Skip to main content

What are Hurree's industry-approved protocols?

Written by Niamh McGlade

The number one priority at Hurree is ensuring our user information and data are secure. Therefore, we employ industry-standard authentication protocols, including OAuth 2.0 and API keys, to ensure the safety and confidentiality of your information.

OAuth 2.0:

OAuth 2.0 is a trusted authorization framework that safeguards your data by:

  • User Consent: You control access to your data, review, and authorize specific permissions.

  • Limited Access Tokens: Access tokens have restricted scopes and expire, limiting access to your data.

  • Trusted Authorization Servers: We partner with reputable servers that prioritize data integrity and confidentiality.

Note: If you've ever signed in to a website or app using your Google or Facebook account, you've used OAuth2.

API Keys:

API keys provide an extra layer of security by:

  • Authentication and Authorization: Only authorized applications with valid API keys can interact with our APIs.

  • Controlled Access: Each API key is associated with specific permissions, ensuring data access is limited and controlled.

  • Revocation and Rotation: We regularly review and update security measures. As the authenticator, you control the revocation of your API Key.

Encrypted data

Additionally, all data contained within Hurree is encrypted in transit and at rest, with maximum security. If you would like to read more about our data security, you can find more information here.

Rest assured, we continuously monitor and enhance our security practices to safeguard your data from unauthorized access or misuse.

If you have any questions or concerns regarding the safety of your information, please email [email protected].

Did this answer your question?