- Management UI — session-based login at
/secure/. - REST API — HTTP request-level authentication on all write endpoints (
PUT,DELETE).
REST API authentication
All write operations on the REST API require credentials. Two schemes are supported:- Bearer token (recommended)
- Basic Auth (legacy)
Available since v6.0.7. Pass a token in the Example with curl:Tokens are created and managed in Administration > Security > User Tokens in the management UI. Each token is associated with a user account. Revoke a token at any time from the same page.
Authorization header:Which endpoints require authentication?
| Method | Path | Auth required |
|---|---|---|
| GET | /{ServiceGroupId} | No |
| PUT | /{ServiceGroupId} | Yes |
| DELETE | /{ServiceGroupId} | Yes |
| GET | /{ServiceGroupId}/services/{DocumentTypeId} | No |
| PUT | /{ServiceGroupId}/services/{DocumentTypeId} | Yes |
| DELETE | /{ServiceGroupId}/services/{DocumentTypeId} | Yes |
| GET | /businesscard/{ServiceGroupId} | No |
| PUT | /businesscard/{ServiceGroupId} | Yes |
| DELETE | /businesscard/{ServiceGroupId} | Yes |
Management UI login
The management UI at/secure/ uses server-side session authentication managed by the ph-oton framework. Sessions are maintained via a browser cookie.
Default credentials
| Field | Default value |
|---|---|
[email protected] | |
| Password | password |
Login error details
By default the login page may indicate whether the email or the password was wrong. Disable this in production to avoid user enumeration:Creating and managing user tokens
Create a new token
Click Create new User Token. Assign it to a user account and optionally set an expiry date. Copy the generated token value — it is shown only once.
Security recommendations
- Prefer Bearer tokens over Basic Auth for all API clients.
- Use HTTPS in production. Basic Auth over plain HTTP sends credentials in clear text.
- Disable login error details in production (
webapp.security.login.errordetails = false). - Change the default admin password immediately after installation.
- Rotate tokens regularly and revoke any that are no longer in use.
- Avoid exposing
/secure/to the public internet where possible; restrict with a firewall or reverse-proxy ACL.