API Reference
The CypherFace API is a RESTful service that uses JSON for request and response bodies. It requires authentication via JWT tokens after the user logs in. Below is the detailed documentation of various API endpoints, including registration, login and user management.
CypherFace API Environments
CypherFace provide two environment STAGING and PRODUCTION. Both environments are completely independent, meaning they do not share any information, including API credentials.
Environment | Endpoint URL |
---|---|
Sandbox | https://staging.cypherface.com/ |
With these environments, you can effectively test your connection with CypherFace's APIs. For testing purposes, utilize the CypherFace Sandbox API, which allows you to explore features and functionality in a controlled setting.
Once you are ready to move to production, please reach out to your CypherFace point of contact for the live environment URL. This ensures that you have the correct credentials and access for seamless integration.
Authorization and API Keys
CypherFace uses API keys to authenticate requests. For the sandbox environment, we will provide you with a unique API key that allows you to test the API without real-world consequences.
When you're ready to go live, CypherFace will issue you a separate production API key. This key is specifically for use in the live environment and ensures secure access to all production-level features of the CypherFace API.
- Sandbox API Key: Use this key for testing and development in the sandbox environment.
- Production API Key: When ready for production, we will provide cypherFace production API key for secure live operations.
Both environments will require an authorization header in API requests, using the format Authorization: Bearer <API_Key>.
Proper management of your API keys is essential for securing your integration. For any further queries on obtaining your API keys or managing authorization, please contact our support team.
Authentication
The CypherFace API uses JWT (JSON Web Token) for authenticating requests after a user logs in. To perform operations on the platform (such as user management), you must authenticate your API calls with a valid JWT token.
Endpoints
Here is a detailed list of CypherFace API Endpoints, categorized by their functionality. This includes authentication, user management, and various operations such as email verification, face detection, and more.
CypherFace API Error Handling & Timeouts
Response Time
: CypherFace API strives for quick response times, but certain processes (like image processing) can take longer. Ensure that client applications implement appropriate error handling for timeouts.
Timeout Limit
: API requests may have a maximum timeout of 5 minutes for more complex tasks, such as face verification.
HTTP Status Codes
HTTP Code | Meaning |
---|---|
400 | Bad Request -- You provided a request that can't be successfully parsed. Verify you are providing valid JSON. |
401 | Unauthorized -- We could not authenticate your request. You used an incorrect API Key. |
402 | Upstream Processor Error -- Errors caused by 3rd party service. |
403 | Forbidden -- Your credentials don't have the right permissions to submit the request. |
404 | Not Found -- The specified resource could not be found. |
405 | Method Not Allowed -- The HTTP request method used to submit the request is not supported by the specified resource. |
406 | Not Acceptable -- The server can't accept the submitted request. Double-check how the request was formatted and submitted. |
409 | Conflict -- The submitted request conflicts with the current state of the server. |
422 | Unprocessable Entity -- The parameters were valid but the request failed. The error is usually some misunderstanding of various steps that have to be executed in order (e.g., attempting to initiate a transfer on behalf of a seller that has not yet been approved). |
500 | Internal Server Error -- We had a problem with our server. Try again later. |