đEncryption Authentication
Encryption nodes require authentication to accept incoming requests. Users can use three ways to authenticate:
In the code example of file and text upload, the user must place the JWT or signed message generated above in place of signed_message in the code example.
Last updated