Access Token management
GetBlock uses a secure authentication method based on access tokens to ensure that only authorized users can interact with blockchain nodes.
Every endpoint you create is assigned a unique access token:
The <ACCESS_TOKEN> authenticates requests directly through the endpoint URL.
Making an authenticated request
To make a request, include your full endpoint URL with the access token in the path.
Access tokens cannot be sent in headers.
For example, here’s how to fetch the latest Ethereum block number:
Response:
Access Token security
Always store your access tokens securely. Avoid exposing them in publicly accessible code repositories or logs.
If a token is compromised, you can quickly roll or delete it without disrupting other endpoints:
Go to your GetBlock Dashboard.
Locate the endpoint associated with the token.
Select the option to either roll (regenerate) or delete the token.
This authentication method ensures that all your interactions with GetBlock’s services remain secure, reliable, and easy to manage.
Last updated