TODO: Authentication Method
Team Input Needed: We need to document the actual authentication method used by api.ipster.com
- Do we use Bearer tokens? JWT? API keys? Supabase auth?
- Where do developers get their tokens/keys?
- How do tokens expire and refresh?
- What’s the token format and where to include it in requests?
TODO: Permission Levels
Questions for the team:- What are the different permission levels? (Admin, User, Client, etc.)
- Which endpoints require which permissions?
- How do we handle organization-level permissions?
- Do we have role-based access control (RBAC)?
TODO: Example Request
Once we know the auth method, we’ll add examples like:TODO: Error Responses
Questions for the team:- What error codes do we return for auth failures? (401, 403, etc.)
- What’s the error response format?
- Do we have specific error messages for different auth scenarios?
TODO: Security Best Practices
Questions for the team:- Any rate limiting on authentication endpoints?
- Token storage recommendations for frontend?
- CORS configuration details?
- Any IP restrictions or other security measures?