Access token management
GetBlock uses a secure authentication method based on access tokens to ensure that only authorized users can interact with blockchain nodes.
Last updated
GetBlock uses a secure authentication method based on access tokens to ensure that only authorized users can interact with blockchain nodes.
Last updated
Every you create is assigned a unique access token:
The <ACCESS_TOKEN> authenticates requests directly through the endpoint URL.
To make a request, include your full endpoint URL with the access token in the path.
For example, here’s how to fetch the latest Ethereum block number:
Response:
Always store your access tokens securely. Avoid exposing them in publicly accessible code repositories or logs.
If a token is compromised, you can quickly roll or delete it without disrupting other endpoints:
Go to your GetBlock Dashboard.
Locate the endpoint associated with the token.
Select the option to either roll (regenerate) or delete the token.
This authentication method ensures that all your interactions with GetBlock’s services remain secure, reliable, and easy to manage.
Click the next to the endpoint.