Core Concepts
The patterns every /v2 call follows.
Before you read a flow walkthrough, read these pages. They explain the
patterns you'll see on every /v2 request: how you authenticate, the
end-user entity you'll reference on every intent, how to make writes
retry-safe, and how errors come back.
- Authentication — X-API-Key model
- Parties — the end-user entity
- Idempotency — safe retries
- Error handling — status codes and error.code taxonomy