Authentication

Please be informed that SHA1 Authentication will no longer be supported after November 30th, 2024. Our esteemed merchants need to enhance their codebases to use HMACSHA256 Authentication.

Please prioritize this update to ensure your systems remain secure and compliant.

Authorization is a security measure used to control access to iyzico services by users. This process involves authentication steps, and authorization methods typically utilize information such as passwords, keys, or biometric data. iyzico has two different authentication methods.

SHA1 is a hash algorithm used to generate a unique cryptographic digest of data. SHA1 is used in many applications due to its fast computation times and widespread acceptance.

SHA256 Authentication

SHA256 represents the 256-bit version of the Secure Hash Algorithm 2, which is considered a more secure authorization method. SHA256 uses a longer hash digest to provide a higher level of security and is often preferred for applications such as digital signatures, password authentication, and data integrity checks.

Last updated