Authorizing requests

APIs use authorization to ensure that client requests access data securely. This can involve authenticating the sender of a request and verifying that they have permission to access or manipulate the relevant data. If you're building an API, you can choose from a variety of auth models. If you're integrating a third-party API, the required authorization will be specified by the API provider.

You can pass auth details along with any request you send in Postman. Auth data can be included in the header, body, or as parameters to a request. If you enter your auth details in the Authorization tab, Postman will automatically populate the relevant parts of the request for your chosen auth type. You can use variables and collections to define authorization details more safely and efficiently, enabling you to reuse the same information in multiple places.


Specifying authorization details

With a request open in Postman, use the Authorization tab to select an auth type, then complete the relevant details for your selected type. The correct data values will be determined by your API at the server side. If you're using a third party API, refer to the provider's documentation for any required auth details.

Authorization tab

You can use these auth types with Newman and monitors as well as in the Postman app.

When you select a type from the Type dropdown list, Postman will indicate which parts of the request your details will be included in, for example the header, body, URL, or query parameters. Postman will add your auth details to the relevant parts of the request as soon as you select or enter them, so you can see how your data will be sent before attempting to run the request.

Your auth data will appear in the relevant parts of the request, for example in the Headers tab. To show headers added automatically, select the hidden button.

Hidden Headers

Hover over a header to see where it was added. To change an auth header, navigate back to the Authorization tab and update your configuration.

You can't override headers added by your Authorization selections directly in the Headers tab. If you need different auth headers from those autogenerated by Postman, alter your setup in Authorization, or remove your auth setup and add headers manually.

Your request auth can use environment, collection, and global variables. Postman doesn't save header data or query parameters to avoid exposing sensitive data such as API keys.

You can inspect a raw dump of the entire request including auth data in the Postman console after you send it.

Inheriting authorization

If you group your requests in collections and folders, you can specify auth details to reuse throughout a group.

By default, requests inside the collection or folder will inherit auth from the parent, which means that they'll use the same auth that you've specified at the folder or collection level. To change this for an individual request, make a different selection in the request Authorization tab.

Authorization types

Select a type from the Type dropdown list on the Authorization tab. You can choose an authorization type on requests, collections, or folders.

No auth

Postman won't send authorization details with a request unless you specify an auth type. If your request doesn't require authorization, select No Auth from the Authorization tab Type dropdown list.

API key

With API key auth, you send a key-value pair to the API either in the request headers or query parameters. In the request Authorization tab, select API Key from the Type list. Enter your key name and value, and select either Header or Query Params from the Add to dropdown list. You can store your values in variables for additional security.

API Key Auth

Postman will append the relevant information to your request Headers or the URL query string.

Bearer token

Bearer tokens enable requests to authenticate using an access key, such as a JSON Web Token (JWT). The token is a text string, included in the request header. In the request Authorization tab, select Bearer Token from the Type dropdown list. In the Token field, enter your API key value. For added security, store it in a variable and reference the variable by name.

Postman will append the token value to the text Bearer in the required format to the request Authorization header as follows:

Bearer <Your API key>

If a custom prefix is needed, use an API Key with a key of Authorization.

Basic auth

Basic authentication involves sending a verified username and password with your request. In the request Authorization tab, select Basic Auth from the Type dropdown list.

Enter your API login details in the Username and Password fields. For additional security, store these in variables.

In the request Headers, the Authorization header passes the API a Base64 encoded string representing your username and password values, appended to the text Basic as follows:

Basic <Base64 encoded username and password>

Digest auth

With Digest auth, the client sends a first request to the API, and the server responds with a few details, including a number that can be used only once (a nonce), a realm value, and a 401 unauthorized response. You then send back an encrypted array of data including a username and password combined with the data received from the server in the first request. The server uses the passed data to generate an encrypted string and compares it against what you sent in order to authenticate your request.

In the Authorization tab for a request, select Digest Auth from the Type dropdown list. Postman will present fields for both stages of authentication request. It will autocomplete the fields for the second request in the Advanced section using data returned from the server by the first request. To enable Postman to automate the flow, enter Username and Password values (or variables) and these will be sent with the second request.

If you don't want Postman to automatically extract the data, select Yes, disable retrying the request in the left column. If you do this, you will need to complete the advanced fields and run each request manually.

Setting the fields in the Advanced section is optional; Postman will populate them automatically when your first request runs.

  • Realm: A string specified by the server in the WWW-Authenticate response header.
  • Nonce: A unique string specified by the server in the WWW-Authenticate response header.
  • Algorithm: A string that indicates a pair of algorithms used to produce the digest and a checksum. Postman supports MD5 and SHA algorithms.
  • qop: The quality of protection applied to the message. The value must be one of the alternatives specified by the server in the WWW-Authenticate response header.
  • Nonce Count: The hexadecimal count of the number of requests (including the current request) that the client has sent with the nonce value in this request.
  • Client Nonce: An opaque quoted string value provided by the client, used by both client and server to avoid chosen plaintext attacks, to provide mutual authentication, and to provide some message integrity protection.
  • Opaque: A string of data specified by the server in the WWW-Authenticate response header, which should be used unchanged with URIs in the same protection space.

OAuth 1.0

OAuth 1.0 enables client applications to access data provided by a third-party API. For example, as a user of a service, you can grant another application access to your data with that service without exposing your login details. Accessing user data with OAuth 1.0 involves a few requests back and forth between client application, user, and service provider.

OAuth 1.0 is sometimes referred to as "two-legged" (auth only between client and server) or "three-legged" (where a client requests data for a user of a third-party service). An example OAuth 1.0 flow could run as follows:

  • To request user data with a third-party service, a consumer (client application) requests an access token using credentials such as a key and secret.
  • The service provider issues an initial token (that doesn't provide access to user data) and the consumer requests authorization from the user.
  • When the user grants auth, the consumer makes a request to exchange the temporary token for an access token, passing verification from the user auth.
  • The service provider returns the access token and the consumer can then make requests to the service provider to access the user's data.

Postman supports OAuth Core 1.0 Revision A.

To use OAuth 1.0:

  1. In the Authorization tab for a request, select OAuth 1.0 from the Type dropdown list.

  2. Select a Signature Method from the drop-down list. This will determine which parameters you should include with your request. Postman supports HMAC-SHA1, HMAC-SHA256, HMAC-SHA512, RSA-SHA1, RSA-SHA256, RSA-SHA512, and PLAINTEXT.

    • If your server requires an HMAC or PLAINTEXT signature, Postman will provide Consumer Key, Consumer Secret, Access Token, and Token Secret fields.
    • If you're using an RSA signature, Postman will present Consumer Key, Access Token, and Private Key inputs.
  3. You can optionally set advanced details—otherwise Postman will attempt to autocomplete these.

  4. You can include the auth details either in the request headers or in the body / URL. Select one from the Add authorization to dropdown list. Open the Headers or Body tab if you want to check how the details will be included with the request.

If you send the OAuth 1.0 data in the headers, an Authorization header sending your key and secret values is appended to the string OAuth together with additional comma-separated required details.

Postman will append the OAuth 1.0 information to the request Headers when you have completed all required fields in your Authorization setup.

If you send the OAuth 1.0 data in the body and URL, the data is added either in the request Body or Parameters depending on the request method.

If the request method is POST or PUT, and if the request body type is x-www-form-urlencoded, Postman will add the authorization parameters to the request body. Otherwise, for example in a GET request, your key and secret data will be passed in the URL query parameters.

The OAuth 1.0 auth parameter values are as follows:

  • Signature Method: The method your API uses to authenticate requests.
  • Consumer Key: A value used to identify a consumer with the service provider.
  • Consumer Secret: A value used by the consumer to establish ownership of the key. (For HMAC and PLAINTEXT signing methods.)
  • Access Token: A value representing the consumer's permission to access the user's data.
  • Token Secret: A value used by the consumer to establish ownership of a given token. (For HMAC and PLAINTEXT signing methods.)
  • Private Key: A private key to generate the auth signature. (For RSA signing methods.)
  • Advanced Parameters:
    • Callback URL: URL service provider will redirect to following user authorization. (Required if your server uses OAuth 1.0 Revision A.)
    • Verifier: Verification code from service provider after user auth.
    • Time Stamp: The timestamp the server uses to prevent replay attacks outside the time window.
    • Nonce: A random string generated by the client.
    • Version: The version of the OAuth authentication protocol (1.0).
    • Realm: A string specified by the server in the WWW-Authenticate response header.
    • Include body hash: Hash for integrity check with request bodies other than application/x-www-form-urlencoded. (Disabled when you're using callback URL / verifier.)

If your server implementation of OAuth 1.0 requires it, select Add empty parameters to signature.

You can also select the box to Encode the parameters in the authorization header for your request.

OAuth 2.0

With OAuth 2.0, you first retrieve an access token for the API, then use that token to authenticate future requests. Accessing data with OAuth 2.0 varies greatly between API service providers, but typically involves a few requests back and forth between client application, user, and API.

An example OAuth 2.0 flow could run as follows:

  • A client application makes a request for the user to authorize access to their data.
  • If the user grants access, the application then requests an access token from the service provider, passing the access grant from the user and authentication details to identify the client.
  • The service provider validates these details and returns an access token.
  • The client uses the access token to request the user data with the service provider.

To use OAuth 2.0:

  1. In the Authorization tab for a request, select OAuth 2.0 from the Type dropdown list. Specify if you want pass the auth details in the request URL or headers.

    By default Postman will append the access token to Bearer in the Authorization header for your request, but if your server implementation requires a different prefix, you can specify it in the Header Prefix field.

  2. To request an access token, fill out the fields in the Configure New Token section, and select Get New Access Token. You can save both the token and the details to generate a token with your request or collection.

    Once you have a token value generated and added, it will appear in the request Headers.

  3. Enter the details for your client application, and any auth details from the service provider. This allows you to replicate your application auth flow inside Postman in order to test authenticated requests.

    You can share token credentials with your team by selecting the sync button next to an available token. By default Postman will not sync your token in case you do not want to share it.

  4. Postman will prompt you to supply specific details depending on the OAuth 2.0 grant type, which can be Authorization code, Implicit, Password credentials, or Client credentials.

Authorization code

Authorization code grant type requires the user to authenticate with the provider—an authorization code is then sent back to the client app, extracted, and exchanged with the provider for an access token to authenticate subsequent requests.

To use authorization code grant type, enter a Callback URL for your client application (which should be registered with the API provider), together with various details provided by the API service including Auth URL, Access Token URL, Client ID, and Client Secret.

You can enter your auth details in the web browser, instead of in Postman, if you prefer, by selecting Authorize using browser.

Authorization code (with PKCE)

You can use PKCE (Proof Key for Code Exchange) with OAuth 2.0. When you select Authorization Code (With PKCE) two additional fields will become available for Code Challenge Method and Code Verifier. You can opt to use SHA-256 or Plain algorithms to generate the code challenge. The verifier is an optional 43-128 character string to connect the authorization request to the token request.

Authorization code (With PKCE) grant type coupled with Authorize using browser is recommended to prevent auth code interception attacks.


Implicit grant type returns an access token to the client without requiring the additional auth code step (and is therefore less secure).

To use implicit grant type with your requests in Postman, enter a Callback URL you have registered with the API provider, the provider Auth URL, and a Client ID for the app you have registered.

You can enter your auth details in the web browser, instead of in Postman, if you prefer, by selecting Authorize using browser.

Password credentials

OAuth 2.0 Password grant type involves sending username and password directly from the client and is therefore not recommended if you're dealing with third-party data.

To use password grant type, enter your API provider's Access Token URL, together with the Username and Password. In some cases you will also need to provide a client ID and secret.

Client credentials

Client credentials grant type is typically not used to access user data but instead for data associated with the client application.

Enter the provider's Access Token URL, together with the Client ID and Client Secret for your registered application.

Requesting an OAuth 2.0 token

The full list of parameters to request a new access token is as follows, depending on your grant type.

On the Configuration Options tab:

  • Token Name: The name you want to use for the token.
  • Grant Type: A dropdown list of options. This will depend on the API service provider requirements.
  • Callback URL: The client application callback URL redirected to after auth, and that should be registered with the API provider. If not provided, Postman will use a default empty URL and attempt to extract the code or access token from it. If this does not work for your API, you can use the following URL:
    • Authorize using browser: You can enter your credentials in your web browser, instead of the pop-up that appears in Postman by default when you use the Authorization code or Implicit grant type. Checking this box will set the Callback URL to return to Postman. If you opt to authorize using the browser, make sure pop-ups are disabled for the callback URL, otherwise it won't work.
  • Auth URL: The endpoint for the API provider authorization server, to retrieve the auth code.
  • Access Token URL: The provider's authentication server, to exchange an authorization code for an access token.
  • Client ID: The ID for your client application registered with the API provider.
  • Client Secret: The client secret given to you by the API provider.
  • Scope: The scope of access you are requesting, which may include multiple space-separated values.
  • State: An opaque value to prevent cross-site request forgery.
  • Client Authentication: A dropdown list: send a Basic Auth request in the header, or client credentials in the request body. After upgrading to a new version, change the value in this dropdown menu to avoid problems with client authentication.

On the Advanced Options tab:

  • Resource: A URI that indicates the resource or target service where the token is intended to be used.
  • Audience: A URI that indicates the target audience or service where the token is intended to be used.

When your config is complete, select Get New Access Token.

When you use Authorization code or Implicit grant type, you will be prompted to supply your credentials to retrieve an access token to use in subsequent requests. By default Postman will display a pop-up browser when you select Request Token. You can alternatively choose to authenticate using your system's default web browser. Select Authorize using browser and the Callback URL will autofill to return to Postman when you have completed auth in the browser, so that your requests can use the token returned on successful authentication.

When you receive a token from the API, you will see its details, together with the expiry, and optionally a refresh token you can use to retrieve a new access token when your current one expires. Select Use Token to select the returned value.

Any successfully retrieved tokens will be listed in the request Available Tokens dropdown list. Select one to send with your request. Select Manage Tokens in the dropdown list to view more details or delete your tokens.

If authentication fails or times out, Postman will display an error message. You can check the error details in the console, Retry to attempt authentication again, or edit your auth details before continuing.

Deleting a token in Postman doesn't revoke access. Only the server that issues the token can revoke it.

Hawk authentication

Hawk authentication enables you to authorize requests using partial cryptographic verification.

  1. In the Authorization tab for a request, select Hawk Authentication from the Type dropdown list.

  2. Enter your details in the Hawk Auth ID, Hawk Auth Key, and Algorithm fields. You can optionally set advanced details, but Postman will attempt to generate values for them if necessary.

When the required details are complete in the Authorization tab for your request, Postman will add them to the Headers.

The Hawk Authentication parameters are as follows:

  • Hawk Auth ID: Your API authentication ID value.
  • Hawk Auth Key: Your API authentication key value.
  • Algorithm: The hash algorithm used to create the message authentication code (MAC).
  • Advanced parameters:
    • User: The username.
    • Nonce: A random string generated by the client.
    • ext: Any application-specific information to be sent with the request.
    • app: The binding between credentials and the application to prevent an attacker using credentials issued to someone else.
    • dlg: The ID of the application the credentials were issued to.
    • Timestamp: Timestamp the server uses to prevent replay attacks outside the time window.

AWS Signature

AWS is the authorization workflow for Amazon Web Services requests. AWS uses a custom HTTP scheme based on a keyed-HMAC (Hash Message Authentication Code) for authentication.

The official AWS Signature documentation provides more detail:

  1. In the Authorization tab for a request, select AWS Signature from the Type dropdown list.

  2. Select where Postman should append your AWS auth details using the Add authorization data to drop-down—choosing the request headers or URL.

    • If you select Request Headers, Postman will add Authorization and X-Amz- prefixed fields in the Headers tab.
    • If you select Request URL, Postman will add the auth details in Params with keys prefixed X-Amz-.
  3. Enter your access key and secret values either directly in the fields or via variables for additional security.

  4. You can optionally set advanced fields, but Postman will autogenerate these if necessary.

The AWS Signature parameters are as follows:

  • AWS Region: The region receiving the request (defaults to us-east-1).
  • Service Name: The service receiving the request.
  • Session Token: Required only when using temporary security credentials.

NTLM authentication

Windows Challenge/Response (NTLM) is the authorization flow for the Windows operating system and for standalone systems.

  1. In the Authorization tab for a request, select NTLM Authentication from the Type dropdown list.

  2. Enter your Username and Password for NTLM access (use variables to avoid entering the values directly). You can optionally specify advanced parameters, but Postman will attempt to autocomplete these if necessary. By default your request will run a second time after extracting data received from the first—you can disable this by checking the checkbox.

Advanced parameters for NTLM auth are as follows:

  • Domain: The domain or host to authenticate against.
  • Workstation: The hostname of the PC.

Akamai EdgeGrid

Akamai Edgegrid is an authorization helper developed and used by Akamai.

  1. In the Authorization tab for a request, select Akamai EdgeGrid from the Type dropdown list.

  2. Enter your Access Token, Client Token, and Client Secret, using variables for additional security—you will receive these details when you register a client application with Akamai.

When the required details are complete in the Authorization tab for your request, Postman will add them to the Headers.

For information on obtaining your credentials, see Akamai Developer - Authorize your Client.

Syncing cookies

If you have session cookies in your browser, you can sync them to Postman using the Interceptor. See Interceptor extension and Cookies for more detail.

Next steps

If you're having issues getting a request to authenticate and run successfully, try some of the tips in troubleshooting API requests. If you still have auth problems, check out the authentication tag on the Postman forum.

Last modified: 2021/11/19