API Getting Started

The Hawk protocol is used as the main layer of security. Hawk is a protocol which, before every request, a header with a mac is calculated in order to complete any request (with the exception of a request to get the server time).This mac is calculated on the basis of the handed out ID, secret key, destination URL, time and type of request (GET, PUT, POST etc) ................
................