Skip to main content
All requests to Credible’s infrastructure are authenticated using bearer token authentication. This a safeguard to protect sensitive consumer data and to prevent untrusted sources from taking actions on behalf of consumers.

Credentials

The OAuth 2.0 client credentials grant flow is used to generate the access token which will be used as a Bearer token to access Credible API. A pair of client id and client secret will be generated for the partner. After receiving credentials, partners must ensure that they are stored as secret values, using at least the same level of protection that they use for their internal secret credentials in the application. To receive your client id , client secret credentials, please reach out to [email protected] OR your assigned partnership contact directly.

Bearer Tokens

Check out the access token endpoint for full technical spec around using oauth2 bearer tokens.
It is best practice to request a new bearer token for each unique API request that is made to ensure that tokens do not expire unexpectedly.