Authentication
Authorization is a security measure used to control access to iyzico services by users. This process involves authentication steps, and authorization methods typically utilize information such as passwords, keys, or biometric data. iyzico has two different authentication methods.
SHA256 Authentication
SHA256 represents the 256-bit version of the Secure Hash Algorithm 2, which is considered a more secure authorization method. SHA256 uses a longer hash digest to provide a higher level of security and is often preferred for applications such as digital signatures, password authentication, and data integrity checks.
Last updated