OAuth 2.0 Authentication

Eagle Eye Networks version 3 API uses the OAuth 2.0 standard for authorization, specifically the access token and refresh token method. This method allows users to securely access and share resources across different applications and devices without sharing their credentials.

To obtain an access token, the user's application redirects the user to the Eagle Eye Networks authentication URL (https://auth.eagleeyenetworks.com) where the user grants access to their resources by providing their credentials (username and password). Once authenticated, the authentication server issues an access token to the user's application, which can be used to access the user's resources.

The access token is a short-lived token with a limited lifespan, typically multiple hours. Once the access token expires, the user's application can use the refresh token to obtain a new access token without requiring the user to provide their credentials again.

This method provides a secure way for the users to share their resources with different applications, as the user's credentials are not stored on the third-party application's servers and the access token is short-lived and can be easily invalidated if necessary. Additionally, the refresh token allows the users to access their resources without the need to re-enter their credentials every time the access token expires.

In comparison, the password grant method, also known as the resource owner password credentials grant, involves sharing the user's credentials (username and password) with the third-party application. While this method is simpler to implement, it poses a security risk as the user's credentials are stored on the third-party application's servers, making them vulnerable to attacks.

The OAuth method used in Eagle Eye Networks API provides several advantages over the password grant method, such as:

  • Increased security: As the user's credentials are not shared with the third-party application and the access token is short-lived, the risk of unauthorized access or data breaches is greatly reduced.
  • Increased flexibility: The refresh token allows the user to access their resources without having to re-enter their credentials every time the access token expires.
  • Better scalability: As the user's credentials are not stored on the third-party application's servers, the system can easily accommodate a large number of users without the need to store and manage user credentials.
  • Easy revocation of access: Access tokens can be easily revoked if necessary, which is a great feature for security.

In summary, Eagle Eye Networks version 3 API uses the OAuth 2.0 standard for authorization, specifically the access token and refresh token method. This method allows users to securely access and share resources across different applications and devices without sharing their credentials and provides several advantages over the password grant method such as increased security, flexibility, scalability, and easy revocation of access. The authentication URL is https://auth.eagleeyenetworks.com where the user can grant access to their resources by providing their credentials and getting the access token and refresh token.

Here you can find how exactly it works in Eagle Eye API V3.