News

They also have different security models on top of that. Some use REST, some use SOAP and so on. For security, some use certificates, some use API keys, which we’ll examine in the next section.