{"id":4309,"date":"2022-10-20T07:44:53","date_gmt":"2022-10-20T07:44:53","guid":{"rendered":"https:\/\/ccbill.com\/kb\/?p=4309"},"modified":"2023-03-06T08:59:30","modified_gmt":"2023-03-06T08:59:30","slug":"authorization-bearer","status":"publish","type":"post","link":"https:\/\/ccbill.com\/kb\/authorization-bearer","title":{"rendered":"Bearer Authentication Explained"},"content":{"rendered":"\n<p class=\"h3\">Introduction<\/p>\n\n\n\n<p>Data security is the most important component of every information technology system. Knowing who is accessing data and determining their level of access and what actions they can perform is a top-level priority for every business handling sensitive information.<\/p>\n\n\n\n<p>Answering the question \u201cwho is accessing data?\u201d is done via a process called authentication \u2013 the act of checking and proving the identity of an end-user or application. Authentication is performed in several ways, called schemes. One of those schemes is bearer authorization i.e. authentication.<\/p>\n\n\n\n<p>Find out what bearer authentication is, what bearer tokens are, and how the authentication process works.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png\" alt=\"API authenticating a client application via bearer tokens.\" class=\"wp-image-4310\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained-300x150.png 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained-768x384.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is Bearer Authentication?<\/h2>\n\n\n\n<p>Bearer authentication is an HTTP authentication scheme that uses bearer tokens. It was introduced in <a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc6750\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">RFC 6750<\/a>, and is commonly used within the <a rel=\"noreferrer noopener\" href=\"https:\/\/ccbill.com\/kb\/what-is-oauth\" target=\"_blank\">OAuth 2.0<\/a> framework but can also be used separately.<\/p>\n\n\n\n<p>Bearer authentication arose from the need to replace the digital signature workflow present in OAuth 1.0. Abandoning the cryptographic foundation of OAuth 1.0 made OAuth 2.0 easier to set up and use, and simplified key management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Bearer Token?<\/h2>\n\n\n\n<p>A bearer token is an encrypted string generated by an authentication server. It is a type of access token that authorization servers use to establish the identity of its bearers (owners). These tokens grant client applications access to <a href=\"https:\/\/ccbill.com\/kb\/what-is-an-api\" target=\"_blank\" rel=\"noreferrer noopener\">APIs<\/a> and protected resources.<\/p>\n\n\n\n<p>Bearer tokens are predominantly used within an OAuth 2.0 workflow and require the use of HTTPS\/TLS to remain secure.<\/p>\n\n\n\n<p>By data type, bearer tokens can be:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Strings of various lengths containing hexadecimal characters.&nbsp;<\/li>\n\n\n\n<li>Structured tokens, such as JSON Web Tokens (JWT).<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How Does Bearer Authentication Work?<\/h2>\n\n\n\n<p>The bearer authentication flow consists of the following steps:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>A client application owner registers the app with a resource owner\/API provider.&nbsp;<\/li>\n\n\n\n<li>The resource owner provides the client application owner with a client ID and client secret.&nbsp;<\/li>\n\n\n\n<li>The client application makes an <a href=\"https:\/\/ccbill.com\/kb\/what-is-an-api-call\" target=\"_blank\" rel=\"noreferrer noopener\">API call<\/a> to request a bearer token.&nbsp;<\/li>\n\n\n\n<li>The API asks the client application to provide the credentials (ID and secret) that will be associated with the bearer token.&nbsp;<\/li>\n\n\n\n<li>The client application enters the credentials.&nbsp;<\/li>\n\n\n\n<li>The API checks the credentials and if they are valid, returns a bearer token.&nbsp;<\/li>\n\n\n\n<li>The client application uses its bearer token and client ID to generate short-lived access tokens, which will be used to make API calls.&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>The example below is how <a href=\"https:\/\/ccbill.com\/merchants\" target=\"_blank\" rel=\"noreferrer noopener\">CCBill merchants<\/a> generate an access token to use <a href=\"https:\/\/ccbill.com\/doc\/ccbill-restful-transaction-api\" target=\"_blank\" rel=\"noreferrer noopener\">CCBill\u2019s payment API<\/a>:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>curl -X POST \n\\ \n&#039;https:\/\/api.ccbill.com\/ccbill-auth\/oauth\/token&#039; \n\\ \n-i -u &#039;MERCHANT_APPLICATION_ID:APPLICATION_SECRET&#039; \n\\ \n-H &#039;Content-Type: application\/x-www-form-urlencoded&#039; \n\\ \n-d &#039;grant_type=client_credentials&#039; <\/code><\/pre>\n\n\n\n<p>The bearer token is proof that a client application is registered and allowed to access protected resources. Because of that, every access token request must contain a valid <strong>bearer token value<\/strong> in the authorization header of each API call, expressed like this:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Authorization: Bearer &lt;bearertokenvalue&gt; <\/code><\/pre>\n\n\n\n<p>The reason for this specific format is that many servers support several authentication schemes, for example:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Basic<\/li>\n\n\n\n<li>Digest<\/li>\n\n\n\n<li>Negotiate<\/li>\n\n\n\n<li>AWS4-HMAC-SHA256<\/li>\n<\/ul>\n\n\n\n<p>In such cases, simply entering the token value without specifying the authentication scheme is not sufficient and results in a failed authentication request.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is a Bearer Token Secure?<\/h2>\n\n\n\n<p>Regardless of the data type used, bearer tokens are designed not to reveal any sensitive information. However, the bearer authentication scheme rests on the assumption that the token user is also the rightful token owner.&nbsp;<\/p>\n\n\n\n<p>Implementing a bearer authentication flow without additional security mechanisms is not considered safe. If tokens were to leak, nothing could stop unauthorized applications from using them.&nbsp;<\/p>\n\n\n\n<p>It is up to resource owners and client application owners to analyze their security needs and use those insights to identify:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The authentication method that suits their workflow and business model.&nbsp;<\/li>\n\n\n\n<li>The right security measures to implement.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Besides bearer authentication, other commonly used authentication methods include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/ccbill.com\/kb\/curl-basic-auth\" target=\"_blank\" rel=\"noreferrer noopener\">Basic authentication<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/ccbill.com\/kb\/what-is-an-api-key\" target=\"_blank\" rel=\"noreferrer noopener\">API keys<\/a>&nbsp;<\/li>\n\n\n\n<li>OpenID Connect&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Some of the basic security measures that protect bearer tokens and prevent their misuse are:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HTTPS\/TLS (mandatory).&nbsp;<\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication\" target=\"_blank\">Two-Factor Authentication<\/a> in applications.&nbsp;<\/li>\n\n\n\n<li>Educating client application owners on best token protection practices.&nbsp;<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-css-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<p><strong>Note:<\/strong> For more on cybersecurity for businesses, read <a rel=\"noreferrer noopener\" href=\"https:\/\/phoenixnap.com\/blog\/what-is-cyber-security\" target=\"_blank\">What is Cybersecurity? Challenges and Threats Organizations Face<\/a>.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-css-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"h3\">Conclusion&nbsp;<\/p>\n\n\n\n<p>Bearer authentication is not secure enough as the sole API security mechanism for banking systems and other applications handling sensitive information. However, this easy-to-implement flow works for social networking applications, games, and other low-risk applications.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Check your business\u2019s security and compliance needs to determine which type of authentication method to use.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This guide explains what bearer tokens and bearer authentication are, how the authentication process works, and how to make the data flow secure.<\/p>\n","protected":false},"author":13,"featured_media":4310,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13,14],"tags":[],"class_list":["post-4309","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-payment-processing","category-web-development"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bearer Authentication Explained | CCBill KB<\/title>\n<meta name=\"description\" content=\"Find out what bearer tokens and bearer authentication are, how the authentication process works, and how to make the data flow secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ccbill.com\/kb\/authorization-bearer\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bearer Authentication Explained | CCBill KB\" \/>\n<meta property=\"og:description\" content=\"Find out what bearer tokens and bearer authentication are, how the authentication process works, and how to make the data flow secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ccbill.com\/kb\/authorization-bearer\" \/>\n<meta property=\"og:site_name\" content=\"CCBill Knowledge Base\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ccbillBIZ\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-20T07:44:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T08:59:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mirjana Tosic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CCBillBIZ\" \/>\n<meta name=\"twitter:site\" content=\"@CCBillBIZ\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mirjana Tosic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer#article\",\"isPartOf\":{\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer\"},\"author\":{\"name\":\"Mirjana Tosic\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/person\/aafe23f5acc151902c3d0955500581dc\"},\"headline\":\"Bearer Authentication Explained\",\"datePublished\":\"2022-10-20T07:44:53+00:00\",\"dateModified\":\"2023-03-06T08:59:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer\"},\"wordCount\":730,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#organization\"},\"image\":{\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png\",\"articleSection\":[\"Payment Processing\",\"Web Development\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ccbill.com\/kb\/authorization-bearer#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer\",\"url\":\"https:\/\/ccbill.com\/kb\/authorization-bearer\",\"name\":\"Bearer Authentication Explained | CCBill KB\",\"isPartOf\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png\",\"datePublished\":\"2022-10-20T07:44:53+00:00\",\"dateModified\":\"2023-03-06T08:59:30+00:00\",\"description\":\"Find out what bearer tokens and bearer authentication are, how the authentication process works, and how to make the data flow secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ccbill.com\/kb\/authorization-bearer\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer#primaryimage\",\"url\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png\",\"contentUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png\",\"width\":800,\"height\":400,\"caption\":\"API authenticating a client application via bearer tokens.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ccbill.com\/kb\/authorization-bearer#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"KB Home\",\"item\":\"https:\/\/ccbill.com\/kb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Payment Processing\",\"item\":\"https:\/\/ccbill.com\/kb\/category\/payment-processing\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bearer Authentication Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ccbill.com\/kb\/#website\",\"url\":\"https:\/\/ccbill.com\/kb\/\",\"name\":\"CCBill Knowledge Base\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ccbill.com\/kb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ccbill.com\/kb\/#organization\",\"name\":\"CCBill\",\"url\":\"https:\/\/ccbill.com\/kb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png\",\"contentUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png\",\"width\":160,\"height\":70,\"caption\":\"CCBill\"},\"image\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ccbillBIZ\/\",\"https:\/\/x.com\/CCBillBIZ\",\"https:\/\/www.linkedin.com\/company\/ccbill\",\"https:\/\/www.youtube.com\/c\/CCBillBiz\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/person\/aafe23f5acc151902c3d0955500581dc\",\"name\":\"Mirjana Tosic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8ee0e92286c77cd8bcc10b1a3ae2090ca031b41c53f0b1e803e6b69e4bea8409?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8ee0e92286c77cd8bcc10b1a3ae2090ca031b41c53f0b1e803e6b69e4bea8409?s=96&d=mm&r=g\",\"caption\":\"Mirjana Tosic\"},\"description\":\"Mirjana Tosic is a Technical Writer with a background in Web Design and Development. Despite being one of the youngest members of CCBill, her writing skills and technical aptitude help her produce factual, informative, and user-friendly content. If not writing or learning a new skill, you'll find her binging fintech and marketing videos or gaming.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bearer Authentication Explained | CCBill KB","description":"Find out what bearer tokens and bearer authentication are, how the authentication process works, and how to make the data flow secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ccbill.com\/kb\/authorization-bearer","og_locale":"en_US","og_type":"article","og_title":"Bearer Authentication Explained | CCBill KB","og_description":"Find out what bearer tokens and bearer authentication are, how the authentication process works, and how to make the data flow secure.","og_url":"https:\/\/ccbill.com\/kb\/authorization-bearer","og_site_name":"CCBill Knowledge Base","article_publisher":"https:\/\/www.facebook.com\/ccbillBIZ\/","article_published_time":"2022-10-20T07:44:53+00:00","article_modified_time":"2023-03-06T08:59:30+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png","type":"image\/png"}],"author":"Mirjana Tosic","twitter_card":"summary_large_image","twitter_creator":"@CCBillBIZ","twitter_site":"@CCBillBIZ","twitter_misc":{"Written by":"Mirjana Tosic","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ccbill.com\/kb\/authorization-bearer#article","isPartOf":{"@id":"https:\/\/ccbill.com\/kb\/authorization-bearer"},"author":{"name":"Mirjana Tosic","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/person\/aafe23f5acc151902c3d0955500581dc"},"headline":"Bearer Authentication Explained","datePublished":"2022-10-20T07:44:53+00:00","dateModified":"2023-03-06T08:59:30+00:00","mainEntityOfPage":{"@id":"https:\/\/ccbill.com\/kb\/authorization-bearer"},"wordCount":730,"commentCount":0,"publisher":{"@id":"https:\/\/ccbill.com\/kb\/#organization"},"image":{"@id":"https:\/\/ccbill.com\/kb\/authorization-bearer#primaryimage"},"thumbnailUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png","articleSection":["Payment Processing","Web Development"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ccbill.com\/kb\/authorization-bearer#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ccbill.com\/kb\/authorization-bearer","url":"https:\/\/ccbill.com\/kb\/authorization-bearer","name":"Bearer Authentication Explained | CCBill KB","isPartOf":{"@id":"https:\/\/ccbill.com\/kb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ccbill.com\/kb\/authorization-bearer#primaryimage"},"image":{"@id":"https:\/\/ccbill.com\/kb\/authorization-bearer#primaryimage"},"thumbnailUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png","datePublished":"2022-10-20T07:44:53+00:00","dateModified":"2023-03-06T08:59:30+00:00","description":"Find out what bearer tokens and bearer authentication are, how the authentication process works, and how to make the data flow secure.","breadcrumb":{"@id":"https:\/\/ccbill.com\/kb\/authorization-bearer#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ccbill.com\/kb\/authorization-bearer"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ccbill.com\/kb\/authorization-bearer#primaryimage","url":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png","contentUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2022\/10\/bearer-authentication-explained.png","width":800,"height":400,"caption":"API authenticating a client application via bearer tokens."},{"@type":"BreadcrumbList","@id":"https:\/\/ccbill.com\/kb\/authorization-bearer#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"KB Home","item":"https:\/\/ccbill.com\/kb\/"},{"@type":"ListItem","position":2,"name":"Payment Processing","item":"https:\/\/ccbill.com\/kb\/category\/payment-processing"},{"@type":"ListItem","position":3,"name":"Bearer Authentication Explained"}]},{"@type":"WebSite","@id":"https:\/\/ccbill.com\/kb\/#website","url":"https:\/\/ccbill.com\/kb\/","name":"CCBill Knowledge Base","description":"","publisher":{"@id":"https:\/\/ccbill.com\/kb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ccbill.com\/kb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ccbill.com\/kb\/#organization","name":"CCBill","url":"https:\/\/ccbill.com\/kb\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/","url":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png","contentUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png","width":160,"height":70,"caption":"CCBill"},"image":{"@id":"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ccbillBIZ\/","https:\/\/x.com\/CCBillBIZ","https:\/\/www.linkedin.com\/company\/ccbill","https:\/\/www.youtube.com\/c\/CCBillBiz"]},{"@type":"Person","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/person\/aafe23f5acc151902c3d0955500581dc","name":"Mirjana Tosic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8ee0e92286c77cd8bcc10b1a3ae2090ca031b41c53f0b1e803e6b69e4bea8409?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8ee0e92286c77cd8bcc10b1a3ae2090ca031b41c53f0b1e803e6b69e4bea8409?s=96&d=mm&r=g","caption":"Mirjana Tosic"},"description":"Mirjana Tosic is a Technical Writer with a background in Web Design and Development. Despite being one of the youngest members of CCBill, her writing skills and technical aptitude help her produce factual, informative, and user-friendly content. If not writing or learning a new skill, you'll find her binging fintech and marketing videos or gaming."}]}},"_links":{"self":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts\/4309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/comments?post=4309"}],"version-history":[{"count":13,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts\/4309\/revisions"}],"predecessor-version":[{"id":4763,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts\/4309\/revisions\/4763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/media\/4310"}],"wp:attachment":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/media?parent=4309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/categories?post=4309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/tags?post=4309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}