Create a table to store the apikey issued to the user
When the user requests, the apikey is obtained, the database is queried, and the legality is verified. If it is legal, the interface can be called normally, otherwise vice versa.
Authentication packages such as OAuth, jwt, http base