🔐Encryption Authentication

Encryption nodes require authentication to accept incoming requests. Users can use three ways to authenticate:

In the code example of file and text upload, the user must place the JWT or signed message generated above in place of signed_message in the code example.

Last updated