Skip to content

Authenticated ‘Ping’ with sensitive data#

Use /authenticate-with-secrets to test whether your encryption/decryption logic for sensitive information correctly implemented.

Route

/authenticate-with-secrets

Headers#

Key Value Type Description
X-FLYNN-S-REK Sensitive, Base64 String RSA Encrypted data

ref: request-encryption-key-in-header
X-FLYNN-S-DATA Sensitive, Base64 String AES Encrypted data

ref: sensitive-header-value

With, addition to the headers described above also set all required headers to make an authenticated API call.

Response#

200:#

Successful 'Ping' - i.e., you are able to make ‘authenticated’ call with the secret data.

Example

{
  "data": {
    "message": "pong",
    "client-message": "X+UmK6iD5Dh6f3Y2he+2aM2AmKVqAVJC0os9j3D97ublPfEKSAuOAzPrBd+/h6OF"
  }
}

here ‘client-message’ contains the sensitive message received by the server. Client should be able to decrypt it using the REK which sent in the header in the request.

Errors (4xx and 5xx):#

Common Errors

check documentation for common errors