Authentication

Authorization is a security measure used to control access to iyzico services by users. This process involves authentication steps, and authorization methods typically utilize information such as passwords, keys, or biometric data. iyzico has two different authentication methods.

SHA1 is a hash algorithm used to generate a unique cryptographic digest of data. SHA1 is used in many applications due to its fast computation times and widespread acceptance.

SHA256 represents the 256-bit version of the Secure Hash Algorithm 2, which is considered a more secure authorization method. SHA256 uses a longer hash digest to provide a higher level of security and is often preferred for applications such as digital signatures, password authentication, and data integrity checks.

Last updated