Understanding HTTP and Authorization Methods

Modified on Mon, 18 Nov at 12:09 PM

TABLE OF CONTENTS

1. What is HTTP?

2. HTTP Methods

3. Authorization Methods

1. What is HTTP?

HTTP (Hypertext Transfer Protocol) is the protocol used to enable communication between a client (such as a web browser) and a server. It allows web browsers and servers to exchange information, such as loading web pages, submitting forms, or interacting with online resources.

When you access a website, your browser sends an HTTP request to the server, which then responds with the requested data, like a webpage, image, or file. HTTP plays a crucial role in ensuring that your web browsing experience is smooth and interactive.

2. HTTP Methods

The following table describes HTTP methods and its description: 


HTTP Methods Description 
GET This method is used to request data from a specified resource.
POSTThis method is used to send data to a server to create/update a resource.
PUTThis PUT is used to send data to a server to create/update a resource.
DELETEThe DELETE method deletes the specified resource.
PATCH The PATCH method is used to apply partial modifications to a resource
OPTIONS 

The OPTIONS method describes the communication options for the target resource. 


3. Authorization Methods

The following table describes Authorization methods  and its description: 

Authorization Type Description 
No AuthNo Authentication (No Auth) means that the service or system does not require you to sign in or provide any identifying information to use it. You can access the service without needing a username, password, or other forms of verification.
Bearer Token

A Bearer Token is a type of access token used to confirm your identity and grant you access to a service or resource. When you use a Bearer Token, you don’t need to share your username and password. Instead, the token serves as proof that you are authorized to use the service, and you include it in your request to access the resource. 

Basic Auth

Basic Authentication is a method used to verify your identity when accessing a service. When you log in, you'll provide your username and password. These credentials are then sent with each request you make to the service.
For security reasons, it's important that Basic Authentication is used with a secure connection (like HTTPS), which ensures that your login information is encrypted and protected from being seen by others. Make sure that the connection is secure when you are using Basic Authentication.

Auth 2.0 OAuth 2.0 is an authorization framework that enables third-party applications to access resources on behalf of a user without requiring the user to share their password. Instead of providing login credentials, the user grants limited access to their data through tokens that can be scoped and time-limited. This allows for secure interaction between services while keeping the user's credentials private.








Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article