Authentication types
The Public APIs directory uses five standardized authentication labels. Each API listing shows exactly which authentication method is required.- No auth
- apiKey
- OAuth
- X-Mashape-Key
- User-Agent
No authentication
These APIs require no authentication at all - you can start making requests immediately without registering or obtaining credentials.How it works
Simply make HTTP requests to the API endpoint. No headers, keys, or tokens required.Examples from the directory
Cat Facts - Daily cat factsBest for
- Learning and experimentation
- Prototyping and demos
- Public data that doesn’t require rate limiting
- Side projects and hobby apps
Limitations
- Often have stricter rate limits
- May have limited features compared to authenticated access
- No usage tracking or analytics
- Can’t be customized for your use case
Choosing the right authentication level
For learning and prototyping
Start with No auth APIs - they’re the fastest way to get started and learn API concepts without setup overhead.For production apps
Prefer apiKey or OAuth APIs. They offer:- Higher rate limits
- Better reliability
- Usage analytics
- Support options
- SLA guarantees (for paid tiers)
For user integrations
Use OAuth when you need to:- Access user data from other services
- Perform actions on behalf of users
- Connect multiple accounts
Security best practices
Protect your API keys
Protect your API keys
- Store keys in environment variables, not in code
- Use secret management tools (AWS Secrets Manager, HashiCorp Vault)
- Never commit keys to Git repositories
- Add
.envto.gitignore - Rotate keys periodically
Use HTTPS
Use HTTPS
- Always use HTTPS endpoints when available
- Prefer APIs that support HTTPS (check the HTTPS column)
- HTTP transmits keys in plain text - avoid for sensitive data
Implement rate limiting
Implement rate limiting
- Respect API rate limits
- Implement exponential backoff for retries
- Cache responses when appropriate
- Monitor your usage
Validate and sanitize data
Validate and sanitize data
- Never trust API responses blindly
- Validate data types and formats
- Sanitize data before displaying to users
- Handle errors gracefully
Rate limits and quotas
Most APIs enforce rate limits to prevent abuse:- No auth APIs: Usually 100-1000 requests/hour
- apiKey APIs: Often 1000-10,000+ requests/day on free tier
- OAuth APIs: Varies by provider and permission scopes
Next steps
- Understand CORS compatibility for client-side apps
- Learn how to search and filter APIs
- Explore all available APIs
