Authentication is based upon oAuth and enforced using API-Keys, Consumer Secret Keys and Bearer Tokens.