client-idclient-secret
Never expose
client-secret in frontend apps, mobile apps, browser storage, or public repositories.Authentication Model
client-id
Public identifier for your account and environment.
client-secret
Secret key used to authorize requests. Store only on trusted backend systems.
Header-Based Auth
Pass both credentials in request headers on every API call.
Environment-Specific Keys
Sandbox and Production use different credentials. Do not mix them.
Where To Get Your Keys
Sign in to Dashboard
Use sandbox-app.payfonte.com for testing or app.payfonte.com for live operations.
Request Example
Common Mistakes
Using production keys in sandbox
Using production keys in sandbox
Sandbox and production are separate environments. Use the matching base URL and matching credentials together.
Placing client-secret in frontend code
Placing client-secret in frontend code
Frontend code is public to end users. Keep all authenticated Payfonte API calls on your backend.
Forgetting required headers
Forgetting required headers
Requests without either
client-id or client-secret will fail authentication.Hardcoding secrets in source control
Hardcoding secrets in source control
Always load credentials from environment variables or a secure secret manager.
Security Checklist
- Keep
client-secreton backend only. - Use HTTPS for API and webhook endpoints.
- Rotate credentials if exposure is suspected.
- Restrict internal access to production secrets.
Related Docs
Environments
Sandbox and production URL/key setup.
Getting Started
Make your first successful API call.
API Reference
Full endpoint and schema details.