Authenticating an internal API with FlaskContest assist web appAuthentication for a Flask APIIs this implementation for token based authentication in flask-peewee secure and efficient?Custom Google App Engine Python user managmentJinja template with FlaskRead stdin like a dictatorFunction to lock a file using memcache, Version 1Reduce amount of calls to database for authenticationCloudFlare Dynamic DNS Update Script in Python 3Dynamically configurable ZMQ filter with Flask API

Student asking for papers

Farming on the moon

Is there really no use for MD5 anymore?

Authenticating an internal API with Flask

How to remove these lines in Altium Design

Is the claim "Employers won't employ people with no 'social media presence'" realistic?

diskutil list shows 20 disk partitions, I only know 3, what are the rest?

Ergodic without atoms implies completely conservative?

Critique of timeline aesthetic

Is Diceware more secure than a long passphrase?

How much cash can I safely carry into the USA and avoid civil forfeiture?

Could the terminal length of components like resistors be reduced?

What happened to Captain America in Endgame?

How does Captain America channel this power?

What is the optimal strategy for the Dictionary Game?

Why must Chinese maps be obfuscated?

How could Tony Stark make this in Endgame?

Latex syntax: parenthesis for makebox(0,0)

Was there a Viking Exchange as well as a Columbian one?

Retract an already submitted recommendation letter (written for an undergrad student)

If a planet has 3 moons, is it possible to have triple Full/New Moons at once?

How exactly does Hawking radiation decrease the mass of black holes?

Big O /Right or wrong?

How do I deal with a coworker that keeps asking to make small superficial changes to a report, and it is seriously triggering my anxiety?



Authenticating an internal API with Flask


Contest assist web appAuthentication for a Flask APIIs this implementation for token based authentication in flask-peewee secure and efficient?Custom Google App Engine Python user managmentJinja template with FlaskRead stdin like a dictatorFunction to lock a file using memcache, Version 1Reduce amount of calls to database for authenticationCloudFlare Dynamic DNS Update Script in Python 3Dynamically configurable ZMQ filter with Flask API






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








3












$begingroup$


I'm developing an internal API using Flask, although due to limitations with our platform the endpoints will be accessible over the public internet. It will only have a very small number of users and it's not likely that this will increase much in the future. They will query the service programatically from a backend.



As only a small number of users will be consuming the API I think it makes sense to have a single key that can be used to access it. This will keep the authentication process simple and as the API doesn't provide access to anything really sensitive I don't believe we need to go too extreme on security. I've written the following:



app_config.py



import yaml
config = yaml.safe_load(open('config.yml'))


auth.py



from functools import wraps
from flask import request
from app_config import config

def valid_auth(func):
@wraps(func)
def func_wrapper(*args, **kwargs):
if 'x-api-key' not in request.headers:
return("Credentials not present in request", 401)
elif request.headers['x-api-key'] != config['api_key']:
return ("Credentials not valid", 401)
else:
return func(*args, **kwargs)
return func_wrapper


main.py



import api_module as api
from flask import Flask, request
from auth import valid_auth

app = Flask(__name__)

@app.route('/route1')
@valid_auth
def api_function():
#do api stuff here


Essentially the process is:



  • API key is stored in config.yml on API server

  • (SSL) Request from backend includes the key in a header called x-api-key

  • A wrapper function checks that the key sent in this header matches the key in the configuration before executing any API functions. If not, the user gets an error.

Does this seem like a reasonable approach to authentication for an internal API that will be used by a small number of users and that doesn't provide access to any sensitive information? Any general suggestions for how this process might be improved?










share|improve this question







New contributor




Duck Hunt Duo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.







$endgroup$


















    3












    $begingroup$


    I'm developing an internal API using Flask, although due to limitations with our platform the endpoints will be accessible over the public internet. It will only have a very small number of users and it's not likely that this will increase much in the future. They will query the service programatically from a backend.



    As only a small number of users will be consuming the API I think it makes sense to have a single key that can be used to access it. This will keep the authentication process simple and as the API doesn't provide access to anything really sensitive I don't believe we need to go too extreme on security. I've written the following:



    app_config.py



    import yaml
    config = yaml.safe_load(open('config.yml'))


    auth.py



    from functools import wraps
    from flask import request
    from app_config import config

    def valid_auth(func):
    @wraps(func)
    def func_wrapper(*args, **kwargs):
    if 'x-api-key' not in request.headers:
    return("Credentials not present in request", 401)
    elif request.headers['x-api-key'] != config['api_key']:
    return ("Credentials not valid", 401)
    else:
    return func(*args, **kwargs)
    return func_wrapper


    main.py



    import api_module as api
    from flask import Flask, request
    from auth import valid_auth

    app = Flask(__name__)

    @app.route('/route1')
    @valid_auth
    def api_function():
    #do api stuff here


    Essentially the process is:



    • API key is stored in config.yml on API server

    • (SSL) Request from backend includes the key in a header called x-api-key

    • A wrapper function checks that the key sent in this header matches the key in the configuration before executing any API functions. If not, the user gets an error.

    Does this seem like a reasonable approach to authentication for an internal API that will be used by a small number of users and that doesn't provide access to any sensitive information? Any general suggestions for how this process might be improved?










    share|improve this question







    New contributor




    Duck Hunt Duo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.







    $endgroup$














      3












      3








      3





      $begingroup$


      I'm developing an internal API using Flask, although due to limitations with our platform the endpoints will be accessible over the public internet. It will only have a very small number of users and it's not likely that this will increase much in the future. They will query the service programatically from a backend.



      As only a small number of users will be consuming the API I think it makes sense to have a single key that can be used to access it. This will keep the authentication process simple and as the API doesn't provide access to anything really sensitive I don't believe we need to go too extreme on security. I've written the following:



      app_config.py



      import yaml
      config = yaml.safe_load(open('config.yml'))


      auth.py



      from functools import wraps
      from flask import request
      from app_config import config

      def valid_auth(func):
      @wraps(func)
      def func_wrapper(*args, **kwargs):
      if 'x-api-key' not in request.headers:
      return("Credentials not present in request", 401)
      elif request.headers['x-api-key'] != config['api_key']:
      return ("Credentials not valid", 401)
      else:
      return func(*args, **kwargs)
      return func_wrapper


      main.py



      import api_module as api
      from flask import Flask, request
      from auth import valid_auth

      app = Flask(__name__)

      @app.route('/route1')
      @valid_auth
      def api_function():
      #do api stuff here


      Essentially the process is:



      • API key is stored in config.yml on API server

      • (SSL) Request from backend includes the key in a header called x-api-key

      • A wrapper function checks that the key sent in this header matches the key in the configuration before executing any API functions. If not, the user gets an error.

      Does this seem like a reasonable approach to authentication for an internal API that will be used by a small number of users and that doesn't provide access to any sensitive information? Any general suggestions for how this process might be improved?










      share|improve this question







      New contributor




      Duck Hunt Duo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.







      $endgroup$




      I'm developing an internal API using Flask, although due to limitations with our platform the endpoints will be accessible over the public internet. It will only have a very small number of users and it's not likely that this will increase much in the future. They will query the service programatically from a backend.



      As only a small number of users will be consuming the API I think it makes sense to have a single key that can be used to access it. This will keep the authentication process simple and as the API doesn't provide access to anything really sensitive I don't believe we need to go too extreme on security. I've written the following:



      app_config.py



      import yaml
      config = yaml.safe_load(open('config.yml'))


      auth.py



      from functools import wraps
      from flask import request
      from app_config import config

      def valid_auth(func):
      @wraps(func)
      def func_wrapper(*args, **kwargs):
      if 'x-api-key' not in request.headers:
      return("Credentials not present in request", 401)
      elif request.headers['x-api-key'] != config['api_key']:
      return ("Credentials not valid", 401)
      else:
      return func(*args, **kwargs)
      return func_wrapper


      main.py



      import api_module as api
      from flask import Flask, request
      from auth import valid_auth

      app = Flask(__name__)

      @app.route('/route1')
      @valid_auth
      def api_function():
      #do api stuff here


      Essentially the process is:



      • API key is stored in config.yml on API server

      • (SSL) Request from backend includes the key in a header called x-api-key

      • A wrapper function checks that the key sent in this header matches the key in the configuration before executing any API functions. If not, the user gets an error.

      Does this seem like a reasonable approach to authentication for an internal API that will be used by a small number of users and that doesn't provide access to any sensitive information? Any general suggestions for how this process might be improved?







      python python-3.x authentication flask






      share|improve this question







      New contributor




      Duck Hunt Duo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question







      New contributor




      Duck Hunt Duo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question






      New contributor




      Duck Hunt Duo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 4 hours ago









      Duck Hunt DuoDuck Hunt Duo

      182




      182




      New contributor




      Duck Hunt Duo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      Duck Hunt Duo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      Duck Hunt Duo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.




















          1 Answer
          1






          active

          oldest

          votes


















          3












          $begingroup$

          Just because you don't have many people using this API now, this does not mean that this will always be the case.



          In addition, you might want to discriminate between the users of the API for various reasons:



          • To know how many there actually are

          • To know which user/application is generating all those requests suddenly

          • To rate-throttle some of them if needed

          • To disallow access for someone who abused the API or just left the company or an obsolete application

          I would at least set this up in a very barebone way to have different API keys. For now you can just hardcode them in a dictionary in the config file, but this allows you to easily extract them to a database at some future point (which may never come). You can manually add users when needed (if it is only a few), or write a page that adds a user (if the manual task becomes too much).



          In your config just have something like this:



          config.yml



          api_keys:
          08zEk8IC0le3I0kPwSF1g4XU9R5WgbpUq2vZkZ0pkQU: User 1
          ZtRE7FXwZdtCLMfFHWPTom7_d-4XFbXEkHR5bIdG2TM: User 2
          Wg1vaDs8uqFbYtNDsJ8H3gKjl_oI0T_O6Jg8qNLWJcU: App 1
          ...


          Your code needs to be only minimally changed:



          auth.py



          def valid_auth(func):
          @wraps(func)
          def func_wrapper(*args, **kwargs):
          if 'x-api-key' not in request.headers:
          return "Credentials not present in request", 401
          elif request.headers['x-api-key'] not in config['api_keys']:
          return "Credentials not valid", 401
          else:
          return func(*args, **kwargs)
          return func_wrapper


          Note that () around tuples are not needed in return since it is an expression and not a function.




          Returning a tuple of message, status code to raise in one case and the result of the function in another case can also be a potential source of bugs. If the using code expects the return value to be a single value, checking for there being two and those two being a string and an int is not very fool-proof. Even worse if the function actually also returns a string and int tuple.



          Instead, raise exceptions, which you can then deal with in api_function. Use custom classes inheriting from Exception:



          class NoCredentials(Exception):
          status_code = 401

          class WrongCredentials(Exception):
          status_code = 401

          ...
          if 'x-api-key' not in request.headers:
          raise NoCredentials("Credentials not present in request")


          This page in the official documentation explains in more detail how to use custom exceptions correctly in flask.






          share|improve this answer











          $endgroup$








          • 1




            $begingroup$
            Thanks a lot for the advice. The info about raising exceptions is particularly useful. I think I will implement separate keys too for the sake of following a good practice, although in this case I feel pretty safe saying that the number of users isn't going to grow significantly in the future (it will be in the single digits). Thanks!
            $endgroup$
            – Duck Hunt Duo
            1 hour ago











          Your Answer






          StackExchange.ifUsing("editor", function ()
          StackExchange.using("externalEditor", function ()
          StackExchange.using("snippets", function ()
          StackExchange.snippets.init();
          );
          );
          , "code-snippets");

          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "196"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );






          Duck Hunt Duo is a new contributor. Be nice, and check out our Code of Conduct.









          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcodereview.stackexchange.com%2fquestions%2f219163%2fauthenticating-an-internal-api-with-flask%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          3












          $begingroup$

          Just because you don't have many people using this API now, this does not mean that this will always be the case.



          In addition, you might want to discriminate between the users of the API for various reasons:



          • To know how many there actually are

          • To know which user/application is generating all those requests suddenly

          • To rate-throttle some of them if needed

          • To disallow access for someone who abused the API or just left the company or an obsolete application

          I would at least set this up in a very barebone way to have different API keys. For now you can just hardcode them in a dictionary in the config file, but this allows you to easily extract them to a database at some future point (which may never come). You can manually add users when needed (if it is only a few), or write a page that adds a user (if the manual task becomes too much).



          In your config just have something like this:



          config.yml



          api_keys:
          08zEk8IC0le3I0kPwSF1g4XU9R5WgbpUq2vZkZ0pkQU: User 1
          ZtRE7FXwZdtCLMfFHWPTom7_d-4XFbXEkHR5bIdG2TM: User 2
          Wg1vaDs8uqFbYtNDsJ8H3gKjl_oI0T_O6Jg8qNLWJcU: App 1
          ...


          Your code needs to be only minimally changed:



          auth.py



          def valid_auth(func):
          @wraps(func)
          def func_wrapper(*args, **kwargs):
          if 'x-api-key' not in request.headers:
          return "Credentials not present in request", 401
          elif request.headers['x-api-key'] not in config['api_keys']:
          return "Credentials not valid", 401
          else:
          return func(*args, **kwargs)
          return func_wrapper


          Note that () around tuples are not needed in return since it is an expression and not a function.




          Returning a tuple of message, status code to raise in one case and the result of the function in another case can also be a potential source of bugs. If the using code expects the return value to be a single value, checking for there being two and those two being a string and an int is not very fool-proof. Even worse if the function actually also returns a string and int tuple.



          Instead, raise exceptions, which you can then deal with in api_function. Use custom classes inheriting from Exception:



          class NoCredentials(Exception):
          status_code = 401

          class WrongCredentials(Exception):
          status_code = 401

          ...
          if 'x-api-key' not in request.headers:
          raise NoCredentials("Credentials not present in request")


          This page in the official documentation explains in more detail how to use custom exceptions correctly in flask.






          share|improve this answer











          $endgroup$








          • 1




            $begingroup$
            Thanks a lot for the advice. The info about raising exceptions is particularly useful. I think I will implement separate keys too for the sake of following a good practice, although in this case I feel pretty safe saying that the number of users isn't going to grow significantly in the future (it will be in the single digits). Thanks!
            $endgroup$
            – Duck Hunt Duo
            1 hour ago















          3












          $begingroup$

          Just because you don't have many people using this API now, this does not mean that this will always be the case.



          In addition, you might want to discriminate between the users of the API for various reasons:



          • To know how many there actually are

          • To know which user/application is generating all those requests suddenly

          • To rate-throttle some of them if needed

          • To disallow access for someone who abused the API or just left the company or an obsolete application

          I would at least set this up in a very barebone way to have different API keys. For now you can just hardcode them in a dictionary in the config file, but this allows you to easily extract them to a database at some future point (which may never come). You can manually add users when needed (if it is only a few), or write a page that adds a user (if the manual task becomes too much).



          In your config just have something like this:



          config.yml



          api_keys:
          08zEk8IC0le3I0kPwSF1g4XU9R5WgbpUq2vZkZ0pkQU: User 1
          ZtRE7FXwZdtCLMfFHWPTom7_d-4XFbXEkHR5bIdG2TM: User 2
          Wg1vaDs8uqFbYtNDsJ8H3gKjl_oI0T_O6Jg8qNLWJcU: App 1
          ...


          Your code needs to be only minimally changed:



          auth.py



          def valid_auth(func):
          @wraps(func)
          def func_wrapper(*args, **kwargs):
          if 'x-api-key' not in request.headers:
          return "Credentials not present in request", 401
          elif request.headers['x-api-key'] not in config['api_keys']:
          return "Credentials not valid", 401
          else:
          return func(*args, **kwargs)
          return func_wrapper


          Note that () around tuples are not needed in return since it is an expression and not a function.




          Returning a tuple of message, status code to raise in one case and the result of the function in another case can also be a potential source of bugs. If the using code expects the return value to be a single value, checking for there being two and those two being a string and an int is not very fool-proof. Even worse if the function actually also returns a string and int tuple.



          Instead, raise exceptions, which you can then deal with in api_function. Use custom classes inheriting from Exception:



          class NoCredentials(Exception):
          status_code = 401

          class WrongCredentials(Exception):
          status_code = 401

          ...
          if 'x-api-key' not in request.headers:
          raise NoCredentials("Credentials not present in request")


          This page in the official documentation explains in more detail how to use custom exceptions correctly in flask.






          share|improve this answer











          $endgroup$








          • 1




            $begingroup$
            Thanks a lot for the advice. The info about raising exceptions is particularly useful. I think I will implement separate keys too for the sake of following a good practice, although in this case I feel pretty safe saying that the number of users isn't going to grow significantly in the future (it will be in the single digits). Thanks!
            $endgroup$
            – Duck Hunt Duo
            1 hour ago













          3












          3








          3





          $begingroup$

          Just because you don't have many people using this API now, this does not mean that this will always be the case.



          In addition, you might want to discriminate between the users of the API for various reasons:



          • To know how many there actually are

          • To know which user/application is generating all those requests suddenly

          • To rate-throttle some of them if needed

          • To disallow access for someone who abused the API or just left the company or an obsolete application

          I would at least set this up in a very barebone way to have different API keys. For now you can just hardcode them in a dictionary in the config file, but this allows you to easily extract them to a database at some future point (which may never come). You can manually add users when needed (if it is only a few), or write a page that adds a user (if the manual task becomes too much).



          In your config just have something like this:



          config.yml



          api_keys:
          08zEk8IC0le3I0kPwSF1g4XU9R5WgbpUq2vZkZ0pkQU: User 1
          ZtRE7FXwZdtCLMfFHWPTom7_d-4XFbXEkHR5bIdG2TM: User 2
          Wg1vaDs8uqFbYtNDsJ8H3gKjl_oI0T_O6Jg8qNLWJcU: App 1
          ...


          Your code needs to be only minimally changed:



          auth.py



          def valid_auth(func):
          @wraps(func)
          def func_wrapper(*args, **kwargs):
          if 'x-api-key' not in request.headers:
          return "Credentials not present in request", 401
          elif request.headers['x-api-key'] not in config['api_keys']:
          return "Credentials not valid", 401
          else:
          return func(*args, **kwargs)
          return func_wrapper


          Note that () around tuples are not needed in return since it is an expression and not a function.




          Returning a tuple of message, status code to raise in one case and the result of the function in another case can also be a potential source of bugs. If the using code expects the return value to be a single value, checking for there being two and those two being a string and an int is not very fool-proof. Even worse if the function actually also returns a string and int tuple.



          Instead, raise exceptions, which you can then deal with in api_function. Use custom classes inheriting from Exception:



          class NoCredentials(Exception):
          status_code = 401

          class WrongCredentials(Exception):
          status_code = 401

          ...
          if 'x-api-key' not in request.headers:
          raise NoCredentials("Credentials not present in request")


          This page in the official documentation explains in more detail how to use custom exceptions correctly in flask.






          share|improve this answer











          $endgroup$



          Just because you don't have many people using this API now, this does not mean that this will always be the case.



          In addition, you might want to discriminate between the users of the API for various reasons:



          • To know how many there actually are

          • To know which user/application is generating all those requests suddenly

          • To rate-throttle some of them if needed

          • To disallow access for someone who abused the API or just left the company or an obsolete application

          I would at least set this up in a very barebone way to have different API keys. For now you can just hardcode them in a dictionary in the config file, but this allows you to easily extract them to a database at some future point (which may never come). You can manually add users when needed (if it is only a few), or write a page that adds a user (if the manual task becomes too much).



          In your config just have something like this:



          config.yml



          api_keys:
          08zEk8IC0le3I0kPwSF1g4XU9R5WgbpUq2vZkZ0pkQU: User 1
          ZtRE7FXwZdtCLMfFHWPTom7_d-4XFbXEkHR5bIdG2TM: User 2
          Wg1vaDs8uqFbYtNDsJ8H3gKjl_oI0T_O6Jg8qNLWJcU: App 1
          ...


          Your code needs to be only minimally changed:



          auth.py



          def valid_auth(func):
          @wraps(func)
          def func_wrapper(*args, **kwargs):
          if 'x-api-key' not in request.headers:
          return "Credentials not present in request", 401
          elif request.headers['x-api-key'] not in config['api_keys']:
          return "Credentials not valid", 401
          else:
          return func(*args, **kwargs)
          return func_wrapper


          Note that () around tuples are not needed in return since it is an expression and not a function.




          Returning a tuple of message, status code to raise in one case and the result of the function in another case can also be a potential source of bugs. If the using code expects the return value to be a single value, checking for there being two and those two being a string and an int is not very fool-proof. Even worse if the function actually also returns a string and int tuple.



          Instead, raise exceptions, which you can then deal with in api_function. Use custom classes inheriting from Exception:



          class NoCredentials(Exception):
          status_code = 401

          class WrongCredentials(Exception):
          status_code = 401

          ...
          if 'x-api-key' not in request.headers:
          raise NoCredentials("Credentials not present in request")


          This page in the official documentation explains in more detail how to use custom exceptions correctly in flask.







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited 59 mins ago

























          answered 3 hours ago









          GraipherGraipher

          27.8k54499




          27.8k54499







          • 1




            $begingroup$
            Thanks a lot for the advice. The info about raising exceptions is particularly useful. I think I will implement separate keys too for the sake of following a good practice, although in this case I feel pretty safe saying that the number of users isn't going to grow significantly in the future (it will be in the single digits). Thanks!
            $endgroup$
            – Duck Hunt Duo
            1 hour ago












          • 1




            $begingroup$
            Thanks a lot for the advice. The info about raising exceptions is particularly useful. I think I will implement separate keys too for the sake of following a good practice, although in this case I feel pretty safe saying that the number of users isn't going to grow significantly in the future (it will be in the single digits). Thanks!
            $endgroup$
            – Duck Hunt Duo
            1 hour ago







          1




          1




          $begingroup$
          Thanks a lot for the advice. The info about raising exceptions is particularly useful. I think I will implement separate keys too for the sake of following a good practice, although in this case I feel pretty safe saying that the number of users isn't going to grow significantly in the future (it will be in the single digits). Thanks!
          $endgroup$
          – Duck Hunt Duo
          1 hour ago




          $begingroup$
          Thanks a lot for the advice. The info about raising exceptions is particularly useful. I think I will implement separate keys too for the sake of following a good practice, although in this case I feel pretty safe saying that the number of users isn't going to grow significantly in the future (it will be in the single digits). Thanks!
          $endgroup$
          – Duck Hunt Duo
          1 hour ago










          Duck Hunt Duo is a new contributor. Be nice, and check out our Code of Conduct.









          draft saved

          draft discarded


















          Duck Hunt Duo is a new contributor. Be nice, and check out our Code of Conduct.












          Duck Hunt Duo is a new contributor. Be nice, and check out our Code of Conduct.











          Duck Hunt Duo is a new contributor. Be nice, and check out our Code of Conduct.














          Thanks for contributing an answer to Code Review Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          Use MathJax to format equations. MathJax reference.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcodereview.stackexchange.com%2fquestions%2f219163%2fauthenticating-an-internal-api-with-flask%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          یوتیوب محتویات پیشینه[ویرایش] فناوری‌های ویدئویی[ویرایش] شوخی‌های آوریل[ویرایش] سانسور و فیلترینگ[ویرایش] آمار و ارقامی از یوتیوب[ویرایش] تأثیر اجتماعی[ویرایش] سیاست اجتماعی[ویرایش] نمودارها[ویرایش] یادداشت‌ها[ویرایش] پانویس[ویرایش] پیوند به بیرون[ویرایش] منوی ناوبریبررسی شده‌استYouTube.com[بروزرسانی]"Youtube.com Site Info""زبان‌های یوتیوب""Surprise! There's a third YouTube co-founder"سایت یوتیوب برای چندمین بار در ایران فیلتر شدنسخهٔ اصلیسالار کمانگر جوان آمریکایی ایرانی الاصل مدیر سایت یوتیوب شدنسخهٔ اصلیVideo websites pop up, invite postingsthe originalthe originalYouTube: Overnight success has sparked a backlashthe original"Me at the zoo"YouTube serves up 100 million videos a day onlinethe originalcomScore Releases May 2010 U.S. Online Video Rankingsthe originalYouTube hits 4 billion daily video viewsthe originalYouTube users uploading two days of video every minutethe originalEric Schmidt, Princeton Colloquium on Public & Int'l Affairsthe original«Streaming Dreams»نسخهٔ اصلیAlexa Traffic Rank for YouTube (three month average)the originalHelp! YouTube is killing my business!the originalUtube sues YouTubethe originalGoogle closes $A2b YouTube dealthe originalFlash moves on to smart phonesthe originalYouTube HTML5 Video Playerنسخهٔ اصلیYouTube HTML5 Video Playerthe originalGoogle tries freeing Web video with WebMthe originalVideo length for uploadingthe originalYouTube caps video lengths to reduce infringementthe originalAccount Types: Longer videosthe originalYouTube bumps video limit to 15 minutesthe originalUploading large files and resumable uploadingthe originalVideo Formats: File formatsthe originalGetting Started: File formatsthe originalThe quest for a new video codec in Flash 8the originalAdobe Flash Video File Format Specification Version 10.1the originalYouTube Mobile goes livethe originalYouTube videos go HD with a simple hackthe originalYouTube now supports 4k-resolution videosthe originalYouTube to get high-def 1080p playerthe original«Approximate YouTube Bitrates»نسخهٔ اصلی«Bigger and Better: Encoding for YouTube 720p HD»نسخهٔ اصلی«YouTube's 1080p – Failure Depends on How You Look At It»نسخهٔ اصلیYouTube in 3Dthe originalYouTube in 3D?the originalYouTube 3D Videosthe originalYouTube adds a dimension, 3D goggles not includedthe originalYouTube Adds Stereoscopic 3D Video Support (And 3D Vision Support, Too)the original«Sharing YouTube Videos»نسخهٔ اصلی«Downloading videos from YouTube is not supported, except for one instance when it is permitted.»نسخهٔ اصلی«Terms of Use, 5.B»نسخهٔ اصلی«Some YouTube videos get download option»نسخهٔ اصلی«YouTube looks out for content owners, disables video ripping»«Downloading videos from YouTube is not supported, except for one instance when it is permitted.»نسخهٔ اصلی«YouTube Hopes To Boost Revenue With Video Downloads»نسخهٔ اصلی«YouTube Mobile»نسخهٔ اصلی«YouTube Live on Apple TV Today; Coming to iPhone on June 29»نسخهٔ اصلی«Goodbye Flash: YouTube mobile goes HTML5 on iPhone and Android»نسخهٔ اصلی«YouTube Mobile Goes HTML5, Video Quality Beats Native Apps Hands Down»نسخهٔ اصلی«TiVo Getting YouTube Streaming Today»نسخهٔ اصلی«YouTube video comes to Wii and PlayStation 3 game consoles»نسخهٔ اصلی«Coming Up Next... YouTube on Your TV»نسخهٔ اصلی«Experience YouTube XL on the Big Screen»نسخهٔ اصلی«Xbox Live Getting Live TV, YouTube & Bing Voice Search»نسخهٔ اصلی«YouTube content locations»نسخهٔ اصلی«April fools: YouTube turns the world up-side-down»نسخهٔ اصلی«YouTube goes back to 1911 for April Fools' Day»نسخهٔ اصلی«Simon Cowell's bromance, the self-driving Nascar and Hungry Hippos for iPad... the best April Fools' gags»نسخهٔ اصلی"YouTube Announces It Will Shut Down""YouTube Adds Darude 'Sandstorm' Button To Its Videos For April Fools' Day"«Censorship fears rise as Iran blocks access to top websites»نسخهٔ اصلی«China 'blocks YouTube video site'»نسخهٔ اصلی«YouTube shut down in Morocco»نسخهٔ اصلی«Thailand blocks access to YouTube»نسخهٔ اصلی«Ban on YouTube lifted after deal»نسخهٔ اصلی«Google's Gatekeepers»نسخهٔ اصلی«Turkey goes into battle with Google»نسخهٔ اصلی«Turkey lifts two-year ban on YouTube»نسخهٔ اصلیسانسور در ترکیه به یوتیوب رسیدلغو فیلترینگ یوتیوب در ترکیه«Pakistan blocks YouTube website»نسخهٔ اصلی«Pakistan lifts the ban on YouTube»نسخهٔ اصلی«Pakistan blocks access to YouTube in internet crackdown»نسخهٔ اصلی«Watchdog urges Libya to stop blocking websites»نسخهٔ اصلی«YouTube»نسخهٔ اصلی«Due to abuses of religion, customs Emirates, YouTube is blocked in the UAE»نسخهٔ اصلی«Google Conquered The Web - An Ultimate Winner»نسخهٔ اصلی«100 million videos are viewed daily on YouTube»نسخهٔ اصلی«Harry and Charlie Davies-Carr: Web gets taste for biting baby»نسخهٔ اصلی«Meet YouTube's 224 million girl, Natalie Tran»نسخهٔ اصلی«YouTube to Double Down on Its 'Channel' Experiment»نسخهٔ اصلی«13 Some Media Companies Choose to Profit From Pirated YouTube Clips»نسخهٔ اصلی«Irate HK man unlikely Web hero»نسخهٔ اصلی«Web Guitar Wizard Revealed at Last»نسخهٔ اصلی«Charlie bit my finger – again!»نسخهٔ اصلی«Lowered Expectations: Web Redefines 'Quality'»نسخهٔ اصلی«YouTube's 50 Greatest Viral Videos»نسخهٔ اصلیYouTube Community Guidelinesthe original«Why did my YouTube account get closed down?»نسخهٔ اصلی«Why do I have a sanction on my account?»نسخهٔ اصلی«Is YouTube's three-strike rule fair to users?»نسخهٔ اصلی«Viacom will sue YouTube for $1bn»نسخهٔ اصلی«Mediaset Files EUR500 Million Suit Vs Google's YouTube»نسخهٔ اصلی«Premier League to take action against YouTube»نسخهٔ اصلی«YouTube law fight 'threatens net'»نسخهٔ اصلی«Google must divulge YouTube log»نسخهٔ اصلی«Google Told to Turn Over User Data of YouTube»نسخهٔ اصلی«US judge tosses out Viacom copyright suit against YouTube»نسخهٔ اصلی«Google and Viacom: YouTube copyright lawsuit back on»نسخهٔ اصلی«Woman can sue over YouTube clip de-posting»نسخهٔ اصلی«YouTube loses court battle over music clips»نسخهٔ اصلیYouTube to Test Software To Ease Licensing Fightsthe original«Press Statistics»نسخهٔ اصلی«Testing YouTube's Audio Content ID System»نسخهٔ اصلی«Content ID disputes»نسخهٔ اصلیYouTube Community Guidelinesthe originalYouTube criticized in Germany over anti-Semitic Nazi videosthe originalFury as YouTube carries sick Hillsboro video insultthe originalYouTube attacked by MPs over sex and violence footagethe originalAl-Awlaki's YouTube Videos Targeted by Rep. Weinerthe originalYouTube Withdraws Cleric's Videosthe originalYouTube is letting users decide on terrorism-related videosthe original«Time's Person of the Year: You»نسخهٔ اصلی«Our top 10 funniest YouTube comments – what are yours?»نسخهٔ اصلی«YouTube's worst comments blocked by filter»نسخهٔ اصلی«Site Info YouTube»نسخهٔ اصلیوبگاه YouTubeوبگاه موبایل YouTubeوووووو

          Magento 2 - Auto login with specific URL Planned maintenance scheduled April 23, 2019 at 23:30 UTC (7:30pm US/Eastern) Announcing the arrival of Valued Associate #679: Cesar Manara Unicorn Meta Zoo #1: Why another podcast?Customer can't login - Page refreshes but nothing happensCustom Login page redirectURL to login with redirect URL after completionCustomer login is case sensitiveLogin with phone number or email address - Magento 1.9Magento 2: Set Customer Account Confirmation StatusCustomer auto connect from URLHow to call customer login form in the custom module action magento 2?Change of customer login error message magento2Referrer URL in modal login form

          Rest API with Magento using PHP with example. Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) Announcing the arrival of Valued Associate #679: Cesar Manara Unicorn Meta Zoo #1: Why another podcast?How to update product using magento client library for PHP?Oauth Error while extending Magento Rest APINot showing my custom api in wsdl(url) and web service list?Using Magento API(REST) via IXMLHTTPRequest COM ObjectHow to login in Magento website using REST APIREST api call for Guest userMagento API calling using HTML and javascriptUse API rest media management by storeView code (admin)Magento REST API Example ErrorsHow to log all rest api calls in magento2?How to update product using magento client library for PHP?