Authentication methods
Integrators have two options when creating a user account. This method will be used in the future to authenticate the user when making transactions.| Auth Method | Description |
|---|---|
| OTP via email | This method is easier to implement, but is a little less secure, since it relies on access to the end user’s email account. |
| Passkey | This method is more cryptographically secure, since it directly links the end user’s device to authentication. Integrators must implement both the passkey creation process and the authentication flow, making it more technically challenging to implement. |
Technical implementation
- OTP Auth
- Passkey Creation
- Passkey Authentication
Setup:User does not need to do anything to set up this method.Authentication flow:
- Prepare the transaction: The user calls the
/query/init-[action]endpoint to receive an OTP via email. - Authenticate with OTP: The user will receive an OTP code via email and needs to enter it in the user interface.
- Complete the transaction: The user calls the
/submit/send-transaction-otpendpoint to sign and execute the transaction with the OTP code.

