Security term of definitions
The security term
12 Security words
The words appearing in a unique order, generated in the Business Application. A business representative (e.g. a user of Business Application) can use them to generate their encryption keys.
A combination of letters, numbers and symbols, generated by Business Application once a user types in their 12 security words in the correct order. These keys can be downloaded in a protected file and a user can store it in a safe place. To unlock this protected file in the future, a user should create their encryption password before downloading the file.
Encryption keys are used to decrypt the encrypted customer data, which a user got access to.
A password that users must create to be able to unlock a protected file, which contains their encryption keys.
Client ID and Client secret
A combination of ID and password, generated by Business Application. A user should record them once they are generated, as they will be visible only once.
– They can be used to ask the Business Application for access to customer data, which is fetched using APIs.
– They can be generated again many times in case a user would lose or forget them.
API (Application Programming Interface)
A code that allows a piece of software or hardware to communicate with another piece of software or hardware.
SDK (Software Development Kit)
A set of tools, libraries, relevant documentation, code samples, processes and guides that allow developers to create software applications on a specific platform.
If an API is a set of building blocks that allow for the creation of something, an SDK is a full-fledged workshop, facilitating creation far outside the scopes of what an API would allow.