Authorisation v1.2

We support a range of authorisation methods, designed to compliment varied technologies and implementations. Please refer to the reference documents below when choosing your authentication method.

If you run into difficulty or would like to provide feedback, please get in touch with us on Twitter.



Authenticate a user with a secret API key rather than prompting for a password. There's no need to worry about storage or code for expiration!

Partner Hash

Hash athentication for partners.


Tokens are granted by username and password and allow for more fine-grained security when authenticating. They are issued without vulnerable secrets, but expire after a set period and must be stored appropriately.


OAuth allows a developer's application to access data on behalf of a user without their username and password. It also allows the user to grant and revoke access to developer applications.