This article describes how to sign requests to the MapTiler Cloud API with tokens.
Using tokens is a much more secure way of authorizing requests to your MapTiler Cloud Account. Choose this method when the standard authorization method, API keys, is not sufficiently strong enough.
How do secure credentials work?
Each request is cryptographically signed when using the credentials, so using the same signature for a different request is impossible. This makes it impossible to steal the credentials during transmission and prevents credentials misuse.
Note: Do not use this type of authorization in environments if your application's source code is visible to the potential attacker (such as client-side web applications).
How to use credentials
In MapTiler Cloud administration, under Account > Credentials, create new credentials and copy the token (keep this token private – treat it the same way as a password).
When using the credentials, every request to the MapTiler API has to contain
signature query parameters.
How to calculate the signature
The token from Cloud has two parts separated with an underscore:
Use "key" directly as
keyin the query
Decode "secret" (encoded as hexadecimal) to get the binary secret value
Sign the whole URL (including "key") using HMAC SHA256
&signature=as the last query parameter (URL-safe Base64 encoded)
- Note: If the URL contains any unsafe characters (such as spaces), make sure you encode them (e.g.
%20) them before calculating the signature. The browser/client would possibly take care of the encoding, but the signature would be invalid.