Security requirements and best practices.
Authorization
Basic Authentication requirements for API requests.
Request Signature
How to calculate and send X-Request-Signature.
Token
Token usage, activation, and security considerations.