To authenticate, an API key is used, and each key is granted access to at least one field in one endpoint. Depending on the permissions granted, the API key may also be authorized to Create, Read, Update or Delete data.

The authentication process involves the use of a Header named Authorization (spelled "Authorisation" for non-US users), which requires passing the API key