Authenticated Endpoints
Authentication
Authenticated endpoints require users to sign their requests using a pair of API-KEY and API-SECRET.
Below you can find several guides to authenticate your HTTP requests using different programming languages.
These examples use the Get Profile endpoint but can be easily modified to make requests to other endpoints.
Environments
Environment | URL |
---|---|
Prod | https://api.hadron.tether.to |
Beta | https://api.hadron-beta.tether.to |
Updated 3 months ago