Skip to content

Get Credentials

To access the Reserhub Data Lake API, you’ll need specific credentials and configuration. This guide explains how to obtain and manage these credentials for both sandbox and production environments.

Required Credentials

Bearer Token

The Bearer Token is your primary authentication method for the API. To obtain a Bearer Token:

  1. Contact our Technical Support team
  2. Provide the following information:
    • Your company name
    • Intended use of the API
    • Expected request volume
    • Platform URLs where the API will be used

Origin Header

The Origin header is mandatory for all API requests and must correspond to the domain hosting your application, requiring you to provide all platform URLs where the API will be utilized, including the respective URLs for Development, Sandbox, and Production environments, along with any additional domains that may require API access.

Environment-Specific Requirements

Sandbox Environment

For sandbox testing:

  1. Request sandbox credentials from Technical Support
  2. Use the provided sandbox environment variables
  3. Follow the Postman Guide to set up your testing environment
  4. Test with the sandbox endpoints
  5. Validate your integration before requesting production credentials

Production Environment

For production access:

  1. Complete your integration in the sandbox environment
  2. Ensure all test cases pass successfully
  3. Document your implementation
  4. Request production credentials from Technical Support
  5. Provide a detailed deployment plan

Security Best Practices

When managing your credentials:

  • Never share your Bearer Token
  • Store credentials securely using environment variables
  • Implement proper error handling
  • Monitor API usage and report any suspicious activity
  • Keep your platform configurations up to date

Support and Maintenance

Getting Help

If you need assistance:

  1. Contact Technical Support
  2. Provide detailed information about your issue
  3. Include relevant error messages
  4. Share your implementation details

Credential Management

For credential-related issues:

  • Report compromised credentials immediately
  • Request new credentials when needed
  • Update platform configurations as required
  • Maintain documentation of all changes