Security Architecture
The platform enforces a two-layer security approach:Request Signing
All outgoing requests must be digitally signed before transmission
Response Validation
All incoming responses must have their signatures verified before processing
Why Signing is Required
Authentication
Authentication
Digital signatures prove that the request originated from an authorized party with access to the private key.
Integrity
Integrity
Any modification to the signed content invalidates the signature, ensuring data hasn’t been tampered with in transit.
Non-Repudiation
Non-Repudiation
The sender cannot deny having sent a signed message, providing an audit trail for all transactions.
Replay Protection
Replay Protection
The
Request-Time header prevents old requests from being replayed by attackers.Key Management
Key Requirements
| Requirement | Specification |
|---|---|
| Algorithm | RSA with SHA-256 (RSA256) |
| Key Size | 2048 bits minimum |
| Format | PEM or PKCS#8 |
Key Pair Setup
Share Public Key
Provide your public key to Rebell during onboarding. This key will be used to verify your request signatures.
Security Best Practices
Implementation Guide
For detailed implementation instructions, see:Call an API via Signing
Step-by-step guide to signing requests and validating responses