The authentication of the client API within the browser?

I’m considering the Google Static Maps API, which will limit your use of 1000 static maps, if you register an account, there will be more. When everything on the client is public, How do they track accounts, etc.?

For most server-to-server APIs, I get access_token/key/etc. I can pass to the service to prove that I am indeed me, but any such access_token/key on the client /etc. will immediately become public knowledge.

Generally speaking, what strategies are used by client libraries (FB SDK, Stripe, Google, etc.) to perform authentication, and how they resolve everything on the client Are all public?

You can configure the API key as a whitelist by host, telling Google Maps to only allow sending from Websites from referral sources that match your whitelist use API keys.

If some other website uses your API key, they will receive this error message when loading :

This web site needs a different Google Maps API key. A new key can be generated at 07001.

You You can use the RefControl extension for FireFox to verify yourself:

>Use the extension to cover your referral source, such as http://www.microsoft.com/
>access to Google Maps that are not hosted by Google Example website – For example, http://econym.org.uk/gmap/example_controlpos.htm
>You should get an error.

This is because:

>Actually , All web browsers will send the referrer (ie, the URI of the resource which links to it) as part of the request.
>For someone to steal your API key (because as you said, it is A publicly available string), they need to tell all users to cover their referrals to match the website from which they stole it (which is obviously impractical).

Please note that Google seems to allow not to include Referrer requests-The number of browsers I want to configure to exclude this information is trivial, so it is not worth paying attention to.

I am considering the Google Static Map API, which will limit you With 1000 static maps, if you register an account, there will be more. When all the content on the client is public, how do they track the account, etc.?

For most server-to-server APIs, I get access_token/key/etc. I can pass to the service to prove that I am indeed me, but any such access_token/key on the client /etc. will immediately become public knowledge.

Generally speaking, what strategies are used by client libraries (FB SDK, Stripe, Google, etc.) to perform authentication, and how they resolve everything on the client Are all public?

You can configure the API key as a whitelist by host, telling Google Maps to only allow use from websites that send referral sources that match your whitelist API​​Key.

If some other website uses your API key, they will receive this error message when loading:

This web site needs a different Google Maps API key. A new key can be generated at 07001.

You can use the RefControl extension for FireFox to verify by yourself:

>Use extensions to cover your referral sources, e.g. http://www.microsoft.com/
>Visit a sample site on Google Maps that is not hosted by Google-e.g., http://econym.org .uk/gmap/example_controlpos.htm
>You should get an error.

This is because:

>In fact, all web browsers will referral sources (ie, the URI of the resource which links to it) is sent as part of the request.
>For someone to steal your API key (because as you said, it is a publicly available string), they need to tell all Users override their referrals to match the website they stole it from (which is obviously impractical).

Please note that Google seems to allow requests that do not include the referrer-I want to configure to exclude this information The number of browsers is insignificant, so it is not worth paying attention to.

Leave a Comment

Your email address will not be published.