Authentication
All bearer tokens should be kept private and never shared or exposed in client-side code.
To authenticate requests, Polar API has two mechanisms.
- Organization Access Tokens (OAT) - Recommended
- OAuth 2.0 Provider (Partner Integrations)
Organization Access Tokens (OAT)
They are tied to one of your organization. You can create them from your organization settings.
Security
To protect your data and ensure the security of Polar, we’ve several mechanisms in place to automatically revoke tokens that may have been leaked publicly on the web.
In particular, we’re part of the GitHub Secret Scanning Program. If GitHub systems detect a Polar token in a code repository or public discussion, our systems are notified and the tokens are immediately revoked.
If you received an email about one of your token being leaked, it means that we were notified of such situation. The email contains the details about the nature of the token and the source of the leak.
In the future, it’s crucial that you remain extra cautious about not leaking your tokens publicly online. You can read more about the good practices to manage secrets in the OWASP Secrets Management Cheat Sheet.
Was this page helpful?